By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: CERT-UA Reports Cyberattacks Targeting Ukrainian State Systems with WRECKSTEEL Malware
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > CERT-UA Reports Cyberattacks Targeting Ukrainian State Systems with WRECKSTEEL Malware
Computing

CERT-UA Reports Cyberattacks Targeting Ukrainian State Systems with WRECKSTEEL Malware

News Room
Last updated: 2025/04/04 at 1:10 AM
News Room Published 4 April 2025
Share
SHARE

Apr 04, 2025Ravie LakshmananCritical Infrastructure / Malware

The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed that no less than three cyber attacks were recorded against state administration bodies and critical infrastructure facilities in the country with an aim to steal sensitive data.

The campaign, the agency said, involved the use of compromised email accounts to send phishing messages containing links pointing to legitimate services like DropMeFiles and Google Drive. In some instances, the links are embedded within PDF attachments.

The digital missives sought to induce a false sense of urgency by claiming that a Ukrainian government agency planned to cut salaries, urging the recipient to click on the link to view the list of affected employees.

Cybersecurity

Visiting these links leads to the download of a Visual Basic Script (VBS) loader that’s designed to fetch and execute a PowerShell script capable of harvesting files matching a specific set of extensions and capturing screenshots.

The activity, attributed to a threat cluster tracked as UAC-0219, is said to have been ongoing since at least fall 2024, with early iterations using a combination of EXE binaries, a VBS stealer, and a legitimate image editor software called IrfanView to realize its goals.

CERT-UA has given the VBS loader and the PowerShell malware the moniker WRECKSTEEL. The attacks have not been attributed to any country.

Cyberattacks Targeting Ukrainian

The development comes as Kaspersky warned that the threat actor known as Head Mare has targeted several Russian entities with a malware known as PhantomPyramid that’s capable of processing instructions issued by the operator over a command-and-control (C2) server, as well as downloading and running additional payloads like MeshAgent.

Russian energy companies, industrial enterprises, and suppliers and developers of electronic components organizations have also been at the receiving end of phishing attacks mounted by a threat actor codenamed Unicorn that dropped a VBS trojan designed to siphon files and images from infected hosts.

Cybersecurity

Late last month, SEQRITE Labs revealed that academic, governmental, aerospace, and defense-related networks in Russia are being targeted by weaponized decoy documents, likely sent via phishing emails, as part of a campaign dubbed Operation HollowQuill. The attacks are believed to have started around December 2024.

malware-laced PDFs

The activity makes use of social engineering ploys, disguising malware-laced PDFs as research invitations and government communiqués to entice unsuspecting users into triggering the attack chain.

“The threat entity delivers a malicious RAR file which contains a .NET malware dropper, which further drops a Golang-based shellcode loader along with the legitimate OneDrive application and a decoy-based PDF with a final Cobalt Strike payload,” security researcher Subhajeet Singha said.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Today's NYT Connections: Sports Edition Hints, Answers for April 4 #193
Next Article Tech sector still failing to rid supply chains of forced labour | Computer Weekly
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Li Auto delays launch of first battery EV til March · TechNode
Computing
Azure Front Door vs Application Gateway for Load Balancing
News
Xpeng-backed startup aims for flying car production by 2025 · TechNode
Computing
Apple is reportedly considering buying Perplexity AI in iPhone maker’s biggest-ever acquisition
News

You Might also Like

Computing

Li Auto delays launch of first battery EV til March · TechNode

1 Min Read
Computing

Xpeng-backed startup aims for flying car production by 2025 · TechNode

1 Min Read
Computing

More Intel TDX Code Merged For KVM In Linux 6.16

2 Min Read
Computing

Lenovo to launch Legion gaming laptop series featuring Intel’s 14th Gen Core HX processors · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?