Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Phishing Campaign Impersonates CERT-UA to Spread Malware

Phishing Campaign Impersonates CERT-UA to Spread Malware

Posted on April 1, 2026 By CWS

The Computer Emergency Response Team of Ukraine (CERT-UA) has unveiled details about a recent phishing scheme that involved impersonating the agency to distribute a remote administration tool called AGEWHEEZE. The fraudulent campaign, identified as UAC-0255, involved threat actors sending deceptive emails on March 26 and 27, 2026. These emails masqueraded as communications from CERT-UA, urging recipients to download a supposed ‘specialized software’ from a ZIP archive hosted on Files.fm.

Targeted Organizations and Tactics

The phishing effort aimed at a diverse set of targets, including governmental bodies, healthcare facilities, security firms, educational entities, financial institutions, and software development companies. The emails, some originating from the address ‘incidents@cert-ua[.]tech,’ contained a ZIP file named ‘CERT_UA_protection_tool.zip.’ This file was crafted to deploy malware disguised as security software from the agency. CERT-UA identified the malware as a remote access trojan dubbed AGEWHEEZE.

Technical Details of AGEWHEEZE

AGEWHEEZE, built using the Go programming language, interacts with an external server through WebSockets, allowing for a variety of operations. These include executing commands, handling file operations, manipulating the clipboard, emulating mouse and keyboard input, capturing screenshots, and managing processes and services. The malware achieves persistence by creating scheduled tasks, altering the Windows Registry, or adding itself to the Startup directory.

Impact and Attribution

Despite the campaign’s ambitious reach, the impact was relatively limited. CERT-UA reported that only a small number of personal devices, particularly those belonging to employees in educational institutions, were affected. The agency’s experts provided both methodological and practical support to the victims. Investigations into the counterfeit website ‘cert-ua[.]tech’ suggest it was likely created using artificial intelligence tools, with a comment in the HTML code reading, ‘With Love, CYBER SERP.’

Cyber Serp, a group claiming to be cyber-underground operatives from Ukraine, has taken responsibility for the campaign. They asserted that phishing emails reached one million ukr[.]net mailboxes, compromising over 200,000 devices. Cyber Serp insists that their actions do not harm ordinary Ukrainian citizens. In previous claims, the group also alleged breaching the Ukrainian cybersecurity firm Cipher, acquiring server dumps, client databases, and source codes for CIPS products.

In response, Cipher acknowledged a security incident involving compromised employee credentials but assured that its infrastructure remained intact. The breach was limited to a single project that did not contain sensitive information, according to the company’s statement.

The Hacker News Tags:AGEWHEEZE, artificial intelligence, CERT-UA, Cyber Serp, Cybersecurity, email security, Malware, Phishing, remote access trojan, Ukraine

Post navigation

Previous Post: Magecart Hackers Exploit 100 Domains to Steal Card Data
Next Post: FBI Alert on Security Risks from Chinese Mobile Apps

Related Posts

Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice The Hacker News
New ClickFix Variant Exploits Network Drives New ClickFix Variant Exploits Network Drives The Hacker News
Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts Experts Find AI Browsers Can Be Tricked by PromptFix Exploit to Run Malicious Hidden Prompts The Hacker News
Microsoft Alerts on WhatsApp Malware Using UAC Bypass Microsoft Alerts on WhatsApp Malware Using UAC Bypass The Hacker News
Trivy Security Breach: 75 Tags Compromised in GitHub Actions Trivy Security Breach: 75 Tags Compromised in GitHub Actions The Hacker News
Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day Scanning Activity on Palo Alto Networks Portals Jump 500% in One Day The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Agentic AI Tackles Identity Security Gaps
  • EtherRAT Malware Hides Using Ethereum Blockchain
  • FBI Alert on Security Risks from Chinese Mobile Apps
  • Phishing Campaign Impersonates CERT-UA to Spread Malware
  • Magecart Hackers Exploit 100 Domains to Steal Card Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Agentic AI Tackles Identity Security Gaps
  • EtherRAT Malware Hides Using Ethereum Blockchain
  • FBI Alert on Security Risks from Chinese Mobile Apps
  • Phishing Campaign Impersonates CERT-UA to Spread Malware
  • Magecart Hackers Exploit 100 Domains to Steal Card Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark