Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Ukraine Hackers Attacking Russian Aerospace Companies and Other Defence-Related Sectors

Ukraine Hackers Attacking Russian Aerospace Companies and Other Defence-Related Sectors

Posted on December 2, 2025December 2, 2025 By CWS

Ukraine-linked hackers are stepping up cyberattacks in opposition to Russian aerospace and wider defence-related firms, utilizing new customized malware to steal designs, schedules, and inside emails.

The marketing campaign targets each prime contractors and smaller suppliers, aiming to map manufacturing chains and expose weak factors in Russia’s warfare trade. The instruments used on this marketing campaign are easy, however they’re used with care and good planning.

Defaced homepage of KrasAvia’s web site (Supply – Intrinsec)

The malware first appeared in late 2024 in spear-phishing waves despatched to engineers and mission managers engaged on avionics, steering methods, and satellite tv for pc hyperlinks.

Lures used pretend job presents, convention invitations, and contract updates, with hooked up paperwork that exploited outdated workplace software program on Home windows hosts. As soon as opened, the file quietly dropped a small loader that set the stage for the principle payload.

Intrinsec safety analysts recognized the malware after seeing repeated outbound site visitors from a defence integrator’s distant workplace to uncommon command servers hosted on bulletproof infrastructure.

Their full technical breakdown reveals that the attackers fastidiously tuned every payload to the sufferer’s function, including customized modules for e mail scraping, doc theft, and credential seize.

Content material of the e-mail (left), and the phishing web page (proper) (Supply – Intrinsec)

The operation hits analysis labs, testing ranges, and logistics corporations that help plane, drones, and missile methods. Stolen knowledge can reveal elements shortages, supply delays, and software program bugs, giving Ukrainian planners a clearer view of Russian fight readiness.

An infection chain and command execution

The an infection chain is easy however good. The primary loader, typically a small DLL, runs in reminiscence solely and pulls a second-stage script from a hard-coded URL.

That script injects the ultimate payload right into a trusted course of resembling explorer.exe, which helps it mix with regular consumer exercise.

Intrinsec researchers famous that the payload makes use of a compact command loop to remain versatile. A typical routine, as seen in reminiscence dumps, appears to be like like this:-

whereas (related) {
cmd = recv();
if (cmd == “exfil”) run_exfil();
if (cmd == “shell”) open_shell();
}

This straightforward logic lets the operator change between silent knowledge theft and hands-on keyboard management. Every stage is constructed to maintain noise low on the host.

Regardless of its clear design, the malware avoids noisy persistence methods, as a substitute counting on scheduled duties and hijacked replace instruments to return after reboots whereas staying arduous to identify.

Comply with us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Aerospace, Attacking, Companies, DefenceRelated, Hackers, Russian, Sectors, Ukraine

Post navigation

Previous Post: Hackers Leverage Evilginx to Undermine MFA Security Mimicking Legitimate SSO Sites
Next Post: Nisos Details Earlier Signs of Insider Detection via Authentication and Access Controls

Related Posts

Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations Hackers Exploiting Windows Server Update Services Vulnerability to Steal Sensitive Data from Organizations Cyber Security News
TP-Link Router Zero-Day RCE Vulnerability Exploited Bypassing ASLR Protections TP-Link Router Zero-Day RCE Vulnerability Exploited Bypassing ASLR Protections Cyber Security News
SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations SCADA Vulnerability Triggers DoS, Potentially Disrupting Industrial Operations Cyber Security News
New ShadowCaptcha Attack Exploiting Hundreds of WordPress Sites to Tricks Victims into Executing Malicious Commands New ShadowCaptcha Attack Exploiting Hundreds of WordPress Sites to Tricks Victims into Executing Malicious Commands Cyber Security News
Lightship Security and OpenSSL Submit Version 3.5.4 for FIPS 140-3 Validation Lightship Security and OpenSSL Submit Version 3.5.4 for FIPS 140-3 Validation Cyber Security News
Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks Microsoft Office Zero-day Vulnerability Actively Exploited in Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News