Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

OpenAI’s Atlas is more focused on ChatGPT than the web

Amazon plans to buy thousands of pedal-assist cargo vehicles from Rivian spinoff

Iran-linked Muddy Water targets over 100 organizations in global espionage campaign

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Ukraine aid group targeted through fake Zoom meetings and weaponized PDF files
Identity

Ukraine aid group targeted through fake Zoom meetings and weaponized PDF files

userBy userOctober 22, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers have detailed a coordinated spear-phishing campaign called PhantomCaptcha that targets organizations associated with war relief efforts in Ukraine and delivers a remote access Trojan that uses WebSockets for command and control (C2).

The operation, which took place on 8 October 2025, targeted members of the International Society of the Red Cross, the Norwegian Refugee Council, the United Nations Children’s Fund (UNICEF) Office in Ukraine, the Norwegian Refugee Council, the Victims Registration Service of the Council of Europe in Ukraine, and local government administrations of Ukraine in the Donetsk, Dnipropetrovsk, Poltava and Mykolaevsk regions. said in a new report released today.

The phishing email, which was found to be impersonating the Ukrainian presidential palace, sent a booby-trapped PDF document containing an embedded link that, when clicked, redirected victims to a fake Zoom site (“zoomconference”).[.]app”) to execute malicious PowerShell commands via a fake ClickFix-style Cloudflare CAPTCHA page under the guise of a browser check.

DFIR retainer service

The fake Cloudflare page acts as an intermediary by setting up a WebSocket connection with an attacker-controlled server and sends a JavaScript-generated clientId. If the WebSocket server responds with a matching identifier, the browser takes the victim to a legitimate, password-protected Zoom meeting.

Although it is suspected that this infection vector is likely reserved for live social engineering calls with victims, SentinelOne said it did not observe any threat actors launching this attack line during its investigation.

Windows[ファイル名を指定して実行]The PowerShell commands that are pasted into the dialog and then executed lead to an obfuscated downloader that is primarily responsible for retrieving and executing the second stage payload from a remote server. This second stage malware scouts the compromised host, sends it to the same server, and responds with a PowerShell remote access Trojan.

“The final payload is a WebSocket RAT hosted on Russian-owned infrastructure that allows arbitrary remote command execution, data exfiltration, and additional malware deployment,” security researcher Tom Hagel said in a statement. “WebSocket-based RATs are remote command execution backdoors, effectively remote shells that give operators arbitrary access to the host.”

The malware connects to a remote WebSocket server at ‘wss://bsnowcommunications’.[.]com:80″ and is configured to receive a Base64-encoded JSON message containing a command to be executed with Invoke-Expression or a PowerShell payload. The results of the execution are then packaged into a JSON string and sent to the server via WebSocket.

Further analysis of VirusTotal’s submission revealed that the eight-page weaponized PDF was uploaded from multiple locations including Ukraine, India, Italy, and Slovakia, likely indicating a wide range of targets.

SentinelOne noted that preparations for the campaign began on March 27, 2025, when the attackers registered the domain “goodhillsenterprise.”[.]com’ is used to serve obfuscated PowerShell malware scripts. Interestingly, the infrastructure associated with “zoomconference” is[.]app” was only active for one day, October 8th.

CIS build kit

This suggests “sophisticated planning and a strong commitment to operational security,” the company said, adding that it also discovered a fake application hosted on the domain “princess-mens.”[.]click” aims to collect location information, contacts, call logs, media files, device information, list of installed apps, and other data from compromised Android devices.

Although this campaign is not attributed to any known attacker or group, the use of ClickFix overlaps with the use of attacks recently revealed by the Russia-linked COLDRIVER hacking group.

“The PhantomCaptcha campaign reflects a highly capable adversary demonstrating extensive operational planning, compartmentalized infrastructure, and deliberate exposure control,” SentinelOne said.

“The six-month period from initial infrastructure registration to attack execution, followed by rapid removal of user-facing domains while maintaining backend command and control, confirms the operators’ mastery of both offensive techniques and defensive evasion.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUK recognizes Apple, Google as having ‘strategic market positions’, opening door to further regulation
Next Article Iran-linked Muddy Water targets over 100 organizations in global espionage campaign
user
  • Website

Related Posts

Iran-linked Muddy Water targets over 100 organizations in global espionage campaign

October 22, 2025

Weeks after Microsoft’s July patch, Chinese attackers exploit ToolShell SharePoint flaw

October 22, 2025

Closing the remediation gap: Introducing Penera Resolve

October 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

OpenAI’s Atlas is more focused on ChatGPT than the web

Amazon plans to buy thousands of pedal-assist cargo vehicles from Rivian spinoff

Iran-linked Muddy Water targets over 100 organizations in global espionage campaign

Ukraine aid group targeted through fake Zoom meetings and weaponized PDF files

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.