• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
uac 0063 expands cyber attacks to european embassies using stolen documents

UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documents

You are here: Home / General Cyber Security News / UAC-0063 Expands Cyber Attacks to European Embassies Using Stolen Documents
January 29, 2025

The advanced persistent threat (APT) group known as UAC-0063 has been observed leveraging legitimate documents obtained by infiltrating one victim to attack another target with the goal of delivering a known malware dubbed HATVIBE.

“This research focuses on completing the picture of UAC-0063’s operations, particularly documenting their expansion beyond their initial focus on Central Asia, targeting entities such as embassies in multiple European countries, including Germany, the UK, the Netherlands, Romania, and Georgia,” Martin Zugec, technical solutions director at Bitdefender, said in a report shared with The Hacker News.

UAC-0063 was first flagged by the Romanian cybersecurity company in May 2023 in connection with a campaign that targeted government entities in Central Asia with a data exfiltration malware known as DownEx (aka STILLARCH). It’s suspected to share links with a known Russian state-sponsored actor called APT28.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

Merely weeks later, the Computer Emergency Response Team of Ukraine (CERT-UA) – which assigned the threat cluster the moniker – revealed that the hacking group has been operational since at least 2021, attacking state bodies in the country with a keylogger (LOGPIE), an HTML Application script loader (HATVIBE), a Python backdoor (CHERRYSPY or DownExPyer), and DownEx.

There is evidence that UAC-0063 has also targeted various entities in organizations in Central Asia, East Asia, and Europe, according to Recorded Future’s Insikt Group, which has assigned the threat actor the name TAG-110.

Earlier this month, cybersecurity firm Sekoia disclosed that it identified a campaign undertaken by the hacking crew that involved using documents stolen from the Ministry of Foreign Affairs of the Republic of Kazakhstan to spear-phish targets and deliver the HATVIBE malware.

The latest findings from Bitdefender demonstrate a continuation of this behaviour, with the intrusions ultimately paving the way for DownEx, DownExPyer, and a newly discovered USB data exfiltrator codenamed PyPlunderPlug in at least one incident targeting a German company in mid-January 2023.

Cyber Attacks

DownExPyer comes fitted with varied capabilities to maintain a persistent connection with a remote server and receive commands to collect data, execute commands, and deploy additional payloads. The list of tasks obtained from the command-and-control (C2) server is below –

  • A3 – Exfiltrate files matching a specific set of extensions to C2
  • A4 – Exfiltrate files and keystroke logs to C2 and delete them after transmission
  • A5 – Execute commands (by default the “systeminfo” function is called to harvest system information)
  • A6 – Enumerate the file system
  • A7 – Take screenshots
  • A11 – Terminate another running task

Cybersecurity

“The stability of DownExPyer’s core functionalities over the past two years is a significant indicator of its maturity and likely long-standing presence within the UAC-0063 arsenal,” Zugec explained. “This observed stability suggests that DownExPyer was likely already operational and refined prior to 2022.”

Bitdefender said it also identified a Python script designed to record keystrokes – likely a precursor to LOGPIE – on one of the compromised machines that was infected with DownEx, DownExPyer, and HATVIBE.

“UAC-0063 exemplifies a sophisticated threat actor group characterized by its advanced capabilities and persistent targeting of government entities,” Zugec said.

“Their arsenal, featuring sophisticated implants like DownExPyer and PyPlunderPlug, combined with well-crafted TTPs, demonstrates a clear focus on espionage and intelligence gathering. The targeting of government entities within specific regions aligns with potential Russian strategic interests.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «broadcom warns of high severity sql injection flaw in vmware avi Broadcom Warns of High-Severity SQL Injection Flaw in VMware Avi Load Balancer
Next Post: Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution critical cacti security flaw (cve 2025 22604) enables remote code execution»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.