Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fake CERT-UA Website Distributes Go-Based Malware

Fake CERT-UA Website Distributes Go-Based Malware

Posted on April 2, 2026 By CWS

A recent cyberattack involved the creation of a counterfeit version of Ukraine’s official cybersecurity agency website, aiming to distribute a harmful remote access tool. The operation, identified as UAC-0255, utilized phishing emails and a cloned government site to implant malware in the devices of professionals across various Ukrainian sectors.

Cyberattack Details and Execution

The deceptive campaign occurred on March 26 and 27, 2026, targeting organizations with emails purportedly from CERT-UA, Ukraine’s national computer emergency response team. The emails directed recipients to download a file from Files.fm, misleading them into believing it contained a critical security tool that required immediate installation.

The attackers focused on sectors such as government, healthcare, security, education, finance, and technology. CERT-UA analysts quickly identified the fraud, revealing that the so-called security tool was, in fact, a malicious software package.

Technical Insights into AGEWHEEZE Malware

Inside the downloadable archive was AGEWHEEZE, a sophisticated remote access trojan developed using the Go programming language. The malware’s command-and-control server was traced to an IP address associated with the French company OVH, and the incident was formally recorded under CERT-UA#21075.

To lend credibility to their scheme, the attackers registered the domain cert-ua[.]tech, creating a counterfeit website that imitated CERT-UA’s official site. This fraudulent page included download links and installation instructions, supported by an SSL certificate issued on March 27, 2026, mere hours before the emails circulated.

Implications and Protective Measures

Despite the attack’s sophistication, CERT-UA reported minimal infection, affecting only a limited number of personal devices within educational institutions. The response team acted swiftly to provide technical support and preventive advice to those impacted.

AGEWHEEZE employs several persistence techniques, embedding itself within system files and utilizing registry entries to ensure continued operation post-restart. It communicates with its C2 server through WebSockets, facilitating real-time interaction and offering a wide range of capabilities, from capturing screenshots to executing system commands.

Organizations are urged to deploy application control solutions like SRP or AppLocker to prevent unauthorized software execution. Additionally, reducing the attack surface within networks and exercising caution with unexpected emails claiming to originate from trusted entities is crucial.

For more updates, follow us on Google News, LinkedIn, and X. Set CSN as a preferred source in Google for instant alerts.

Cyber Security News Tags:AGEWHEEZE, CERT-UA, command-and-control server, Cyber Serp, Cyberattack, Cybersecurity, fake website, Go programming, Malware, Phishing, phishing emails, remote access tool, security measures, UAC-0255, Ukraine

Post navigation

Previous Post: Apple Enhances Device Security Against DarkSword Exploit
Next Post: Claude Code Faces Security Flaw After Source Leak

Related Posts

Cloudflare Outage Causes Major Global Disruptions Cloudflare Outage Causes Major Global Disruptions Cyber Security News
Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems Researchers Breakdown DragonForce Ransomware Along with Decryptor for ESXi and Windows Systems Cyber Security News
F5 Fixes HTTP/2 Vulnerability Enabling Massive DoS Attacks F5 Fixes HTTP/2 Vulnerability Enabling Massive DoS Attacks Cyber Security News
New ClickFix Attack Mimic as AnyDesk Leverages Windows Search to Drop MetaStealer New ClickFix Attack Mimic as AnyDesk Leverages Windows Search to Drop MetaStealer Cyber Security News
Microsoft Teams Mobile Update Prompts for Browser Choice Microsoft Teams Mobile Update Prompts for Browser Choice Cyber Security News
Authorities Dismantle Cybercrime-as-a-Service Platform, Seize 40,000 Active SIM Cards Authorities Dismantle Cybercrime-as-a-Service Platform, Seize 40,000 Active SIM Cards Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Threat Actors Exploit Vulnerability to Access Next.js Hosts
  • OpenSSH 10.3 Addresses Key Security Vulnerabilities
  • Qilin Ransomware Disables EDR Systems with Malicious DLL
  • Ransomware Campaign Mimics Akira in South America
  • Claude Code Faces Security Flaw After Source Leak

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Threat Actors Exploit Vulnerability to Access Next.js Hosts
  • OpenSSH 10.3 Addresses Key Security Vulnerabilities
  • Qilin Ransomware Disables EDR Systems with Malicious DLL
  • Ransomware Campaign Mimics Akira in South America
  • Claude Code Faces Security Flaw After Source Leak

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark