Possible APT28-linked hackers target Ukraine’s scientific institutions

Avatar

A new cyber-espionage campaign against Ukraine’s scientific and research institutions appears to have links to the Kremlin-backed group tracked as APT28, researchers say.

During attacks earlier in July, a group tracked as UAC-0063 used the known malware strains Hatvibe and Cherryspy, according to an analysis by Ukraine’s computer emergency response team (CERT-UA).

Cherryspy and Hatvibe were previously used by UAC-0063 in May in a cyber-espionage campaign targeting an undisclosed government agency in Ukraine. The Cherryspy backdoor allows the attacker to execute Python code received from a management server; Hatvibe can download and run other files on infected devices.

In the new analysis, researchers linked UAC-0063 with “medium confidence” to APT28, also known as Fancy Bear and BlueDelta, which is tied to Russia’s military intelligence (GRU).

Researchers initially detected activity associated with UAC-0063 in 2021, but the espionage group’s origins remain unclear. In a previous report, CERT-UA said that, in addition to Ukraine, the threat actor “has also shown interest” in targeting Mongolia, Kazakhstan, Kyrgyzstan, Israel and India.

In the latest attack on an unspecified Ukrainian scientific and research institution, the hackers first obtained access to the email account of an employee, then forwarded a copy of a recently sent letter to dozens of recipients, replacing the original document attachment with a malicious one.

In June 2024, CERT-UA said it also recorded numerous cases of Hatvibe backdoor installation by exploiting a vulnerability in HFS, a web server application designed to facilitate the sharing and transfer of files over the internet via the HTTP protocol. This finding could mean that the hackers use various tactics for the initial compromise of their victims, researchers said.

In addition to Ukraine, UAC-0063 also likely targeted the defense ministry in Armenia, according to a malicious document discovered by the researchers on the VirusTotal repository.

APT28 hackers are believed to be behind several major attacks on Ukraine and its allies over the past several years. Last year, the group reportedly hacked the German Social Democratic Party.

In May, Poland said it observed a large-scale espionage campaign, likely carried out by APT28, targeting the country’s government institutions.

The Czech Ministry of Foreign Affairs said its intelligence services had been targeted by APT28, “exploiting a previously unknown vulnerability in Microsoft Outlook from 2023.”

Nation-stateMalwareNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

China-linked Daggerfly hackers update their toolset, likely after exposure

Next Post

Tech giants say spyware victims should be able to sue NSO Group in US

Related Posts

MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks

The malware loader known as MintsLoader has been used to deliver a PowerShell-based remote access trojan called GhostWeaver. "MintsLoader operates through a multi-stage infection chain involving obfuscated JavaScript and PowerShell scripts," Recorded Future's Insikt Group said in a report shared with The Hacker News. "The malware employs sandbox and virtual machine evasion techniques, a domain
Avatar
Read More

CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a medium-severity security flaw impacting Microsoft Windows to its Known Exploited Vulnerabilities (KEV) catalog, following reports of active exploitation in the wild. The vulnerability, assigned the CVE identifier CVE-2025-24054 (CVSS score: 6.5), is a Windows New Technology LAN Manager (NTLM) hash disclosure
Avatar
Read More

Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after the initial access vector used to breach the devices was patched. The attackers are believed to have leveraged known and now-patched security flaws, including, but not limited to, CVE-2022-42475, CVE-2023-27997, and CVE-2024-21762. "A threat actor used a known
Avatar
Read More