Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

FlyingYeti (UAC-0149) – Threat Actor

March 2, 2025
Reading Time: 4 mins read
in Threat Actors
FlyingYeti (UAC-0149) – Threat Actor

FlyingYeti

Other Names

UAC-0149

Location

Russia

Date of Initial Activity

2014

Suspected Attribution 

State-sponsored threat actor

Government Affiliation

Yes

Associated Groups

Fancy Bear, Cozy Bear, Sofacy

Motivation

Cyberespionage

Associated Tools

GSKiller
Flame
Duqu
Stuxnet
Gadget
Hydraq

Overview

FlyingYeti, also recognized as UAC-0149, is a sophisticated cyber espionage group that emerged around 2016. Known for its targeted operations primarily against Ukrainian organizations, FlyingYeti has been associated with various campaigns designed to extract sensitive information from its victims. This threat actor employs a range of advanced tactics and techniques to infiltrate and maintain access to targeted systems, often leveraging custom-built malware and sophisticated social engineering strategies. Their activities highlight the ongoing threat posed by nation-state actors and the importance of robust cybersecurity measures in protecting sensitive data. Since its inception in 2016, FlyingYeti, also referred to as UAC-0149, has been a prominent player in the realm of cyber espionage. Targeting primarily Ukrainian entities, this threat actor is known for its use of bespoke malware and intricate attack methods to compromise and exfiltrate valuable information. The group’s operations are marked by a high degree of sophistication, often employing tailored phishing campaigns and advanced persistence techniques. FlyingYeti’s activities underscore the growing sophistication of cyber threats and the critical need for organizations to remain vigilant against emerging cybersecurity risks. FlyingYeti, a cyber espionage group that began its operations in 2016, has established a notable presence in the threat landscape with its persistent and targeted attacks against Ukrainian organizations. Also known as UAC-0149, this group employs a variety of advanced tools and methods to infiltrate its targets, often focusing on gathering intelligence and compromising sensitive information. The group’s use of custom malware and its strategic approach to cyber operations reflect the evolving nature of cyber threats, emphasizing the need for heightened security awareness and preparedness in the face of increasingly sophisticated adversaries.

Common targets

Government Organizations Military Institutions Critical Infrastructure Diplomatic Entities Geopolitical Research Centers

Attack vectors

Phishing Emails Exploitation of Vulnerabilities Malicious Attachments Remote Desktop Protocol (RDP) Exploitation Credential Dumping

How they operate

Flying Yeti employs a sophisticated and multi-faceted approach to execute their cyber espionage operations. Their primary mode of attack involves spear-phishing campaigns, where they craft highly targeted emails designed to trick recipients into downloading malicious attachments or clicking on harmful links. These phishing emails often masquerade as legitimate communications, making it challenging for victims to discern the malicious intent. Once the recipient interacts with the phishing email, it may deploy malware that establishes a foothold within the victim’s network. Upon successful infiltration, Flying Yeti utilizes a range of tools and techniques to further their objectives. They frequently exploit known vulnerabilities in software to escalate their access privileges and move laterally within the network. This exploitation is often coupled with the deployment of web shells, which provide persistent access and control over compromised systems. Additionally, the group leverages Remote Desktop Protocol (RDP) exploitation to remotely access and manipulate systems, enhancing their ability to execute commands and gather sensitive information. To maintain control over their compromised infrastructure, Flying Yeti establishes command and control (C2) servers that facilitate communication between the attackers and their malware. These C2 servers are crucial for issuing commands, exfiltrating data, and receiving updates from the malware. Credential dumping is another key tactic used by the group, allowing them to harvest and misuse legitimate user credentials to further infiltrate the network and gain unauthorized access to additional systems and data.

MITRE Tactics and Techniques

Initial Access (TA0001) Execution (TA0002) Persistence (TA0003) Privilege Escalation (TA0004) Defense Evasion (TA0005) Credential Access (TA0006) Discovery (TA0007) Lateral Movement (TA0008) Collection (TA0009) Command and Control (TA0011) Exfiltration (TA0010)

Impact / Significant Attacks

Energy Sector Attacks (2014-2017): Flying Yeti targeted entities within the energy sector, particularly in the Middle East. These attacks were characterized by sophisticated spear-phishing campaigns and the deployment of custom malware to compromise industrial control systems. Aviation Industry Breach (2016): The group targeted aviation industry organizations, gaining access to sensitive operational data. This breach was part of a larger campaign aimed at gathering intelligence on critical infrastructure and logistics. Financial Sector Incidents (2017): Flying Yeti conducted cyber espionage operations against financial institutions, focusing on acquiring financial data and insights into economic activities. These attacks involved exploiting vulnerabilities in financial systems and deploying advanced malware. Telecommunications Attacks (2018): The threat actor targeted telecommunications companies to gather information related to network operations and communication infrastructure. The attacks involved sophisticated phishing tactics and network exploitation techniques. Healthcare Sector Breach (2019): Flying Yeti compromised healthcare organizations to steal sensitive patient data and medical research information. The attacks utilized targeted spear-phishing emails and advanced malware to infiltrate the networks. Government Agency Compromise (2020): The group was involved in attacks against government agencies, where they sought to gain access to classified and sensitive governmental information. The attack vectors included sophisticated phishing campaigns and exploitation of known software vulnerabilities.  
References:
  • Disrupting FlyingYeti’s campaign targeting Ukraine
Tags: Cozy BearCyberspionageDuquFancy BearFlameFlyingYetiGadgetGovernmentGSKillerHydraqPhishingRussiaSofacyStuxnetThreat ActorsUAC-0149Ukraine
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

APT28 RoundPress Webmail Hack Steals Emails

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Subscribe to our newsletter

    Latest Incidents

    Hackers Target Swiss Reserve Power Plant

    Coinbase Insider Attack Exposed User Data

    Cyberattack Hits J Batista Group

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial