Press ESC to close

Suspected Ukrainian hackers impersonating Russian ministries to spy on industry

Category Details
Threat Actors Sticky Werewolf (suspected pro-Ukraine cyberespionage or hacktivist group).
Campaign Overview Targeting Russian scientific and industrial enterprises via phishing emails impersonating government ministries.
Target Regions (Victims) Russia, with previous campaigns targeting enterprises in Poland and Belarus.
Methodology Phishing emails impersonating Russian ministries; delivery of malicious archives containing malware.
Product Targeted Scientific research and industrial sectors, defense industries.
Malware Reference Ozone RAT, Darktrack RAT, Glory Stealer, MetaStealer.
Tools Used Remote access trojans (RATs), stealer malware, phishing emails.
Vulnerabilities Exploited Human error via phishing; lack of verification of email authenticity.
TTPs Phishing with spoofed emails, malware delivery, remote access, credential theft.
Attribution Suspected pro-Ukraine group; exact attribution uncertain due to limited evidence.
Recommendations Strengthen email security measures, verify sender identities, train staff on phishing awareness, deploy anti-malware solutions.
Source The Record

Read full article: https://therecord.media/suspected-ukraine-hackers-russian-phishing

The above summary has been generated by an AI language model

Stay Updated with Our Newsletter

  

Source: The Record

Published on: January 15, 2025

Leave a Reply

Your email address will not be published. Required fields are marked *