Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

AI Becomes Russia’s New Cyber Weapon in War on Ukraine

Posted on October 9, 2025October 9, 2025 By CWS

Oct 09, 2025Ravie LakshmananArtificial Intelligence / Malware
Russian hackers’ adoption of synthetic intelligence (AI) in cyber assaults towards Ukraine has reached a brand new stage within the first half of 2025 (H1 2025), the nation’s State Service for Particular Communications and Data Safety (SSSCIP) mentioned.
“Hackers now make use of it not solely to generate phishing messages, however a few of the malware samples we have now analyzed present clear indicators of being generated with AI – and attackers are actually not going to cease there,” the company mentioned in a report revealed Wednesday.
SSSCIP mentioned 3,018 cyber incidents had been recorded through the time interval, up from 2,575 within the second half of 2024 (H2 2024). Native authorities and navy entities witnessed a rise in assaults in comparison with H2 2024, whereas these concentrating on authorities and power sectors declined.
One notable assault noticed concerned UAC-0219’s use of malware known as WRECKSTEEL in assaults geared toward state administration our bodies and significant infrastructure amenities within the nation. There’s proof to counsel that the PowerShell data-stealing malware was developed utilizing AI instruments.

Among the different campaigns registered towards Ukraine are listed beneath –

Phishing campaigns orchestrated by UAC-0218 concentrating on protection forces to ship HOMESTEEL utilizing booby-trapped RAR archives
Phishing campaigns orchestrated by UAC-0226 concentrating on organizations concerned within the improvement of improvements within the protection industrial sector, native authorities our bodies, navy items, and legislation enforcement businesses to distribute a stealer known as GIFTEDCROOK
Phishing campaigns orchestrated by UAC-0227 concentrating on native authorities, essential infrastructure amenities, and Territorial Recruitment and Social Help Facilities (TRCs and SSCs) that leverage ClickFix-style ways or SVG file attachments to distribute stealers like Amatera Stealer and Strela Stealer
Phishing campaigns orchestrated by UAC-0125, a sub-cluster with ties to Sandworm, that despatched e mail messages containing hyperlinks to a web site masquerading as ESET to ship a C#-based backdoor named Kalambur (aka SUMBUR) below the guise of a risk removing program

SSSCIP mentioned it additionally noticed the Russia-linked APT28 (aka UAC-0001) actors weaponizing cross-site scripting flaws in Roundcube and (CVE-2023-43770, CVE-2024-37383, and CVE-2025-49113) and Zimbra (CVE-2024-27443 and CVE-2025-27915) webmail software program to conduct zero-click assaults.
“When exploiting such vulnerabilities, attackers sometimes injected malicious code that, by means of the Roundcube or Zimbra API, gained entry to credentials, contact lists, and configured filters to ahead all emails to attacker-controlled mailboxes,” SSSCIP mentioned.

“One other methodology of stealing credentials utilizing these vulnerabilities was to create hidden HTML blocks (visibility: hidden) with login and password enter fields, the place the attribute autocomplete=”on” was set. This allowed the fields to be auto-filled with information saved within the browser, which was then exfiltrated.”
The company additionally revealed that Russia continues to interact in hybrid warfare, synchronizing its cyber operations together with kinetic assaults on the battlefield, with the Sandworm (UAC-0002) group concentrating on organizations within the power, protection, web service suppliers, and analysis sectors.
Moreover, a number of risk teams concentrating on Ukraine have resorted to abusing reliable providers, similar to Dropbox, Google Drive, OneDrive, Bitbucket, Cloudflare Employees, Telegram, Telegra.ph, Teletype.in, Firebase, ipfs.io, mocky.io, to host malware or phishing pages, or flip them into an information exfiltration channel.
“Using reliable on-line assets for malicious functions shouldn’t be a brand new tactic,” SSSCIP mentioned. “Nevertheless, the variety of such platforms exploited by Russian hackers has been steadily rising in current occasions.”

The Hacker News Tags:Cyber, Russias, Ukraine, War, Weapon

Post navigation

Previous Post: All SonicWall Cloud Backup Users Had Firewall Configurations Stolen
Next Post: Chinese Hackers Breached Law Firm Williams & Connolly via Zero-Day

Related Posts

SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others The Hacker News
Anthropic Disrupts AI-Powered Cyberattacks Automating Theft and Extortion Across Critical Sectors The Hacker News
Hackers Exploit Critical CrushFTP Flaw to Gain Admin Access on Unpatched Servers The Hacker News
A Pragmatic Approach To NHI Inventories  The Hacker News
Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution The Hacker News
Anubis Ransomware Encrypts and Wipes Files, Making Recovery Impossible Even After Payment The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks
  • Hackers Exploit DFIR Tool Velociraptor In Ransomware Attacks
  • Microsoft Azure Faces Global Outage Affecting Services Worldwide
  • New Hacker Alliance Trinity of Chaos Leaked 39 Companies Data Including Google, CISCO and Others
  • Realm.Security Raises $15 Million in Series A Funding

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks
  • Hackers Exploit DFIR Tool Velociraptor In Ransomware Attacks
  • Microsoft Azure Faces Global Outage Affecting Services Worldwide
  • New Hacker Alliance Trinity of Chaos Leaked 39 Companies Data Including Google, CISCO and Others
  • Realm.Security Raises $15 Million in Series A Funding

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News