Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
AI Becomes Russia’s New Cyber Weapon in War on Ukraine

AI Becomes Russia’s New Cyber Weapon in War on Ukraine

Posted on October 9, 2025October 9, 2025 By CWS

Oct 09, 2025Ravie LakshmananArtificial Intelligence / Malware
Russian hackers’ adoption of synthetic intelligence (AI) in cyber assaults towards Ukraine has reached a brand new stage within the first half of 2025 (H1 2025), the nation’s State Service for Particular Communications and Data Safety (SSSCIP) mentioned.
“Hackers now make use of it not solely to generate phishing messages, however a few of the malware samples we have now analyzed present clear indicators of being generated with AI – and attackers are actually not going to cease there,” the company mentioned in a report revealed Wednesday.
SSSCIP mentioned 3,018 cyber incidents had been recorded through the time interval, up from 2,575 within the second half of 2024 (H2 2024). Native authorities and navy entities witnessed a rise in assaults in comparison with H2 2024, whereas these concentrating on authorities and power sectors declined.
One notable assault noticed concerned UAC-0219’s use of malware known as WRECKSTEEL in assaults geared toward state administration our bodies and significant infrastructure amenities within the nation. There’s proof to counsel that the PowerShell data-stealing malware was developed utilizing AI instruments.

Among the different campaigns registered towards Ukraine are listed beneath –

Phishing campaigns orchestrated by UAC-0218 concentrating on protection forces to ship HOMESTEEL utilizing booby-trapped RAR archives
Phishing campaigns orchestrated by UAC-0226 concentrating on organizations concerned within the improvement of improvements within the protection industrial sector, native authorities our bodies, navy items, and legislation enforcement businesses to distribute a stealer known as GIFTEDCROOK
Phishing campaigns orchestrated by UAC-0227 concentrating on native authorities, essential infrastructure amenities, and Territorial Recruitment and Social Help Facilities (TRCs and SSCs) that leverage ClickFix-style ways or SVG file attachments to distribute stealers like Amatera Stealer and Strela Stealer
Phishing campaigns orchestrated by UAC-0125, a sub-cluster with ties to Sandworm, that despatched e mail messages containing hyperlinks to a web site masquerading as ESET to ship a C#-based backdoor named Kalambur (aka SUMBUR) below the guise of a risk removing program

SSSCIP mentioned it additionally noticed the Russia-linked APT28 (aka UAC-0001) actors weaponizing cross-site scripting flaws in Roundcube and (CVE-2023-43770, CVE-2024-37383, and CVE-2025-49113) and Zimbra (CVE-2024-27443 and CVE-2025-27915) webmail software program to conduct zero-click assaults.
“When exploiting such vulnerabilities, attackers sometimes injected malicious code that, by means of the Roundcube or Zimbra API, gained entry to credentials, contact lists, and configured filters to ahead all emails to attacker-controlled mailboxes,” SSSCIP mentioned.

“One other methodology of stealing credentials utilizing these vulnerabilities was to create hidden HTML blocks (visibility: hidden) with login and password enter fields, the place the attribute autocomplete=”on” was set. This allowed the fields to be auto-filled with information saved within the browser, which was then exfiltrated.”
The company additionally revealed that Russia continues to interact in hybrid warfare, synchronizing its cyber operations together with kinetic assaults on the battlefield, with the Sandworm (UAC-0002) group concentrating on organizations within the power, protection, web service suppliers, and analysis sectors.
Moreover, a number of risk teams concentrating on Ukraine have resorted to abusing reliable providers, similar to Dropbox, Google Drive, OneDrive, Bitbucket, Cloudflare Employees, Telegram, Telegra.ph, Teletype.in, Firebase, ipfs.io, mocky.io, to host malware or phishing pages, or flip them into an information exfiltration channel.
“Using reliable on-line assets for malicious functions shouldn’t be a brand new tactic,” SSSCIP mentioned. “Nevertheless, the variety of such platforms exploited by Russian hackers has been steadily rising in current occasions.”

The Hacker News Tags:Cyber, Russias, Ukraine, War, Weapon

Post navigation

Previous Post: All SonicWall Cloud Backup Users Had Firewall Configurations Stolen
Next Post: Chinese Hackers Breached Law Firm Williams & Connolly via Zero-Day

Related Posts

Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot The Hacker News
CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog CISA Flags Actively Exploited GeoServer XXE Flaw in Updated KEV Catalog The Hacker News
Why Early Threat Detection Is a Must for Long-Term Business Growth Why Early Threat Detection Is a Must for Long-Term Business Growth The Hacker News
GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads The Hacker News
Scattered Spider Resurfaces With Financial Sector Attacks Despite Retirement Claims Scattered Spider Resurfaces With Financial Sector Attacks Despite Retirement Claims The Hacker News
Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News