Hackers-for-hire target Ukrainian notaries to manipulate state registries

Avatar

Ukraine’s state cyber response team (CERT-UA) warned that hackers are targeting notaries’ computers in an attempt to gain remote access and manipulate government registries.

The hacking group, identified as UAC-0173, has been distributing phishing emails since mid-January, posing as regional offices of Ukraine’s Ministry of Justice, authorities said in a report released on Tuesday.

Earlier in December, suspected Russian military intelligence hackers breached the infrastructure of Ukraine’s state registers, which are managed by the Justice Ministry, disrupting services for several weeks.

It remains unclear whether the attack on state registries is linked to or was exploited by the UAC-0173 campaign against notaries. This is not the first time the group has targeted the Ukrainian justice system. In a campaign last August, it deployed AsyncRAT malware on victims’ devices.

According to CERT-UA, the group is likely conducting the attacks for hire and receiving a financial reward from an unnamed source.

In its latest operation, UAC-0173 infected the targeted computers with DarkCrystal malware — a commercial Russian backdoor that appears to have been developed and maintained by a single person and sold predominantly on Russian underground forums since 2019.

According to previous reports, DarkCrystal is one of the cheapest commercial malware of its kind, only costing about $6 for a two-month subscription. The backdoor can be used for surveillance, reconnaissance, information theft, denial-of-service attacks, as well as code execution in a variety of different languages.

In the campaign against Ukrainian notaries, UAC-0173 also used various utilities to bypass security controls, scan networks, intercept authentication data, and steal credentials, the authorities said. In some cases, compromised computers were leveraged to send further waves of phishing.

Researchers said they identified affected computers in six regions and prevented unauthorized registry modifications, in some cases stopping attacks at their final stages.

Over the weekend, CERT-UA also warned of another threat actor targeting Ukrainian and foreign enterprises, including manufacturers and suppliers of automated systems used to monitor and control industrial processes.

Since July, the hacker group tracked as UAC-0212 has targeted suppliers from Serbia, Czechia and Ukraine with various malware variants, such as EmpirePast, Spark and CrookBag. Researchers believe the group is linked to the notorious Russian threat actor Sandworm.

Over the past two months, the group has also attacked several Ukrainian enterprises specializing in the design and production of equipment for drying, transporting, and storing grain.

The likely goal of these attacks was to compromise the computer networks of service providers, with the aim of further using the obtained data to hack Ukraine’s critical industrial enterprises, the cyber agency said.

NewsNation-stateCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts

Next Post

Ukrainian government, Belarusian opposition targeted in new espionage campaign

Related Posts

Malicious PyPI Packages Stole Cloud Tokens—Over 14,100 Downloads Before Removal

Cybersecurity researchers have warned of a malicious campaign targeting users of the Python Package Index (PyPI) repository with bogus libraries masquerading as "time" related utilities, but harboring hidden functionality to steal sensitive data such as cloud access tokens. Software supply chain security firm ReversingLabs said it discovered two sets of packages totaling 20 of them. The packages
Avatar
Read More

Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America

The threat actor known as Dark Caracal has been attributed to a campaign that deployed a remote access trojan called Poco RAT in attacks targeting Spanish-speaking targets in Latin America in 2024. The findings come from Russian cybersecurity company Positive Technologies, which described the malware as loaded with a "full suite of espionage features." "It could upload files, capture screenshots
Avatar
Read More