
Ukrainian defense enterprises and military facilities have become targets of targeted cyberattacks. In March 2025, numerous cases of the DarkCrystal RAT malware being distributed through widely used instant messengers were recorded, which poses a significant threat to the country’s security.
Cybercriminals are sending archives that supposedly contain official documents related to meetings and orders. The sending is carried out on behalf of real contacts whose accounts were previously hacked. The archives contain PDF files and executable programs, among which the DarkTortilla malware was found, which acts as a cryptor/loader for the subsequent launch of the DarkCrystal RAT (DCRAT) spyware.
Attackers are actively changing the subject matter of phishing messages, adapting it to current topics in the defense sector, in particular, to drones and electronic warfare equipment. The use of instant messengers significantly complicates the control of the flow of information and opens up additional opportunities for attacks.
DarkCrystal RAT is a powerful tool for remote control of infected devices, which allows attackers to access confidential information, execute arbitrary commands and carry out espionage operations. Recently, the methods of delivery of this software have become increasingly sophisticated, in particular due to the trust in compromised accounts. The surge in espionage attack activity indicates the need to strengthen cybersecurity measures, raise awareness among defense personnel and thoroughly check all received files.
Malicious campaigns using DarkCrystal RAT threaten the defense sector of Ukraine. The use of popular instant messengers for attacks indicates a growing level of cyber threats. It is important to observe information hygiene, not open suspicious files and report detected threats in a timely manner.