Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier

Posted on July 17, 2025July 17, 2025 By CWS

Final week, Ukraine’s Most important Intelligence Directorate (GUR) orchestrated a classy cyberattack in opposition to Gaskar Integration, a number one Russian drone producer.

The operation started with reconnaissance of the corporate’s public-facing infrastructure, the place menace actors recognized susceptible distant desktop providers and outdated VPN gateways.

Leveraging a zero-day in a third-party net utility firewall, the attackers gained preliminary foothold inside the company community. As soon as inside, they deployed customized malware that exploited Home windows Administration Instrumentation (WMI) to execute lateral motion and harvest credentials.

Hromadske analysts famous that the malicious payload integrated a dual-stage loader written in C++ and PowerShell.

The primary stage established persistence by way of a malicious WMI subscription, whereas the second stage decrypted a reverse-shell implant in reminiscence.

Communications had been tunneled over TLS utilizing solid certificates that mimicked the corporate’s personal public key infrastructure.

The malware’s command-and-control (C2) infrastructure was hosted on compromised industrial management system servers, additional complicating attribution and takedown efforts.

By the point defenders detected anomalous community visitors, the attackers had exfiltrated greater than 47 TB of technical knowledge, together with drone design schematics, manufacturing logs, and worker information.

All backup copies on the sufferer’s servers had been irreversibly deleted, successfully crippling Gaskar’s manufacturing and accounting operations.

Staff had been locked out of manufacturing software program and bodily entry methods, with solely fireplace exits remaining useful.

Hromadske researchers recognized key modules of the implant by reverse-engineering its unpacker.

An infection Mechanism

The malware’s an infection mechanism hinged on the exploitation of a WAF bypass. After gaining entry, the attackers uploaded a tiny dropper—lower than 15 KB—that executed a Base64-encoded PowerShell one-liner.

This script reached out to a hard-coded C2 area, downloaded an encrypted payload, and invoked it totally in reminiscence to evade disk-based detection.

The persistent WMI occasion filter was crafted as follows:-

$filter = Set-WmiInstance -Namespace rootsubscription -Class __EventFilter `
-Arguments @{
Identify = “SysUpdateFilter”
EventNameSpace = “rootcimv2”
QueryLanguage = “WQL”
Question = “SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA ‘Win32_LocalTime'”
}
Set-WmiInstance -Namespace rootsubscription -Class __FilterToConsumerBinding `
-Arguments @{
Filter = $filter
Client = $shopper
}

This ensures execution on each system clock tick, granting the implant excessive survivability even after reboot.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:Claimed, Cyberattack, Drone, Hackers, Major, Russian, Supplier, Ukraine

Post navigation

Previous Post: Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike
Next Post: How to Prevent SIM Swap Attacks

Related Posts

Scattered LAPSUS$ Hunters 4.0 Announced That Their Going Dark Permanently Cyber Security News
Teaching Claude to Cheat Reward Hacking Coding Tasks Makes Them Behave Maliciously in Other Tasks Cyber Security News
Weak Password Let Ransomware Gang Destroy 158-Year-Old Company Cyber Security News
Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure Cyber Security News
224 Malicious Android Apps on Google Play With 38 Million Downloads Delivering Malicious Payloads Cyber Security News
Hackers Accessed Email Account Contains Valid Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Chrome 144 Update Patches High-Severity V8 Vulnerability
  • LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords
  • CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution
  • CISA Releases BRICKSTORM Malware Report with New YARA Rules for VMware vSphere
  • EU Plans Phase Out of High Risk Telecom Suppliers, in Proposals Seen as Targeting China

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Chrome 144 Update Patches High-Severity V8 Vulnerability
  • LastPass Warns of Fake Maintenance Messages Targeting Users’ Master Passwords
  • CERT/CC Warns binary-parser Bug Allows Node.js Privilege-Level Code Execution
  • CISA Releases BRICKSTORM Malware Report with New YARA Rules for VMware vSphere
  • EU Plans Phase Out of High Risk Telecom Suppliers, in Proposals Seen as Targeting China

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark