Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ghostwriter Intensifies Phishing Attacks on Ukraine

Ghostwriter Intensifies Phishing Attacks on Ukraine

Posted on May 14, 2026 By CWS

The Belarus-linked cyber threat group, known as Ghostwriter, has launched a new wave of attacks against Ukrainian governmental bodies. Active since 2016, Ghostwriter is recognized for its cyber espionage and influence campaigns in Eastern Europe, particularly against Ukraine. This group is also identified under numerous aliases, including FrostyNeighbor and White Lynx.

Ghostwriter’s Evolving Tactics

Ghostwriter has consistently adapted its tactics, regularly updating its tools and methods to bypass security measures. According to a report by ESET shared with The Hacker News, the group has utilized malware like PicassoLoader, facilitating the deployment of Cobalt Strike Beacon and njRAT. Notably, in late 2023, they exploited a vulnerability in WinRAR (CVE-2023-38831) to introduce these malicious tools.

In their previous campaigns, Polish targets faced phishing attacks exploiting a flaw in Roundcube (CVE-2024-42009) to hijack email credentials. CERT Polska’s June 2025 report detailed how Ghostwriter used these credentials to access and misuse email accounts for further phishing.

Latest Attack Strategies

Since March 2026, Ghostwriter’s recent activities involve phishing emails with malicious PDF attachments aimed at Ukrainian government entities. These PDFs masquerade as documents from Ukrtelecom, a Ukrainian telecom firm, and include links that deliver a RAR archive with a JavaScript payload, culminating in Cobalt Strike deployment.

The attack involves a geofencing mechanism, delivering harmless PDFs to those outside Ukraine while targeting Ukrainians with malicious payloads. The downloader profiles compromised systems and transmits data every 10 minutes, helping attackers decide on further action.

Target Sectors and Global Implications

The primary focus of these attacks is on Ukraine’s military and government sectors, while in Poland and Lithuania, the targets include industries like healthcare and logistics. ESET emphasizes Ghostwriter’s persistence and adaptability, employing diverse tactics to evade detection.

Alongside Ghostwriter, the Russia-affiliated Gamaredon group continues phishing attacks on Ukrainian state institutions, deploying malware like GammaDrop. On another front, the pro-Ukraine hacktivist group BO Team is reportedly targeting Russian organizations, hinting at potential coordination with other groups.

These developments underscore the ongoing complexity and evolution of cyber threats in the region. As threat actors like Ghostwriter and Gamaredon refine their strategies, organizations must remain vigilant and enhance their cybersecurity defenses to mitigate risks.

The Hacker News Tags:CERT Polska, Cobalt Strike, cyber espionage, Cybersecurity, ESET, FrostyNeighbor, geofencing, Ghostwriter, Malware, PDF phishing, Phishing, PicassoLoader, Ukraine, Ukrtelecom

Post navigation

Previous Post: AI Enhances Security with Realistic Attack Simulations
Next Post: Revolutionizing Data Center Security with DPUs

Related Posts

Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication The Hacker News
An Anti-Sales Guide for MSPs An Anti-Sales Guide for MSPs The Hacker News
CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities The Hacker News
Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits The Hacker News
React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors React2Shell Vulnerability Actively Exploited to Deploy Linux Backdoors The Hacker News
Critical SGLang Vulnerability Allows Remote Code Execution Critical SGLang Vulnerability Allows Remote Code Execution The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems
  • AI Hallucinations Pose New Security Challenges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems
  • AI Hallucinations Pose New Security Challenges

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark