Hackers Masquerade as Drone Sellers to Launch Devastating Spy Campaign in Ukraine

Hackers are using a sneaky new trick to spy on people in Ukraine. They are pretending to be drone seller companies and official government groups to fool their victims. Once they gain trust, they send harmful files in emails. These files can secretly steal important information from computers.

Fake Emails, Real Threats

This new hacking campaign started in February and targets Ukraine’s armed forces, police departments, and local government offices—especially those close to Ukraine’s eastern border near Russia. These areas are already under a lot of pressure because of the ongoing conflict, and this cyberattack adds another serious problem.

The emails are sent from real but stolen accounts. This means that hackers get into someone’s email and use it to send fake messages. The emails look trustworthy because they come from people the victims already know or work with. That makes it more likely that the victim will open the email and click on any links or files inside.

Hackers carefully choose the subject lines of the emails to catch attention. They mention topics like clearing landmines, paying fines, building drones, or receiving money for homes destroyed in the war. All of these are real concerns for many Ukrainians, which makes the emails seem even more believable.

Sneaky Chaos: Drone Embedded Malware Shakes Up Russia-Ukraine War

Malware that Spreads through Drone Sellers

Inside these emails are files or attachments that hide two types of malware—bad software meant to cause harm or steal information.

The first type is a script, or a set of instructions, taken from a public GitHub page. GitHub is a website where computer programmers share code. While most of this code is used for good purposes, hackers sometimes find and use it for harmful reasons.

The second type of malware is more dangerous. It is called GiftedCrook. This malware is made to sneak into web browsers like Google Chrome, Microsoft Edge, and Firefox. Once inside, it steals cookies, browser history, and saved passwords.

Cookies are small pieces of data that keep you logged into websites, and saved passwords are exactly what they sound like—your login information. If someone steals these, they can easily break into your accounts without needing to guess your password.

Cyberattack Hits Ukraine’s Railway, Causing Travel Disruptions

After stealing the data, the malware compresses it into a single file and sends it over the messaging app Telegram. Using Telegram makes it harder for defenders to detect the activity because people widely use the app and don’t normally think of it as a place where hackers send stolen information.

Who’s Behind the Attacks?

Ukraine’s cyber emergency response team, called CERT-UA, is the group investigating these attacks. They are tracking the hackers under the name UAC-0226, but they have not said which country or group is behind the activity. There are no clear signs yet that link this hacker group to others known from the past.

Even though CERT-UA hasn’t shared everything, they did show examples of the fake emails used in the attacks. One email pretended to sell drones and included pictures to make it look more real. Another email looked like a schedule for clearing landmines in a Ukrainian city. These emails are designed to play on people’s fears and hopes, making them more likely to open them.

Russian Cybercriminals Wreak Havoc on Belgian Government Sites Over Ukraine Aid

In March alone, CERT-UA discovered three separate cyberattacks aimed at government agencies in Ukraine. All signs point to a carefully planned operation. The hackers clearly studied their targets and knew what kinds of messages would get their attention.

Cyberattacks like this are just one of many ways that digital warfare is being used in today’s world. While the damage may not be visible like in a traditional attack, the impact can be huge—especially when it involves military, police, and government systems.

Renuka Bangale
Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

Pam Bondi moves to military base housing after threats linked to Epstein document release controversy

Security measures around several senior United States officials have...

Global debate erupts as viral posts claim thousands of Netanyahu mentions in Epstein records

Fresh claims circulating online have sparked global attention after...

Malware campaign targeting telecom networks reported by Cisco Talos researchers

Security researchers have uncovered a complex cyber operation targeting...

2 suspects charged in Oklahoma ATM hacking scheme that used malware to dispense cash

Two Venezuelan nationals have been charged with federal crimes...

Heated debate erupts after Epstein files release and claims Iran tensions shift attention

A heated debate broke out on a television news...

Missile interceptions over Dubai unsettle the city’s long-promoted image of safety

Dubai has long promoted itself as a peaceful oasis...

United states leads dismantlement of one of the world’s largest hacker forums — DOJ

The Department of Justice announced today the seizure of...

Iran-linked hackers ramp up DDoS and malware attacks amid rising tensions

Iran has escalated its response to recent military strikes...

Fresh Epstein disclosures renew scrutiny over Joichi Ito’s role in Japan’s $400M startup project

Fresh disclosures connected to Jeffrey Epstein have once again...

Related Articles

Popular Categories