Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » UAC-0063 expands cyber-napades to European embassies using stolen documents
Global Security

UAC-0063 expands cyber-napades to European embassies using stolen documents

AdminBy AdminJanuary 29, 2025No Comments3 Mins Read
Cyber Attacks
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


January 29, 2025Red LakshmananCyber ​​-Spying / Intelligence threats

Cyberattack

Group advanced permanent threat (APT) known as UAC-0063 The use of legitimate documents obtained by penetrating one victim was noted to attack another purpose in order to provide a well -known malicious software called Hatvibe.

“This study focused on the completion of the picture of UAC-0063 operations, in particular, documented by their original attention to Central Asia, orientations to organizations such as embassies in several European countries, including Germany, UK, Netherlands, Romania and Georgia, “Martin Tsugiak, Director of Technical Solutions in Bitdefender, – Note In a report that shared with Hacker News.

UAC-0063 was First specified According to the Romanian cybersecurity campaign in May 2023, in connection with the company aimed at government agencies in Central Asia, using the exaltration data known as Downex (AKA Stilarch). It is suspected to share ties with a well -known Russian state actor called APT28.

Cybersecurity

Just a few weeks later, the emergency response team in Ukraine (Cert-Ua)-which appointed cluster threat nickname disclosed The fact that the hacking group has been valid at least from 2021, attacking the state bodies in the country with the keys (Logpie), the HTML (Hatvibe), rear -back python (CherrySpy or Downexpyer).

There are reports that UAC-0063 is also aimed at various organizations in Central Asia, East Asia and Europe, according to the recorded Group Insikt Group Future, which has given the Tag -10 threatening actor.

Earlier this month the SEKOIA cybersecurity firm disclosed The fact that he determined the campaign carried out by the crew of the burglary, which participated in the use of documents stolen by the Ministry of Foreign Affairs of the Republic of Kazakhstan, for spear-fisher purposes and delivery of malicious Hatvibe software.

The latest Bitdefender conclusions demonstrate the continuation of such behavior, and the invasion ultimately opens the way for DownEx, DownExpyer and the recently discovered USB exfiltrator CodennderPlug data, at least in one incident aimed at the German company in mid -January.

Cyberattack

DownExpyer comes with different opportunities to maintain a permanent connection with a remote server and receipt of data collection, command execution and deployment of additional useful loads. List of tasks obtained from the command and control server (C2), below-

  • A3 – EXFILTRATE files that match a particular extension set to C2
  • A4 – EXFILTRATE files and logs on C2 and delete them after transfer
  • A5 – Complete commands (default function “Systeminfo” is caused to collect the system information)
  • A6 – List the file system
  • A7 – Take Screenshots
  • A11 – Stop another running task
Cybersecurity

“The sustainability of the basic functional functions of DownExpyer for the last two years is an important indicator of its maturity and probably long-standing in the UAC-0063 arsenal,” Zegek explained. “This observed stability suggests that by 2022 is probably already operating and clarified.”

Bitdefender said he also identified the Python scenario designed to record the key – probably a predecessor for the introduction – on one of the compromised machines infected with Downex, Downexpyer and Hatvibe.

“UAC-0063 illustrates a complex group of threats, characterized by its advanced capabilities and sustainable orientation to state structures,” Tsugiak said.

“Their arsenal, represented by complex implants such as Downexpyer and PypLunderPlug, combined with well -thought -out TTPS, demonstrates accurate attention to spying and intelligence.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.