Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier

Posted on July 17, 2025July 17, 2025 By CWS

Final week, Ukraine’s Most important Intelligence Directorate (GUR) orchestrated a classy cyberattack in opposition to Gaskar Integration, a number one Russian drone producer.

The operation started with reconnaissance of the corporate’s public-facing infrastructure, the place menace actors recognized susceptible distant desktop providers and outdated VPN gateways.

Leveraging a zero-day in a third-party net utility firewall, the attackers gained preliminary foothold inside the company community. As soon as inside, they deployed customized malware that exploited Home windows Administration Instrumentation (WMI) to execute lateral motion and harvest credentials.

Hromadske analysts famous that the malicious payload integrated a dual-stage loader written in C++ and PowerShell.

The primary stage established persistence by way of a malicious WMI subscription, whereas the second stage decrypted a reverse-shell implant in reminiscence.

Communications had been tunneled over TLS utilizing solid certificates that mimicked the corporate’s personal public key infrastructure.

The malware’s command-and-control (C2) infrastructure was hosted on compromised industrial management system servers, additional complicating attribution and takedown efforts.

By the point defenders detected anomalous community visitors, the attackers had exfiltrated greater than 47 TB of technical knowledge, together with drone design schematics, manufacturing logs, and worker information.

All backup copies on the sufferer’s servers had been irreversibly deleted, successfully crippling Gaskar’s manufacturing and accounting operations.

Staff had been locked out of manufacturing software program and bodily entry methods, with solely fireplace exits remaining useful.

Hromadske researchers recognized key modules of the implant by reverse-engineering its unpacker.

An infection Mechanism

The malware’s an infection mechanism hinged on the exploitation of a WAF bypass. After gaining entry, the attackers uploaded a tiny dropper—lower than 15 KB—that executed a Base64-encoded PowerShell one-liner.

This script reached out to a hard-coded C2 area, downloaded an encrypted payload, and invoked it totally in reminiscence to evade disk-based detection.

The persistent WMI occasion filter was crafted as follows:-

$filter = Set-WmiInstance -Namespace rootsubscription -Class __EventFilter `
-Arguments @{
Identify = “SysUpdateFilter”
EventNameSpace = “rootcimv2”
QueryLanguage = “WQL”
Question = “SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance ISA ‘Win32_LocalTime'”
}
Set-WmiInstance -Namespace rootsubscription -Class __FilterToConsumerBinding `
-Arguments @{
Filter = $filter
Client = $shopper
}

This ensures execution on each system clock tick, granting the implant excessive survivability even after reboot.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now

Cyber Security News Tags:Claimed, Cyberattack, Drone, Hackers, Major, Russian, Supplier, Ukraine

Post navigation

Previous Post: Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike
Next Post: How to Prevent SIM Swap Attacks

Related Posts

Chinese Hackers Actively Exploiting SharePoint Servers 0-Day Vulnerability in the Wild Cyber Security News
Critical SOQL Injection 0-Day Vulnerability in Salesforce Affects Millions Worldwide Cyber Security News
Threat Actors Leverage GenAI Platforms to Create Realistic Phishing Content Cyber Security News
Lighthouse Studio RCE Vulnerability Let Attackers Gain Access to Hosting Servers Cyber Security News
New Wave of Crypto-Hijacking Infects 3,500+ Websites Cyber Security News
Researchers Detailed New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use Browser Extensions Safely
  • Chess.com Data Breach – Hackers Breached External Systems and Gained Internal Access
  • Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries
  • GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module
  • Tycoon Phishing Kit Employs New Technique to Hide Malicious Links

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use Browser Extensions Safely
  • Chess.com Data Breach – Hackers Breached External Systems and Gained Internal Access
  • Russian APT28 Deploys “NotDoor” Outlook Backdoor Against Companies in NATO Countries
  • GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module
  • Tycoon Phishing Kit Employs New Technique to Hide Malicious Links

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News