Press ESC to close

UAC-0099 Attack Detection: Cyber-Espionage Activity Against Ukrainian State Agencies Using WinRAR Exploit and LONEPAGE Malware

Category Details
Threat Actors UAC-0099 hacking collective.
Campaign Overview Cyber-espionage campaigns targeting Ukrainian government agencies since 2022; latest activity observed in Nov-Dec 2024 using phishing attacks and LONEPAGE malware.
Target Regions (Victims) Ukrainian public sector organizations (forestry departments, forensic institutions, factories, etc.).
Methodology Phishing emails with malicious attachments (double archives with LNK/HTA files), exploiting WinRAR vulnerability (CVE-2023-38831), LONEPAGE malware distribution.
Product Targeted Government agency systems in Ukraine, WinRAR software (via vulnerability exploitation).
Malware Reference LONEPAGE malware (executes malicious PowerShell commands, transmits stolen data via HTTP POST requests, uses 3DES-encrypted files and .NET applications for execution).
Tools Used Phishing emails, LONEPAGE malware, Cloudflare services, WinRAR exploit (CVE-2023-38831), PowerShell.
Vulnerabilities Exploited WinRAR vulnerability (CVE-2023-38831).
TTPs Phishing attachments, client-side exploitation, PowerShell-based attacks, encrypted payload execution, obfuscation of malicious activity, use of Cloudflare for infrastructure resilience.
Attribution UAC-0099 group consistently targeting Ukraine for cyber-espionage; observed shifts in TTPs (e.g., changes in LONEPAGE implementation).
Recommendations Enhance phishing defenses, patch WinRAR vulnerability (CVE-2023-38831), monitor PowerShell activity, apply MITRE ATT&CK Sigma rules, use tools like Uncoder AI for retrospective hunting and IOC conversion, elevate cyber vigilance.
Source SOC Prime 

Read full article: https://socprime.com/blog/uac-0099-cyber-espionage-attacks-detection/

The above summary has been generated by an AI language model

Stay Updated with Our Newsletter

Source: SOC Prime

Published on: December 16, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *