Ukrainian government orgs targeted in spear-phishing campaign delivering RomCom RAT

Ukrainian government orgs targeted in spear-phishing campaign delivering RomCom RAT

The Computer Emergency Response Team of Ukraine (CERT-UA) has discovered a new spear-phishing campaign aimed at Ukrainian government organizations distributing a version of the RomCom remote access trojan (RAT).

The campaign involves spear-phishing emails that ostensibly come from the General Staff of the Armed Forces of Ukraine. The email contains a lure document in the Ukrainian language called “Наказ_309.pdf” and an embedded link that leads to a fake website with a warning of a need to update PDF Reader software. Upon clicking on the download button, an executable file named “AcroRdrDCx642200120169_uk_UA.exe” is loaded on the system.

Once executed, this file drops another file named “rmtpak.dll,” which is the RomCom RAT.

CERT-UA has attributed this campaign to a threat actor named UNC2596 (Tropical Scorpius), a group believed to be operating the Cuba ransomware.

According to BlackBerry's security team, who released their own technical report on this threat, besides Ukraine, the RomCom threat actor is also targeting IT companies, food brokers, and food manufacturing in the US, Brazil, and the Philippines.

Back to the list

Latest Posts

Cyber Security Week in Review: April 18, 2025

Cyber Security Week in Review: April 18, 2025

In brief: Apple fixes a couple of iOS zero-days, a Windows NTLM bug exploited in real-world attacks, and more.
18 April 2025
Apple fixes two actively exploited iOS zero-days

Apple fixes two actively exploited iOS zero-days

The flaws have been used in “extremely sophisticated attacks” targeting specific individuals.
17 April 2025
New BPFDoor controller targeting telecoms sector in Asia and the Middle East

New BPFDoor controller targeting telecoms sector in Asia and the Middle East

The campaign is attributed to a well-known cyber espionage group known as Earth Bluecrow.
16 April 2025