Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Ukraine warns cabinetrat backdoor + xll add-in spreads through signal zips
Identity

Ukraine warns cabinetrat backdoor + xll add-in spreads through signal zips

userBy userOctober 1, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 1, 2025Ravi LakshmananMalware/Incident Response

The Ukrainian Computer Emergency Response Team (CERT-UA) is using a backdoor called the Cabinettrat to warn of new, targeted cyberattacks in the country.

The activity observed in September 2025 is attributed to a threat cluster tracking as UAC-0245. The agency said it discovered the attack after a software tool that took the form of an XLL file was discovered.

Further investigation revealed that the XLL files were distributed within a ZIP archive shared by signal messaging apps, disguised as documents regarding the detention of individuals who attempted to cross the Ukrainian border.

DFIR Retainer Service

XLL is designed to create numerous executables on compromised hosts, namely the exe file in the startup folder, an xll file called “basicexcelmath.xll” named “basicexcelmath.xll”.

Changes to the Windows registry are made to ensure the persistence of the executable. Then, in order to finally run the XLL add-in, launch the excel application (“excel.exe”) in hidden mode with the “/e” (“/embed”) parameter. The main purpose of XLL is to parse and extract from PNG file shellcodes classified as CabineTrat.

Both the XLL payload and shellcode are equipped with many anti-VM and anti-analysis procedures to avoid detection, including the presence of tools such as VMware, Xen, QEMU, Parallel, Hyper-V, at least two processor cores and at least 3GB of RAM checks.

A full-fledged backdoor written in the C programming language, CabineTrat is primarily designed to enumerate system information, installed programs, a list of screenshots, and directory contents, allowing you to delete specific files or directories, and perform file upload/downloading. Communicates with the remote server over a TCP connection.

The disclosure comes days after Fortinet Fortiguard Labs warned of attacks targeting Ukraine by harvesting targeted data from Ukrainian national police, harvesting sensitive data from target systems, and impersonating Ukrainian national police in a fireless phishing campaign to mine cryptocurrency.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleUS Government acquires shares in Canadian lithium miners and their Nevada mining projects
Next Article Cyber ​​training in schools will improve, but recovery time will be slower
user
  • Website

Related Posts

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Apple upgrades iPad Pro, MacBook Pro, Vision Pro with new M5 chip

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.