Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government

Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government

Posted on January 5, 2026January 5, 2026 By CWS

Jan 05, 2026Ravie LakshmananCyber Espionage / Home windows Safety
The Russia-aligned risk actor referred to as UAC-0184 has been noticed focusing on Ukrainian navy and authorities entities by leveraging the Viber messaging platform to ship malicious ZIP archives.
“This group has continued to conduct high-intensity intelligence gathering actions towards Ukrainian navy and authorities departments in 2025,” the 360 Risk Intelligence Heart stated in a technical report.
Additionally tracked as Hive0156, the hacking group is primarily recognized for leveraging war-themed lures in phishing emails to ship Hijack Loader in assaults focusing on Ukrainian entities. The malware loader subsequently acts as a pathway for Remcos RAT infections.
The risk actor was first documented by CERT-UA in early January 2024. Subsequent assault campaigns have been discovered to leverage messaging apps like Sign and Telegram as a supply automobile for malware. The newest findings from the Chinese language safety distributors level to an additional evolution of this tactic.

The assault chain entails using Viber as an preliminary intrusion vector to distribute malicious ZIP archives containing a number of Home windows shortcut (LNK) recordsdata disguised as official Microsoft Phrase and Excel paperwork to trick recipients into opening them.
The LNK recordsdata are designed to function a decoy doc to the sufferer to decrease their suspicion, whereas silently executing Hijack Loader within the background by fetching a second ZIP archive (“smoothieks.zip”) from a distant server via a PowerShell script.

The assault reconstructs and deploys Hijack Loader in reminiscence by a multi-stage course of that employs methods like DLL side-loading and module stomping to evade detection by safety instruments. The loader then scans the setting for put in safety software program, resembling these associated to Kaspersky, Avast, BitDefender, AVG, Emsisoft, Webroot, and Microsoft, by calculating the CRC32 hash of the corresponding program.
Apart from establishing persistence via scheduled duties, the loader takes steps to subvert static signature detection earlier than covertly executing Remcos RAT by injecting it into “chime.exe.” The distant administration device grants the attackers the flexibility to handle the endpoint, execute payloads, monitor actions, and steal information.
“Though marketed as reliable system administration software program, its highly effective intrusive capabilities make it incessantly utilized by numerous malicious attackers for cyber espionage and information theft actions,” the 360 Risk Intelligence Heart stated. “Via the graphical person interface (GUI) management panel offered by Remcos, attackers can carry out batch automated administration or exact guide interactive operations on the sufferer’s host.”

The Hacker News Tags:Abuse, Government, Hackers, Military, RussiaAligned, Target, Ukrainian, Viber

Post navigation

Previous Post: Cyberattack Unlikely in Communications Failure That Grounded Flights in Greece
Next Post: Critical AdonisJS Bodyparser Flaw (CVSS 9.2) Enables Arbitrary File Write on Servers

Related Posts

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing 0K Crypto Transfers and M+ Profits U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits The Hacker News
Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads Phishing Campaign Uses UpCrypter in Fake Voicemail Emails to Deliver RAT Payloads The Hacker News
CloudZ Malware Exploits Phone Link for Credential Theft CloudZ Malware Exploits Phone Link for Credential Theft The Hacker News
An Anti-Sales Guide for MSPs An Anti-Sales Guide for MSPs The Hacker News
Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution Critical vm2 Node.js Flaw Allows Sandbox Escape and Arbitrary Code Execution The Hacker News
Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations
  • Fragnesia Vulnerability Risks Root Access on Linux Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark