• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
ukrainian military targeted in phishing campaign leveraging drone manuals

Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals

You are here: Home / General Cyber Security News / Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals
September 25, 2023

Ukrainian military entities are the focus on of a phishing marketing campaign that leverages drone manuals as lures to provide a Go-based open-resource submit-exploitation toolkit referred to as Merlin.

“Given that drones or Unmanned Aerial Automobiles (UAVs) have been an integral tool applied by the Ukrainian navy, malware-laced lure files themed as UAVs assistance manuals have begun to surface area,” Securonix scientists Den Iuzvyk, Tim Peck, and Oleg Kolesnikov explained in a report shared with The Hacker News.

The cybersecurity company is tracking the marketing campaign below the name STARK#VORTEX.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The commencing stage of the attack is a Microsoft Compiled HTML Assistance (CHM) file that, when opened, operates malicious JavaScript embedded inside 1 of the HTML internet pages to execute PowerShell code built to get hold of a distant server to fetch an obfuscated binary.

Cybersecurity

The Windows-based mostly payload is decoded to extract the Merlin Agent, which, in switch, is configured to communicate with a command-and-management (C2) server for put up-exploitation actions, successfully seizing manage above the host.

“Even though the attack chain is fairly basic, the attackers leveraged some pretty intricate TTPs and obfuscation strategies in purchase to evade detection,” the scientists claimed.

This is the first time Ukrainian authorities companies have been qualified applying Merlin. In early August 2023, the Personal computer Unexpected emergency Reaction Workforce of Ukraine (CERT-UA) disclosed a identical attack chain that employs CHM information as decoys to infect the computer systems with the open-supply software.

Phishing Campaign

CERT-UA attributed the intrusions to a risk actor it monitors beneath the title UAC-0154.

“Data files and files employed in the attack chain are pretty able of bypassing defenses,” the researchers stated.

Impending WEBINARFight AI with AI — Battling Cyber Threats with Up coming-Gen AI Equipment

Prepared to deal with new AI-pushed cybersecurity troubles? Join our insightful webinar with Zscaler to deal with the increasing threat of generative AI in cybersecurity.

Supercharge Your Techniques

“Usually receiving a Microsoft support file above the internet would be considered strange. Even so, the attackers framed the entice documents to appear as anything an unsuspecting target could possibly assume to surface in a assist-themed document or file.”

The growth arrives months right after the CERT-UA explained it detected an unsuccessful cyber attack against an unnamed critical electrical power infrastructure facility in the state undertaken by the Russian state-sponsored crew identified as APT28.

Identified this short article exciting? Observe us on Twitter  and LinkedIn to go through a lot more special written content we submit.


Some areas of this article are sourced from:
thehackernews.com

Previous Post: «watch the webinar — ai vs. ai: harnessing ai defenses Watch the Webinar — AI vs. AI: Harnessing AI Defenses Against AI-Powered Risks
Next Post: Critical JetBrains TeamCity Flaw Could Expose Source Code and Build Pipelines to Attackers critical jetbrains teamcity flaw could expose source code and build»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.