The Ukrainian Laptop Emergency Response Crew (CERT-UA) has warned about cyberattacks dedicated by menace actors. UAC-0099 Goal authorities companies, protection forces and companies in home protection industrial complexes.
Assaults that use phishing e mail as an preliminary compromise vector are used to supply malware households akin to MatchBoil, MatchWok, and Dragstare.
UAC-0099 was first revealed by its company in June 2023 and has a historical past of concentrating on Ukrainian entities for espionage functions. Earlier assaults have been noticed that leverage safety flaws in Winrar software program (CVE-2023-38831, CVSS rating: 7.8) to propagate malware known as LonePage.
The most recent infectious illness chains use e mail lures associated to court docket summoning to seduce recipients to click on on a hyperlink that’s shortened utilizing URL shortening companies like Cuttly. These hyperlinks are despatched by way of the ukr.internet e mail deal with and discuss with a double archive file containing HTML software (HTA) recordsdata.
Operating the HTA payload triggers the launch of obfuscated Visible Primary Script recordsdata that run a loader known as MatchBoil, a C#-based program designed to create scheduled duties for continuation and finally drop further malware on the host.
This features a backdoor known as Matchwok and a steeler named Dragstare. Moreover, MatchWok written utilizing the C# programming language can run PowerShell instructions and cross the outcomes of the execution to a distant server.
In the meantime, Dragstare is provided to match the “.txt “, ” .ovpn “) in a selected checklist of system info, information from internet browsers, and extensions (“.docx”, “.doc”, “.xls”, “.txt”, “.ovpn”, “.rdp”, “.txt”, “.pdf”). PowerShell instructions acquired from servers managed by the attacker.

The disclosure particulars using six new malware instruments designed for stealth, persistence and lateral motion, simply over a month after ESET revealed an in depth report cataloguing Gamallen’s “relentless” spearfussing assaults on Ukrainian entities in 2024 –
- pterodespairPowerShell reconnaissance device for gathering diagnostic information on beforehand deployed malware
- pteroticklePowerShell weapon gadgets concentrating on Python purposes are transformed to executables on mounted and detachable drives and promote lateral motion by injecting code that would doubtlessly present Pteropsload or PowerShell downloader.
- PterographinCreate an encrypted communication channel for payload supply by way of Microsoft Excel Add-in and scheduled duties, and by way of the Telegraph API
- PterostewVBScript downloader just like Pterosand or Pterorisk) shops code in an alternate information stream related to benign recordsdata on the sufferer’s system
- Pteroquarka VBScript downloader launched as a brand new part inside the VBScript model of the Pterolnk weapon system
- Pteroboxz
“The exercise of Gammerderson’s spears elevated considerably within the second half of 2024,” mentioned safety researcher Zoltan Rusnak. “The marketing campaign normally lasted 1-5 days in a row, with emails containing malicious archives (RAR, ZIP, 7Z) or XHTML recordsdata using HTML smuggling expertise.”
Assaults usually consequence within the supply of malicious HTA or LNK recordsdata that run embedded VBScript downloaders akin to Pteropsdoor, Pterolnk, Pterovdoor, and Pteropsload, in addition to malicious HTA or LNK recordsdata that run embedded VBScript downloaders akin to Pterosand.
Different notable features of menace actor retailers alongside Russia embody using first-flux DNS expertise and their reliance on professional third-party companies akin to Telegram, Telegraph, Codeberg, and Cloudflare tunnels.
“Regardless of its limitations on observable capabilities and abandoning outdated instruments, Gameardon stays a key menace actor because of its continued innovation, aggressive spinning campaigns and ongoing efforts to keep away from detection,” ESET mentioned.