Hackers masquerade as drone companies and government agencies to spy on Ukrainians

8 April 2025 2 minutes Author: Newsman

А new wave of cyberattacks has discovered on Ukrainian government agencies. Attackers are posing as drone manufacturers and government agencies, sending phishing emails with the aim of spying and stealing data.

Since February 2025, an unknown group, dubbed UAC-0226, has been actively attacking the Armed Forces of Ukraine, law enforcement agencies, and local authorities. Most cases have been recorded in the eastern regions, near the Russian border.

Hackers send emails with infected documents, the subjects of which imitate official notifications about demining, fines, drones, or compensation. Mailboxes are hacked or replaced, which makes it difficult to detect the threat.

A script from GitHub is used for infection, as well as the malicious program GiftedCrook, which steals browsing history, cookies and passwords from Chrome, Edge and Firefox browsers. All stolen information is automatically sent to Telegram bots.

In parallel, CERT-UA recorded the activity of another malware – Wrecksteel. It spreads through public file sharing sites (DropMeFiles, Google Drive) and allows attackers to receive documents, photos, presentations and even take screenshots of infected devices.

Such attacks are an example of classic hybrid warfare, where email and social engineering are combined with open tools like GitHub. The enemy demonstrates a systemic understanding of the internal processes of Ukrainian institutions and uses topics and formulations that inspire trust among employees.

UAC-0226 operates anonymously, automatically and using publicly available tools, which makes detection difficult. Attacks are especially dangerous for strategic objects that are in a high-risk zone. To mitigate the threat, it is important to raise employee awareness, strengthen control over email attachments, implement two-factor authentication, and monitor suspicious activity on Telegram.

Other related articles
News
Read more
Fresh Sakura RAT Appears on GitHub
A new Sakura RAT has surfaced on GitHub, demonstrating its ability to bypass antivirus and EDR systems through sophisticated obfuscation techniques including HVNC, injection, and registry persistence. This remote access Trojan is becoming a serious threat to corporate security, especially as similar tools become more widely available in the open source community.
135
News
Read more
OpenAI tests watermarking for images in GPT-4o
OpenAI is implementing a watermark in GPT-4o that will appear on images for free users. The feature is still in testing, but existing code in the app already confirms its future. The researchers also discovered other tools: Structured Thoughts, Reasoning Recap, and CoT Search Tool.
116
News
Read more
Suspected Chinese hackers exploit new vulnerability in Ivanti firewalls
Hackers from China are exploiting a new weakness CVE-2025-22457 in Ivanti firewall systems, including Connect Secure and Policy Secure, used by government agencies. Despite the availability of the patch, attacks continue, and the company advises to completely abandon outdated devices. This confirms the growing threat of state cyberespionage through edge devices.
106
Found an error?
If you find an error, take a screenshot and send it to the bot.