Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

GhostWriter: Targeting Ukraine & Poland

July 14, 2023
Reading Time: 2 mins read
in Alerts
GhostWriter: Targeting Ukraine & Poland

 

Government entities, military organizations, and civilian users in Ukraine and Poland have been subjected to a prolonged series of targeted campaigns aimed at stealing sensitive data and establishing persistent remote access to compromised systems.

Furthermore, these attacks, attributed to a threat actor known as GhostWriter, exploit phishing lures and decoy documents to distribute PicassoLoader malware, which serves as a conduit for launching Cobalt Strike Beacon and njRAT. The attacks involve a multistage infection chain initiated with malicious Microsoft Office documents, predominantly in Excel and PowerPoint formats, followed by an executable downloader and payload concealed within an image file for enhanced evasion.

While a subset of these attacks has previously been documented by Ukraine’s CERT-UA and Fortinet FortiGuard Labs, the recent disclosure sheds further light on the activities of GhostWriter. The infection chains rely on persuading victims to enable macros, which triggers the deployment of PicassoLoader and subsequent retrieval of the final malware payload embedded within a legitimate image file.

At the same time, GhostWriter’s priorities are believed to align with the Belarusian government. Other threat actors, including the Russian APT28 group, have also targeted Ukraine through phishing emails employing HTML attachments that prompt recipients to change their passwords on platforms like UKR.NET and Yahoo!, redirecting them to fraudulent landing pages for credential theft.

In addition to GhostWriter’s activities, the adoption of a “standard five-phase playbook” by hackers associated with Russian military intelligence (GRU) has contributed to the escalation of disruptive operations against Ukraine.

This playbook involves leveraging living-on-the-edge infrastructure, employing living-off-the-land techniques for reconnaissance and lateral movement, establishing persistent access through group policy objects (GPO), deploying wipers, and using Telegram hacktivist personas to communicate their acts. The adoption of this playbook suggests that Russia’s wartime goals have influenced the GRU’s strategic approach, allowing for increased speed, scale, and intensity in their attacks.

The disclosure of these campaigns coincides with CERT-UA’s report on various phishing operations distributing the SmokeLoader malware, as well as a smishing attack targeting Telegram accounts.

It highlights the ongoing cyber espionage efforts against state organizations and media representatives in Ukraine, where email and instant messengers are used to distribute files that execute PowerShell scripts to retrieve browser stealers and keyloggers. The combined activities of GhostWriter, APT28, and GRU-associated hackers underscore the persistent and multifaceted threats faced by Ukraine’s cybersecurity landscape.

Reference:
  • Malicious campaigns target government, military and civilian entities in Ukraine, Poland
Tags: Cyber AlertCyber Alerts 2023CyberattackCybersecurityGhostwriterGovernmentJuly 2023PhishingPolandUkraineVulnerabilities
ADVERTISEMENT

Related Posts

Fileless Remcos RAT Delivery Via LNK Files

APT28 RoundPress Webmail Hack Steals Emails

May 16, 2025
Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

May 16, 2025
Fileless Remcos RAT Delivery Via LNK Files

Fileless Remcos RAT Delivery Via LNK Files

May 16, 2025
HTTPBot DDoS Threat To Windows Systems

Horabot Malware Targets LatAm Via Phishing

May 15, 2025
HTTPBot DDoS Threat To Windows Systems

Google Patches Chrome Account Takeover Bug

May 15, 2025
HTTPBot DDoS Threat To Windows Systems

HTTPBot DDoS Threat To Windows Systems

May 15, 2025

Latest Alerts

Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

APT28 RoundPress Webmail Hack Steals Emails

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Subscribe to our newsletter

    Latest Incidents

    Hackers Target Swiss Reserve Power Plant

    Coinbase Insider Attack Exposed User Data

    Cyberattack Hits J Batista Group

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial