Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

UAC-0188 (FRwL) – Threat Actor

March 2, 2025
Reading Time: 4 mins read
in Threat Actors
UAC-0188 (FRwL) – Threat Actor

UAC-0188

Other Names

From Russia With Love, FRwL

Location

Russia

Date of initial activity

2022

Suspected attribution

Hactivist Group

Government Affiliation

Unknown

Motivation

Hacktivism

Associated tools

Somnia Ransomware
SuperOps RMM
Dropbox

Software

Windows

Overview

UAC-0188 is a sophisticated threat actor group that has gained prominence for its targeted cyber attacks. Emerging prominently during the Russia-Ukraine conflict in 2022, UAC-0188, also known as From Russia with Love (FRwL), primarily conducts distributed denial-of-service (DDoS) attacks. The group has been known to target critical infrastructure, including media, energy sectors, and government entities. Their operations are characterized by their strategic impact on essential services and institutions. Despite their activities, there is no direct evidence linking UAC-0188 to the Russian Main Intelligence Directorate. However, there is speculation that FRwL may coordinate their efforts with state-aligned hacktivist groups. This association hints at a complex network of cyber operations that might be influenced by or connected to broader state interests.

Common targets

Critical Infrastructure: This includes essential systems and services that are vital for a country’s functioning, such as utilities (electricity, water), transportation systems, and communication networks. Media Organizations: FRwL has targeted media entities, aiming to disrupt their operations and influence the dissemination of information. Energy Sector: Their attacks have also focused on energy companies, which are crucial for powering homes, industries, and other critical sectors. Government Entities: Government institutions and agencies are frequent targets, reflecting an interest in disrupting administrative functions and accessing sensitive information.

Attack Vectors

Phishing Emails

Remote Management Tools (e.g., SuperOps RMM)

Executable Files (e.g., SCR files created using PyInstaller)

Malicious Links (e.g., Dropbox links)

How they operate

The group’s attack vectors often involve phishing emails, which are crafted to deceive recipients into downloading malicious attachments. For instance, UAC-0188 has been known to use links to Dropbox that lead to the download of executable SCR files. These files, created using PyInstaller, contain Python code that is executed upon opening. The Python code then downloads additional components, including base64-encoded strings and ZIP archives, ultimately leading to the installation of SuperOps RMM on the victim’s machine. This process highlights the group’s ability to blend legitimate software with malicious intent, making their attacks particularly challenging to detect and mitigate. In addition to their use of SuperOps RMM, UAC-0188’s tactics include employing various techniques to evade detection and maintain persistence. The group has been observed using system binary proxy execution methods, such as Msiexec, to mask their activities. They also employ command and control techniques, including web services and remote access software, to communicate with compromised systems and exfiltrate data. By leveraging these methods, UAC-0188 can operate stealthily while executing their operations.

MITRE Tactics and Techniques

Execution:
Command and Scripting Interpreter: Python (T1059.006)
Defense Evasion:
System Binary Proxy Execution: Msiexec (T1218.007)
Command and Control:
Web Service (T1102) Remote Access Software (T1219)

Impact / Significant Attacks

Phishing Attack Against Ukraine (May 2024): UAC-0188 launched a targeted phishing attack against Ukrainian organizations using the SuperOps RMM tool. The attack involved sending phishing emails with links to Dropbox that led to the download of malicious SCR files. These files were used to install the legitimate SuperOps RMM software, allowing the attackers to gain unauthorized remote access to the compromised systems. Exploitation of SuperOps RMM (February-March 2024): During this period, UAC-0188 utilized the SuperOps RMM tool to exploit vulnerabilities in remote management software. They created and distributed malicious files disguised as legitimate software to facilitate their attacks. This operation showcased their ability to blend legitimate tools with malicious code to evade detection. Infection Flow Using PyInstaller (Ongoing): The group has been observed using PyInstaller to create executable files that contain both legitimate and malicious Python code. This technique involves embedding base64-encoded strings and ZIP archives within these files, which are then used to install SuperOps RMM on victim systems. This sophisticated method illustrates the group’s advanced approach to evading traditional security measures. Targeting of Financial and Insurance Institutions: UAC-0188 has been linked to attacks on financial and insurance institutions across Europe and the USA. By leveraging phishing techniques and remote management tools, the group has expanded its geographical reach and targeted sectors crucial to economic stability.  
References:
  • UAC-0188 Attack Detection: Hackers Launch Targeted Attacks Against Ukraine Exploiting SuperOps RMM
  • UAC-0188: Targeted cyberattacks using SuperOps RMM (CERT-UA#9797)
  • UAC-0118
  • CERT-UA: russian hackers use legitimate RMM software to attack Ukraine, likely US and Europe
Tags: DDoSDropboxEmailEuropeFrom Russia With LoveFRwLHacktivismHactivist GroupMsiexecPhishingPythonRussiaSomnia RansomwareSuperOps RMMThreat ActorsUAC-0188UkraineUnited StatesVulnerabilitiesWindows
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Google Removes 352 ‘IconAds’ Fraud Apps

Malicious Firefox Add Ons Steal Crypto Keys

Browser Cache Attack Bypasses Web Security

PDFs Deliver QR Codes in Callback Scams

Critical Sudo Flaws Expose Linux Systems

Unkillable Mac Malware From North Korea

Subscribe to our newsletter

    Latest Incidents

    Tech Incubator IdeaLab Discloses Data Breach

    Brazil’s CIEE One Exposes 248,000 Records

    McLaughlin & Stern Discloses Data Breach

    Cyberattack Hits Medtech Firm Surmodics

    Rhysida Ransomware Hits German Charity WHH

    Hacker Accesses Max Financial’s User Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial