Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hive0156 Hackers Attacking Government and Military Organizations to Deploy Remcos RAT

Posted on July 25, 2025July 25, 2025 By CWS

A classy Russian-aligned menace actor generally known as Hive0156 has intensified its cyber espionage campaigns towards Ukrainian authorities and army organizations, deploying the infamous Remcos Distant Entry Trojan by means of rigorously crafted social engineering assaults.

The group has demonstrated outstanding persistence in focusing on Ukraine’s protection infrastructure all through 2025, using weaponized Microsoft LNK information and PowerShell scripts as major assault vectors.

The menace actor’s operations signify a major escalation in cyber warfare techniques, with attackers leveraging extremely relevant-themed decoy paperwork to entice victims inside Ukraine’s protection institution.

These malicious campaigns exploit the continued battle by incorporating themes resembling battalion readiness checks, wartime casualties, and operational employees distribution to maximise the probability of profitable infiltration.

IBM analysts recognized that Hive0156’s Instruments, Ways, and Procedures strongly overlap with CERT-UA’s UAC-0184 actor, suggesting coordinated efforts inside Russia’s cyber operations framework.

The group has advanced its focusing on technique from completely army personnel to a broader viewers, incorporating themes associated to petitions and official correspondence in current campaigns.

Latest evaluation reveals that Hive0156 has simplified its supply mechanisms whereas sustaining operational effectiveness.

The assault chain begins with weaponized first-stage LNK or PowerShell information that set up communication with command-and-control infrastructure.

Upon profitable connection, the malware retrieves each a decoy doc and a compressed archive containing malicious elements.

Subtle Multi-Stage An infection Mechanism

The group’s an infection methodology demonstrates superior technical sophistication by means of its deployment of HijackLoader, often known as IDAT Loader, which serves as the first supply mechanism for Remcos RAT.

Hive0156 assault chain (Supply – IBM)

The HijackLoader package deal accommodates 5 crucial elements working in live performance to evade detection and set up persistent entry.

The an infection begins when victims execute PortRemo.exe, a authentic signed executable that masses the malicious sqlite3.dll file.

This patched Dynamic Hyperlink Library accommodates code that initiates the HijackLoader sequence by calling the compromised sqlite3_result_text16() perform.

The malware employs export desk manipulation to hinder static evaluation instruments like IDA Professional from correctly inspecting the file construction.

sqlite3_result_text16() → Malicious perform name
↓
Decrypt first-stage shellcode
↓
Course of PNG file containing HijackLoader modules
↓
Execute remaining Remcos payload

The encrypted PNG file, randomly named in every marketing campaign, accommodates a number of HijackLoader modules together with AVDATA for safety software program detection, ESAL for payload execution, and rshell for reminiscence administration.

These modules work collectively to inject the ultimate Remcos payload right into a distant course of, establishing covert communication channels with the attackers’ command-and-control servers spanning a number of geographic places.

Hive0156 operates marketing campaign identifiers together with hmu2005, gu2005, ra2005, and ra2005new, suggesting organized operational administration.

The group maintains geofencing restrictions limiting infections to Ukrainian IP addresses whereas filtering connections primarily based on anticipated user-agent strings, demonstrating exact focusing on capabilities that maximize operational safety whereas minimizing publicity to safety researchers.

Expertise quicker, extra correct phishing detection and enhanced safety for your small business with real-time sandbox analysis-> Attempt ANY.RUN now

Cyber Security News Tags:Attacking, Deploy, Government, Hackers, Hive0156, Military, Organizations, RAT, Remcos

Post navigation

Previous Post: Rise in Phishing Activity Using Spoofed SharePoint Domains With Sneaky2FA Techniques
Next Post: US Targets North Korea’s Illicit Funds: $15M Rewards Offered as American Woman Jailed in IT Worker Scam

Related Posts

Microsoft Defender for Office 365 New Dashboard to Provide More Details Across a Range of Threat Vectors Cyber Security News
New Veeam Themed Phishing Attack Using Weaponized Wav File to Attack users Cyber Security News
Surveillance Company Using SS7 Bypass Attack to Track the User’s Location Information Cyber Security News
Beware! Fake AI Video Generation Platforms Drop Stealer Malware on Your Computers Cyber Security News
Qualcomm Adreno GPU 0-Day Vulnerabilities Exploited to Attack Android Users Cyber Security News
Hackers Exploiting Java Debug Wire Protocol Servers in Wild to Deploy Cryptomining Payload Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 15 Best Docker Monitoring Tools in 2025
  • 20 Best SNMP Monitoring Tools in 2025
  • Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware
  • Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities
  • VOIP-Based Botnet Attacking Routers Configured With Default Password

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 15 Best Docker Monitoring Tools in 2025
  • 20 Best SNMP Monitoring Tools in 2025
  • Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware
  • Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities
  • VOIP-Based Botnet Attacking Routers Configured With Default Password

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News