Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hive0156 Hackers Attacking Government and Military Organizations to Deploy Remcos RAT

Hive0156 Hackers Attacking Government and Military Organizations to Deploy Remcos RAT

Posted on July 25, 2025July 25, 2025 By CWS

A classy Russian-aligned menace actor generally known as Hive0156 has intensified its cyber espionage campaigns towards Ukrainian authorities and army organizations, deploying the infamous Remcos Distant Entry Trojan by means of rigorously crafted social engineering assaults.

The group has demonstrated outstanding persistence in focusing on Ukraine’s protection infrastructure all through 2025, using weaponized Microsoft LNK information and PowerShell scripts as major assault vectors.

The menace actor’s operations signify a major escalation in cyber warfare techniques, with attackers leveraging extremely relevant-themed decoy paperwork to entice victims inside Ukraine’s protection institution.

These malicious campaigns exploit the continued battle by incorporating themes resembling battalion readiness checks, wartime casualties, and operational employees distribution to maximise the probability of profitable infiltration.

IBM analysts recognized that Hive0156’s Instruments, Ways, and Procedures strongly overlap with CERT-UA’s UAC-0184 actor, suggesting coordinated efforts inside Russia’s cyber operations framework.

The group has advanced its focusing on technique from completely army personnel to a broader viewers, incorporating themes associated to petitions and official correspondence in current campaigns.

Latest evaluation reveals that Hive0156 has simplified its supply mechanisms whereas sustaining operational effectiveness.

The assault chain begins with weaponized first-stage LNK or PowerShell information that set up communication with command-and-control infrastructure.

Upon profitable connection, the malware retrieves each a decoy doc and a compressed archive containing malicious elements.

Subtle Multi-Stage An infection Mechanism

The group’s an infection methodology demonstrates superior technical sophistication by means of its deployment of HijackLoader, often known as IDAT Loader, which serves as the first supply mechanism for Remcos RAT.

Hive0156 assault chain (Supply – IBM)

The HijackLoader package deal accommodates 5 crucial elements working in live performance to evade detection and set up persistent entry.

The an infection begins when victims execute PortRemo.exe, a authentic signed executable that masses the malicious sqlite3.dll file.

This patched Dynamic Hyperlink Library accommodates code that initiates the HijackLoader sequence by calling the compromised sqlite3_result_text16() perform.

The malware employs export desk manipulation to hinder static evaluation instruments like IDA Professional from correctly inspecting the file construction.

sqlite3_result_text16() → Malicious perform name
↓
Decrypt first-stage shellcode
↓
Course of PNG file containing HijackLoader modules
↓
Execute remaining Remcos payload

The encrypted PNG file, randomly named in every marketing campaign, accommodates a number of HijackLoader modules together with AVDATA for safety software program detection, ESAL for payload execution, and rshell for reminiscence administration.

These modules work collectively to inject the ultimate Remcos payload right into a distant course of, establishing covert communication channels with the attackers’ command-and-control servers spanning a number of geographic places.

Hive0156 operates marketing campaign identifiers together with hmu2005, gu2005, ra2005, and ra2005new, suggesting organized operational administration.

The group maintains geofencing restrictions limiting infections to Ukrainian IP addresses whereas filtering connections primarily based on anticipated user-agent strings, demonstrating exact focusing on capabilities that maximize operational safety whereas minimizing publicity to safety researchers.

Expertise quicker, extra correct phishing detection and enhanced safety for your small business with real-time sandbox analysis-> Attempt ANY.RUN now

Cyber Security News Tags:Attacking, Deploy, Government, Hackers, Hive0156, Military, Organizations, RAT, Remcos

Post navigation

Previous Post: Rise in Phishing Activity Using Spoofed SharePoint Domains With Sneaky2FA Techniques
Next Post: US Targets North Korea’s Illicit Funds: $15M Rewards Offered as American Woman Jailed in IT Worker Scam

Related Posts

Elephant APT Group Attacking Defense Industry Leveraging VLC Player, and Encrypted Shellcode Elephant APT Group Attacking Defense Industry Leveraging VLC Player, and Encrypted Shellcode Cyber Security News
How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses How ClickFix and Multi-Stage Frameworks Are Breaking Enterprise Defenses Cyber Security News
Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams Cyber Security News
Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data Intel Websites Exploited to Hack Every Intel Employee and View Confidential Data Cyber Security News
Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code Samsung Zero-Day Vulnerability Actively Exploited to Execute Remote Code Cyber Security News
English-Speaking Cybercriminal Ecosystem ‘The COM’ Drives a Wide Spectrum of Cyberattacks English-Speaking Cybercriminal Ecosystem ‘The COM’ Drives a Wide Spectrum of Cyberattacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files
  • Browser Extensions Pose AI Data Theft Risk
  • Citrix NetScaler Vulnerability Exploited Within Days
  • India to Prohibit Chinese CCTV Sales by 2026

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark