Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

CISA adds actively exploited VMware Aria operational flaw CVE-2026-22719 to KEV catalog

Why are AI startups selling the same stock at two different prices?

A series of government hacking tools targeting iPhones are being used by cybercriminals

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Russian-aligned hackers exploit Viber to target Ukraine’s military and government
Identity

Russian-aligned hackers exploit Viber to target Ukraine’s military and government

userBy userJanuary 5, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

January 5, 2026Ravi LakshmananCyber ​​Spy / Windows Security

A Russian-aligned attacker known as UAC-0184 has been observed leveraging the Viber messaging platform to distribute malicious ZIP archives and target military and government agencies in Ukraine.

“The organization will continue its high-intensity intelligence-gathering operations against the Ukrainian military and government sectors in 2025,” the 360 ​​Threat Intelligence Center said in a technical report.

The hacker group, also tracked as Hive0156, is known for delivering hijack loaders in attacks targeting Ukrainian organizations, primarily using war-themed decoys in phishing emails. The malware loader then acts as a vector for Remcos RAT infection.

This threat actor was first documented by CERT-UA in early January 2024. Subsequent attack campaigns have found that messaging apps such as Signal and Telegram are being used as a means of delivering malware. The latest findings from Chinese security vendors show that this tactic is evolving further.

cyber security

This attack chain uses Viber as the initial intrusion vector to distribute a malicious ZIP archive containing multiple Windows Shortcut (LNK) files disguised as official Microsoft Word and Excel documents and tricks the recipient into opening them.

The LNK file is designed to act as a decoy document to reduce the victim’s suspicions and silently runs the hijack loader in the background by retrieving a second ZIP archive (‘smoothieks.zip’) from a remote server using a PowerShell script.

The attack rebuilds and deploys the hijack loader in memory through a multi-step process that uses techniques such as DLL sideloading and module stomping to avoid detection by security tools. The loader then scans the environment for installed security software, including security software associated with Kaspersky, Avast, BitDefender, AVG, Emsisoft, Webroot, and Microsoft by calculating the CRC32 hashes of the corresponding programs.

In addition to establishing persistence through a scheduled task, the loader takes steps to disable static signature detection before injecting the Remcos RAT into ‘chime.exe’ and secretly running it. Remote management tools allow attackers to manage endpoints, execute payloads, monitor activity, and steal data.

“Although marketed as legitimate systems management software, its powerful intrusion capabilities make it frequently used by a variety of malicious actors for cyber espionage and data theft operations,” the 360 ​​Threat Intelligence Center said. “Remcos provides a graphical user interface (GUI) control panel that allows attackers to perform batch automated administration and precise manual interaction on victim hosts.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleKimwolf Android botnet infects over 2 million devices via exposed ADB and proxy networks
Next Article CES 2026: Follow us live as Nvidia, Lego, AMD, Amazon and more make big announcements
user
  • Website

Related Posts

CISA adds actively exploited VMware Aria operational flaw CVE-2026-22719 to KEV catalog

March 4, 2026

Fake tech support spam deploys customized Havoc C2 across organization

March 3, 2026

The 3 Steps CISOs Must Follow

March 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

CISA adds actively exploited VMware Aria operational flaw CVE-2026-22719 to KEV catalog

Why are AI startups selling the same stock at two different prices?

A series of government hacking tools targeting iPhones are being used by cybercriminals

Alibaba’s Qwen technology chief resigns amid massive AI push

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.