Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
UAC-0184 Malware Utilizes Bitsadmin and HTA for Stealthy Attacks

UAC-0184 Malware Utilizes Bitsadmin and HTA for Stealthy Attacks

Posted on May 19, 2026 By CWS

A sophisticated attack chain linked to the threat group UAC-0184 has been identified as utilizing Windows’ native bitsadmin tool alongside HTA files to discreetly deploy harmful payloads onto targeted computers. This campaign is primarily directed at Ukraine, with strong evidence indicating that military-related entities, including individuals associated with the Ukrainian Defence Forces, are the main targets.

Social Engineering and Initial Attack Vector

The attackers employ social engineering tactics centered around enticing topics such as legal matters, combat footage, and personal contact requests to lure victims into opening infected files. Upon opening these documents, which may appear as PDFs, Word, or Excel files, bitsadmin is activated in the background to retrieve an HTA file from a server controlled by the attackers. The file is executed using mshta.exe, advancing the infection without triggering immediate alerts on the victim’s system.

Synaptic Security analysts reported to Cyber Security News (CSN) that this delivery technique is gated, meaning the payload is only released to systems that meet specific criteria, thereby avoiding detection by sandbox environments and security researchers.

Advanced Delivery Mechanisms

This conditional delivery system complicates the study of the malware and allows attackers to operate without drawing attention for extended periods. Once executed, the HTA file runs a hidden PowerShell command to download a ZIP archive from the attacker’s server at IP address 169.40.135.35. The archive is unpacked into a directory in the AppData folder, launching two files: a music visualizer application named Cluster-Overlay64.exe and a decoy PDF named Scan_001.pdf, which serves to distract the user.

The full suite of tools used by UAC-0184 demonstrates notable operational expertise. The final phase of the infection chain involves repurposing PassMark BurnInTest network components as a covert command-and-control channel, using UDP port 31339 for peer discovery traffic. This method leverages a legitimate, Microsoft-signed software stack, providing the attackers with a credible cover identity within a trusted process tree.

Implications and Defensive Measures

While the use of bitsadmin for file downloads is not new, its combination with HTA file execution is a strategic move that helps the malware blend with typical Windows background activities. Bitsadmin, a Windows command-line tool originally intended for background file transfers, often goes unnoticed by users and endpoint security systems.

Once the HTA file is executed, it drops a package containing Cluster-Overlay64.exe, openvr_api.dll, filter.bin, and kernel-diag.lib in the ApplicationData32 folder. The actual malicious code is hidden within DLL files and encoded blobs, decrypted at runtime through a multi-layered process involving XOR operations and LZNT1 decompression. The final payload is then side-loaded into VSLauncher.exe, a legitimate Microsoft-signed Visual Studio binary, providing a trustworthy facade.

Security professionals should monitor the use of bitsadmin and mshta.exe together, especially when unusual temporary file patterns like ~tmp(…).hta are observed. Network teams are advised to watch for UDP traffic to 224.0.0.255 on port 31339, a repurposed address for command-and-control communications. Unexpected file creations in %APPDATA%ApplicationData32 or the presence of VSLauncher.exe outside a legitimate Visual Studio path warrant immediate investigation.

Indicators of Compromise (IoCs) include IP address 169.40.135.35, various HTA stage-1 payload URLs, and specific SHA-256 hashes for payload components. Defenders should remain vigilant and employ comprehensive monitoring to counteract these sophisticated tactics.

Cyber Security News Tags:bitsadmin, command-and-control, cyber attack, Cybersecurity, digital identity, HTA files, Malware, network security, payload delivery, PowerShell, social engineering, threat group, UAC-0184, Ukraine

Post navigation

Previous Post: Critical Linux Vulnerability Threatens System Security
Next Post: macOS Malware Uses Fake Google Update for Persistence

Related Posts

Critical Flaw in WordPress Plugin Risks Site Security Critical Flaw in WordPress Plugin Risks Site Security Cyber Security News
Zerobot Malware Targets Tenda Routers and n8n Platforms Zerobot Malware Targets Tenda Routers and n8n Platforms Cyber Security News
Threat Actors Weaponize Smart Contracts to Drain User Crypto Wallets of More Than 0k Threat Actors Weaponize Smart Contracts to Drain User Crypto Wallets of More Than $900k Cyber Security News
ClickFix Attack Evolves: New Tactics Bypass Detection ClickFix Attack Evolves: New Tactics Bypass Detection Cyber Security News
Countering Spear Phishing with Advanced Email Security Solutions Countering Spear Phishing with Advanced Email Security Solutions Cyber Security News
New Harrods Data Breach Exposes 430,000 Customer Personal Records New Harrods Data Breach Exposes 430,000 Customer Personal Records Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Operation Ramz: 53 Servers Seized in Major Cybercrime Bust
  • Enhance Cybersecurity with Strategic Threat Intelligence
  • Vulnerability Exploitation Tops Data Breach Methods in 2025
  • macOS Malware Uses Fake Google Update for Persistence
  • UAC-0184 Malware Utilizes Bitsadmin and HTA for Stealthy Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Operation Ramz: 53 Servers Seized in Major Cybercrime Bust
  • Enhance Cybersecurity with Strategic Threat Intelligence
  • Vulnerability Exploitation Tops Data Breach Methods in 2025
  • macOS Malware Uses Fake Google Update for Persistence
  • UAC-0184 Malware Utilizes Bitsadmin and HTA for Stealthy Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark