Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hive0156 Hackers Attacking Government and Military Organizations to Deploy Remcos RAT

Posted on July 25, 2025July 25, 2025 By CWS

A classy Russian-aligned menace actor generally known as Hive0156 has intensified its cyber espionage campaigns towards Ukrainian authorities and army organizations, deploying the infamous Remcos Distant Entry Trojan by means of rigorously crafted social engineering assaults.

The group has demonstrated outstanding persistence in focusing on Ukraine’s protection infrastructure all through 2025, using weaponized Microsoft LNK information and PowerShell scripts as major assault vectors.

The menace actor’s operations signify a major escalation in cyber warfare techniques, with attackers leveraging extremely relevant-themed decoy paperwork to entice victims inside Ukraine’s protection institution.

These malicious campaigns exploit the continued battle by incorporating themes resembling battalion readiness checks, wartime casualties, and operational employees distribution to maximise the probability of profitable infiltration.

IBM analysts recognized that Hive0156’s Instruments, Ways, and Procedures strongly overlap with CERT-UA’s UAC-0184 actor, suggesting coordinated efforts inside Russia’s cyber operations framework.

The group has advanced its focusing on technique from completely army personnel to a broader viewers, incorporating themes associated to petitions and official correspondence in current campaigns.

Latest evaluation reveals that Hive0156 has simplified its supply mechanisms whereas sustaining operational effectiveness.

The assault chain begins with weaponized first-stage LNK or PowerShell information that set up communication with command-and-control infrastructure.

Upon profitable connection, the malware retrieves each a decoy doc and a compressed archive containing malicious elements.

Subtle Multi-Stage An infection Mechanism

The group’s an infection methodology demonstrates superior technical sophistication by means of its deployment of HijackLoader, often known as IDAT Loader, which serves as the first supply mechanism for Remcos RAT.

Hive0156 assault chain (Supply – IBM)

The HijackLoader package deal accommodates 5 crucial elements working in live performance to evade detection and set up persistent entry.

The an infection begins when victims execute PortRemo.exe, a authentic signed executable that masses the malicious sqlite3.dll file.

This patched Dynamic Hyperlink Library accommodates code that initiates the HijackLoader sequence by calling the compromised sqlite3_result_text16() perform.

The malware employs export desk manipulation to hinder static evaluation instruments like IDA Professional from correctly inspecting the file construction.

sqlite3_result_text16() → Malicious perform name
↓
Decrypt first-stage shellcode
↓
Course of PNG file containing HijackLoader modules
↓
Execute remaining Remcos payload

The encrypted PNG file, randomly named in every marketing campaign, accommodates a number of HijackLoader modules together with AVDATA for safety software program detection, ESAL for payload execution, and rshell for reminiscence administration.

These modules work collectively to inject the ultimate Remcos payload right into a distant course of, establishing covert communication channels with the attackers’ command-and-control servers spanning a number of geographic places.

Hive0156 operates marketing campaign identifiers together with hmu2005, gu2005, ra2005, and ra2005new, suggesting organized operational administration.

The group maintains geofencing restrictions limiting infections to Ukrainian IP addresses whereas filtering connections primarily based on anticipated user-agent strings, demonstrating exact focusing on capabilities that maximize operational safety whereas minimizing publicity to safety researchers.

Expertise quicker, extra correct phishing detection and enhanced safety for your small business with real-time sandbox analysis-> Attempt ANY.RUN now

Cyber Security News Tags:Attacking, Deploy, Government, Hackers, Hive0156, Military, Organizations, RAT, Remcos

Post navigation

Previous Post: Rise in Phishing Activity Using Spoofed SharePoint Domains With Sneaky2FA Techniques
Next Post: US Targets North Korea’s Illicit Funds: $15M Rewards Offered as American Woman Jailed in IT Worker Scam

Related Posts

Splunk Details on How to Detect, Mitigate and Respond to CitrixBleed 2 Attack Cyber Security News
Timeliner – Windows Forensic Tool for DFIR Investigators Cyber Security News
Hackers Leverage Compromised Third-Party SonicWall SSL VPN Credentials to Deploy Sinobi Ransomware Cyber Security News
Windows Defender Enhancements for Advanced Threat Mitigation Cyber Security News
Microsoft Patches Wormable RCE Vulnerability in Windows and Windows Server Cyber Security News
1000+ Exposed N-able N-central RMM Servers Unpatched for 0-Day Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data
  • New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways
  • OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vault Viper Exploits Online Gambling Websites Using Custom Browser to Install Malicious Program
  • Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials
  • North Korean Hackers Attacking Unmanned Aerial Vehicle Industry to Steal Confidential Data
  • New Phishing Attack Bypasses Using UUIDs Unique to Bypass Secure Email Gateways
  • OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News