Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Colombian protesters in detention ask the judge to order his release after the government misses the deadline for appeals

Alexandr Wang leads Zuckerberg’s AI ambitions by joining the meta in a $14.3 billion deal with the scale AI left

Over 269,000 websites infected with JSFiretruck JavaScript malware

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » UAC-0063 extends cyber attacks to European Embassy using stolen documents.
Identity

UAC-0063 extends cyber attacks to European Embassy using stolen documents.

userBy userJanuary 29, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

LingeringJanuary 29, 2025LingeringRavy LakshmananCyber ​​Spy /Threat Intelligence

Cyber ​​attack

The advanced permanent threat (APT) group known as UAC-0063 invades one victim and attacks another target with the aim of distributing a known malware. It is observed to use the obtained legal documents.

“This study focuses on completing photos of the UAC-0063 business. Especially for entities in multiple European embassies, including Germany, the United Kingdom, the Netherlands, Romania, and Georgia. “Bitdefender’s technical solution director is a report shared with Hacker News.

UAC-0063 first flags in Romanian cyber security companies in May 2023, and in relation to campaign targeting government agencies in Central Asian, DOWNEX (also known as STILLARCE) Data Extraction Malware Malware Malware. Was used. It is suspected to share a link with an actor sponsored by a known Russian country called APT28.

Cyber ​​security

Just a few weeks later, Ukraine’s computer emergency response team (CERT-UA) assigned monica to threat cluster, but the hacking group has been operated at least since 2021, and the national government of the national government in key logger (logpy). I revealed that I was attacking. , HTML application script loader (HATVIBE), Python backdoor (Cherry or DownExpyer), and Downex.

According to the Recorded Future Insikt Group, UAC-0063 is targeting various government institutions and educational institutions in Central Asia, East Asia, and Europe.

Earlier this month, Cyber ​​Security Company SEKOIA has identified a campaign conducted by a hacking crew, which provides hatbeave malware, using a document stolen from the Republic of Kazakhstan to the target of a spear. Was revealed.

The latest survey from bitdefender indicates the continuation of this movement, and the invasion is ultimately Downex, DownExpyer, and at least one incident that targets German companies in the middle of 2023. It is called a newly discovered USB data code name.

Cyber ​​attack

DownExpyer is equipped with various functions for maintaining permanent connections with remote servers, collecting data, running commands, and receiving commands to develop additional payloads. The list of tasks obtained from the command and control (C2) server is as follows –

A3- File to match a specific extended set to C2 A4-exclude files and key stroke logs to C2 and delete the A5-command (by default, the “Systeminfo” function to harvest system information. Called) List the A6-file. System A7 -Screenshot A11 -Ends another execution task

Cyber ​​security

“The stability of the DownExpyer core function in the past two years is an important indicator of the UAC-0063 Arsenal and many years of being,” Zugec explained. “This observed stability suggests that DownExpyer has already worked before 2022 and is likely to be sophisticated.”

BitDefender has identified the Python script designed to record Keystrokes (probably the predecessor of Logpie) in one of the compromised machines infected with Downex, DownExpyer, and Hatvibe.

“The UAC-0063 is an example of a sophisticated threat actor group, which is characterized by advanced abilities and the permanent targeting of government agencies,” says Zugec.

“Their Arsenal, which is characterized by sophisticated implants such as DownExpyer and PyPlunderplug, is combined with well -made TTP and clearly focuses on spy activities and Intelligence.

Did you find this article interesting? Follow on Twitter and Linkedin and read the exclusive content to post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleBroadcom warns the flaws of high -sensitivity SQL injection in VMware Avi Load Balancer.
Next Article Clitical sabuten security defects (CVE-2025-22604) enable remote code execution
user
  • Website

Related Posts

Over 269,000 websites infected with JSFiretruck JavaScript malware

June 13, 2025

Ransomware gang exploits flaws in less than simple help to target victims with double fear tor

June 13, 2025

Moving from monitoring alerts to measuring risk

June 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Colombian protesters in detention ask the judge to order his release after the government misses the deadline for appeals

Alexandr Wang leads Zuckerberg’s AI ambitions by joining the meta in a $14.3 billion deal with the scale AI left

Over 269,000 websites infected with JSFiretruck JavaScript malware

RSPCA praises UK animal products labeling reform

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Alexandr Wang leads Zuckerberg’s AI ambitions by joining the meta in a $14.3 billion deal with the scale AI left

Top Startups and High-Tech Funding News – June 12, 2025

AI Internet is down: Google Cloud outage breaks Firebase, Supabase, Cursor, Lovable, etc.

Digital banking startup Chime pops with IPO debut, raising $700 million at a valuation of $11.6 billion

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.