Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine

The Hacker News by The Hacker News
March 31, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Mar 31, 2025Ravie LakshmananThreat Intelligence / Malware

Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote access trojan called Remcos RAT.

“The file names use Russian words related to the movement of troops in Ukraine as a lure,” Cisco Talos researcher Guilherme Venere said in a report published last week. “The PowerShell downloader contacts geo-fenced servers located in Russia and Germany to download the second stage ZIP file containing the Remcos backdoor.”

The activity has been attributed with moderate confidence to a Russian hacking group known as Gamaredon, which is also tracked under the monikers Aqua Blizzard, Armageddon, Blue Otso, BlueAlpha, Hive0051, Iron Tilden, Primitive Bear, Shuckworm, Trident Ursa, UAC-0010, UNC530, and Winterflounder.

Cybersecurity

The threat actor, assessed to be affiliated with Russia’s Federal Security Service (FSB), is known for its targeting of Ukrainian organizations for espionage and data theft. It’s operational since at least 2013.

The latest campaign is characterized by the distribution of Windows shortcut (LNK) files compressed inside ZIP archives, disguising them as Microsoft Office documents related to the ongoing Russo-Ukrainian war to trick recipients into opening them. It’s believed these archives are sent via phishing emails.

The links to Gamaredon stem from the use of two machines that were used in creating the malicious shortcut files and which were previously utilized by the threat actor for similar purposes.

The LNK files come fitted with PowerShell code that’s responsible for downloading and executing the next-stage payload cmdlet Get-Command, as well as fetching a decoy file that’s displayed to the victim to keep up the ruse.

The second stage is another ZIP archive, which contains a malicious DLL to be executed via a technique referred to as DLL side-loading. The DLL is a loader that decrypts and runs the final Remcos payload from encrypted files present within the archive.

The disclosure comes as Silent Push detailed a phishing campaign that uses website lures to gather information against Russian individuals sympathetic to Ukraine. The activity is believed to be the work of either Russian Intelligence Services or a threat actor aligned with Russia.

Cybersecurity

The campaign consists of four major phishing clusters, impersonating the U.S. Central Intelligence Agency (CIA), the Russian Volunteer Corps, Legion Liberty, and Hochuzhit “I Want to Live,” a hotline for receiving appeals from Russian service members in Ukraine to surrender themselves to the Ukrainian Armed Forces.

The phishing pages have been found to be hosted on a bulletproof hosting provider, Nybula LLC, with the threat actors relying on Google Forms and email responses to gather personal information, including their political views, bad habits, and physical fitness, from victims.

“All the campaigns […] observed have had similar traits and shared a common objective: collecting personal information from site-visiting victims,” Silent Push said. “These phishing honeypots are likely the work of either Russian Intelligence Services or a threat actor aligned to Russian interests.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
Microsoft restates commitment to OpenAI amid analyst note about datacentre expansion rollbacks | Computer Weekly

Microsoft restates commitment to OpenAI amid analyst note about datacentre expansion rollbacks | Computer Weekly

Recommended.

Boldyn Networks appoints Sara Dickinson as Group CFO

Boldyn Networks appoints Sara Dickinson as Group CFO

February 17, 2025
China Telecom and Jianzhi Join Forces to Deliver Educational Content

China Telecom and Jianzhi Join Forces to Deliver Educational Content

May 12, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio