🚨Threat Campaign Alert - UAC-0099 Targets Ukrainian Government with Espionage Campaign Using WinRAR Exploit (CVE-2023-38831) and LONEPAGE Malware🚨
Summary: The UAC-0099 threat group has targeted Ukrainian government organizations with phishing emails exploiting WinRAR vulnerability (CVE-2023-38831) and deploying LONEPAGE malware for espionage. Attackers adapted their tactics, using encrypted files and .NET programs to execute PowerShell payloads.
Threat Actor/Threat Group: UAC-0099
Malware: LONEPAGE
Targeted Countries: Ukraine
Targeted Industries: Government,forestry, forensic examination institutions, factories
Targeted Applications/CVE: WinRAR vulnerability CVE-2023-38831
Impact: Espionage, data breach, device compromise
IOC:
Ip Addr and Domain
45[.]61.157.118,
newyorktlimes[.]life,
webappapiservice[.]life,
160[.]119.251.83,
172[.]86.117.53,
captcha-challenge[.]com,
URL's
hXXps://captcha-challenge[.]com/message/getsecretnumber,
hXXps://captcha-challenge[.]com/message/[0-9]{20}/message[0-9]+/,
hXXps://captcha-challenge[.]com/message/message[0-9]+,
hXXps://newyorktlimes[.]life/api/values/uid,
SHA-256
6161be2016a1fd8096b6b43544eb5df97cd3fa73a820b5e0a44618389897d733,
16f809cd9fb1a06f07bb947ea8b6a27f66cfca0947e29666c34ae7b35b6e471b,
d4eafc11cd0e4fe417c59db804ca6e8bd8bf9c0d0886627f15165937fcb68395,
eb08f96acba2b316408f66ef0c4f45a42eb207e43c605476405324726e97f9e3,
7a0ae128961a6239a2e10059305bb83fa64251bb3f0b44162ec6efdde10fd1e8,
5441cb26f32a433b0abd80dfa98a3a30c78df00ca9d2a0cfc5b20c55f3aaadce,
025b9bdd156b59b18ab08921572501b6386ae45e8c0c0440855a719ae4b4c24a,
fbc4fbb3c2926300ee820ff7044f35231c2a1aeeb74d1f49a6caaec7736739c6,
88b64a3eb0dc38e3f8288b977b1cd67af7d4ba959297ac48ef5f06bec3e77560,
8cc89a917ed89a8407aa1e5caa4af585f26946124cf1764e3b178261a27177af,
fa331a275d2f966f42a6168f1cb6fdb919d272b32175985c8bf383f2d800ced2,
0af76e87614126042a2c3409d273d606a4562f99cb9f003a9f9ec0596213a35a,
0aaee2882e4a71b25de5722d8936c67d40355e2f79caf994c8e10164468d3272,
0b16ee402ad04a673d61af43f461d475d1e3fcbdaf8714a1183ac35056bbae25,
53f4e38d56946a385a681c66d891d3d70c2b2fee1691ff7e7af317955e0d8b88,
322de3a4e1d356a7db22d6447807bd7576f91ed1910a57d9e8eb6f678ceb6ab4,
4a42bfc95772e2f6ae58ccb37fe74b5e810f6c2973ec7a70e09884e1fe97e794,
Mitre ttp:
T1193 (Spearphishing Attachment),T1203 (Exploitation for Client Execution),T1059.001 (PowerShell),T1027 (Obfuscated Files or Information),T1573 (Encrypted Channel)
Reference: This writing is based on Research Advisory Report published by ‘CERT UA' Team.
------------------------------------------------------------------------------------------
🚀Join us on our mission to secure the digital world and make cyber defense affordable to everyone! 🌐 Follow "CyberXTron Technologies" for the timely, relevant and actionable cyber threat insights.
Espionage #UAC0099 #LONEPAGE #WinRARExploit #CVE_2023_38831 #CyberAttack #ThreatIntelligence #cyberXTron #uncovertheunknown🛡️🔒
6