Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier

Posted on July 17, 2025July 17, 2025 By CWS

Final week, Ukraine’s Most important Intelligence Directorate (GUR) orchestrated a classy cyberattack in opposition to Gaskar Integration, a number one Russian drone producer.

The operation started with reconnaissance of the corporate’s public-facing infrastructure, the place menace actors recognized susceptible distant desktop providers and outdated VPN gateways.

Leveraging a zero-day in a third-party net utility firewall, the attackers gained preliminary foothold inside the company community. As soon as inside, they deployed customized malware that exploited Home windows Administration Instrumentation (WMI) to execute lateral motion and harvest credentials.

Hromadske analysts famous that the malicious payload integrated a dual-stage loader written in C++ and PowerShell.

The primary stage established persistence by way of a malicious WMI subscription, whereas the second stage decrypted a reverse-shell implant in reminiscence.

Communications had been tunneled over TLS utilizing solid certificates that mimicked the corporate’s personal public key infrastructure.

The malware’s command-and-control (C2) infrastructure was hosted on compromised industrial management system servers, additional complicating attribution and takedown efforts.

By the point defenders detected anomalous community visitors, the attackers had exfiltrated greater than 47 TB of technical knowledge, together with drone design schematics, manufacturing logs, and worker information.

All backup copies on the sufferer’s servers had been irreversibly deleted, successfully crippling Gaskar’s manufacturing and accounting operations.

Staff had been locked out of manufacturing software program and bodily entry methods, with solely fireplace exits remaining useful.

Hromadske researchers recognized key modules of the implant by reverse-engineering its unpacker.

An infection Mechanism

The malware’s an infection mechanism hinged on the exploitation of a WAF bypass. After gaining entry, the attackers uploaded a tiny dropper—lower than 15 KB—that executed a Base64-encoded PowerShell one-liner.

This script reached out to a hard-coded C2 area, downloaded an encrypted payload, and invoked it totally in reminiscence to evade disk-based detection.

The persistent WMI occasion filter was crafted as follows:-

$filter = Set-WmiInstance -Namespace rootsubscription -Class __EventFilter `
-Arguments @{
Identify = “SysUpdateFilter”
EventNameSpace = “rootcimv2”
QueryLanguage = “WQL”
Question = “SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA ‘Win32_LocalTime'”
}
Set-WmiInstance -Namespace rootsubscription -Class __FilterToConsumerBinding `
-Arguments @{
Filter = $filter
Client = $shopper
}

This ensures execution on each system clock tick, granting the implant excessive survivability even after reboot.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:Claimed, Cyberattack, Drone, Hackers, Major, Russian, Supplier, Ukraine

Post navigation

Previous Post: Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike
Next Post: How to Prevent SIM Swap Attacks

Related Posts

China and Taiwan Accuse Each Other for Cyberattacks Against Critical Infrastructure Cyber Security News
Securing IoT Devices in the Enterprise Challenges and Solutions Cyber Security News
New Rust-based InfoStealer via Fake CAPTCHA Delivers EDDIESTEALER Cyber Security News
20-Year-Old Vulnerability Allows Hackers to Control Train Brakes Cyber Security News
Massistant Chinese Mobile Forensic Tooling Gain Access to SMS Messages, Images, Audio and GPS Data Cyber Security News
251 Malicious IPs Attacking Cloud-Based Devices Leveraging 75 Exposure Points Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Prevent SIM Swap Attacks
  • Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier
  • Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike
  • Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Prevent SIM Swap Attacks
  • Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier
  • Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike
  • Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News