Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Avatar vs. Twin: The Future of Digital Selves

Peloton recalls 833,000 bikes after reports of injuries

Trojanized ESET installer drops Kalambur backdoor in phishing attack on Ukraine

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Trojanized ESET installer drops Kalambur backdoor in phishing attack on Ukraine
Identity

Trojanized ESET installer drops Kalambur backdoor in phishing attack on Ukraine

userBy userNovember 6, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 6, 2025Ravi LakshmananMalware/vulnerabilities

A previously unknown cluster of threat activity impersonating Slovak cybersecurity company ESET was observed as part of a phishing campaign targeting Ukrainian businesses.

The campaign, detected in May 2025, is being tracked by security organizations under the name InedibleOchotense and is described as affiliated with Russia.

“InedibleOchotense sent spear-phishing emails and Signal text messages containing links to trojanized ESET installers to multiple Ukrainian organizations,” ESET said in its APT Activity Report Q2 2025 – Q3 2025, shared with The Hacker News.

InedibleOchotense is assessed to be tactically overlapping with a campaign involving the deployment of a backdoor called BACKORDER documented by EclecticIQ and logged by CERT-UA as UAC-0212, which is described as a subcluster within the Sandworm (aka APT44) hacking group.

DFIR retainer service

The email message is written in Ukrainian, but the first line uses Russian, likely indicating a typo or translation error, ESET said. An email purporting to be from ESET claims that its monitoring team has detected a suspicious process associated with the email address and your computer may be at risk.

This activity is an attempt to leverage the popularity of ESET software in the country and its brand reputation to trick recipients into installing malicious installers hosted on domains such as esetsmart.[.]com, esetscanner[.]com, and etremover[.]Com.

This installer is designed to deliver the legitimate ESET AV Remover and a C# backdoor variant called Kalambur (also known as SUMBUR) that uses the Tor anonymity network for command and control. You can also remove OpenSSH and enable remote access via Remote Desktop Protocol (RDP) on port 3389.

It’s worth noting that in a report published last month, CERT-UA attributed a nearly identical campaign to another subcluster within Sandworm, UAC-0125.

Sandworm wiper attack in Ukraine

According to ESET, Sandworm has continued its destructive campaign in Ukraine, launching two wiper malware tracked as ZEROLOT and Sting targeting anonymous universities in April 2025, followed by multiple data erasure malware variants targeting the government, energy, logistics, and grain sectors.

“During this period, we observed and confirmed that the UAC-0099 group conducted initial access operations and subsequently forwarded verified targets to Sandworm for follow-up activities,” the company said. “These devastating attacks by Sandworm are a reminder that Wiper continues to be a frequent tool of Russian-aligned threat actors in Ukraine.”

RomCom exploits WinRAR 0-Day in attacks

Another notable Russian threat actor active during this period was RomCom (also known as Storm-0978, Tropical Scorpius, UNC2596, or Void Rabisu). RomCom launched a spear phishing campaign in mid-July 2025 that exploited the WinRAR vulnerability (CVE-2025-8088, CVSS score: 8.8) as part of an attack targeting finance, manufacturing, defense, and organizations. Logistics company in Europe and Canada.

CIS build kit

“Successful exploitation attempts delivered various backdoors used by the RomCom group, specifically SnipBot. [aka SingleCamper or RomCom RAT 5.0] variants, RustyClaw, and Mythic agents,” ESET said.

In a detailed profile of RomCom in late September 2025, AttackIQ characterized the hacker group as closely monitoring geopolitical developments surrounding the Ukraine war and using them to conduct credential harvesting and data theft activities likely to support Russian objectives.

“RomCom was originally developed as an e-crime commodity malware, designed to facilitate the deployment and persistence of malicious payloads, and enabled its integration into prominent extortion-focused ransomware operations,” said security researcher Francis Gibernau. “RomCom has moved from being a purely profit-driven product to a public utility used to run a nation-state.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleCisco warns of new firewall attacks exploiting CVE-2025-20333 and CVE-2025-20362
Next Article Peloton recalls 833,000 bikes after reports of injuries
user
  • Website

Related Posts

Cisco warns of new firewall attacks exploiting CVE-2025-20333 and CVE-2025-20362

November 6, 2025

Building cyber resilience in financial services

November 6, 2025

AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More

November 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Avatar vs. Twin: The Future of Digital Selves

Peloton recalls 833,000 bikes after reports of injuries

Trojanized ESET installer drops Kalambur backdoor in phishing attack on Ukraine

Cisco warns of new firewall attacks exploiting CVE-2025-20333 and CVE-2025-20362

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.