Ukrainian government, Belarusian opposition targeted in new espionage campaign

Avatar

A suspected Belarusian state-backed hacking group is behind a cyber espionage campaign targeting opposition activists in the country, as well as Ukrainian military and government entities, according to a new report.

The operation, which researchers from cybersecurity firm SentinelOne linked to the long-running GhostWriter hacking group, has been in development since mid-2024 and is likely ongoing. The report, published Tuesday, doesn’t specify the goal of the campaign, but GhostWriter is primarily known for cyber espionage.

GhostWriter is closely tied to Belarusian state intelligence and has previously targeted government, military and civilian entities in Ukraine and Europe. It is known for deploying a relatively unchanged set of tools in its campaigns — like PicassoLoader, AgentTesla, Cobalt Strike Beacon and njRAT.

The attacks are the first documented case of the group directly targeting Belarus’s opposition. The timing may be linked to the country’s presidential election earlier in January, in which President Alexander Lukashenko secured his seventh consecutive term, according to the report.

The decoy document used in the attacks against the Belarusian opposition contains the names of political prisoners — information that was already publicly available.

In Ukraine, the hackers distributed phishing documents disguised as an anti-corruption initiative action plan for government organizations and a report template related to military supply logistics.

As part of the recent campaign, the hackers infected their targets with a modified version of PicassoLoader malware. Researchers said the latest variant features significant code alterations, potentially making it more cost-effective and easily replaceable.

GhostWriter has repeatedly targeted Ukrainian entities. In 2023, it deployed PicassoLoader against Ukraine’s government organizations, including an attack on Ukraine’s National Defense University. Last June, the group attacked Ukraine’s Ministry of Defense and a military base.

“While Belarus doesn’t actively participate in military campaigns in the war in Ukraine, cyber threat actors associated with it appear to have no reservations about conducting cyber espionage operations against Ukrainian targets,” the researchers said.

The group’s latest attacks also serve as confirmation that GhostWriter is closely aligned with the interests of the Belarusian government, “waging an aggressive pursuit of its opposition and organizations associated with it.”

CybercrimeGovernmentNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Hackers-for-hire target Ukrainian notaries to manipulate state registries

Next Post

‘Cyber incident’ shuts down Cleveland Municipal Court for third straight day

Related Posts

This Malicious PyPI Package Stole Ethereum Private Keys via Polygon RPC Transactions

Cybersecurity researchers have discovered a malicious Python package on the Python Package Index (PyPI) repository that's equipped to steal a victim's Ethereum private keys by impersonating popular libraries. The package in question is set-utils, which has received 1,077 downloads to date. It's no longer available for download from the official registry. "Disguised as a simple utility for Python
Avatar
Read More

New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes

Cybersecurity researchers have discovered a novel attack technique called TokenBreak that can be used to bypass a large language model's (LLM) safety and content moderation guardrails with just a single character change. "The TokenBreak attack targets a text classification model's tokenization strategy to induce false negatives, leaving end targets vulnerable to attacks that the implemented
Avatar
Read More