Threat actors target Ukrainian government agencies in new wave of SmokeLoader attacks

Threat actors target Ukrainian government agencies in new wave of SmokeLoader attacks

CERT-UA published Indicators of Compromise related to a new malicious campaign by a financially motivated threat actor tracked as UAC-0006 targeting government entities in Ukraine. The team said that between 2-6 October 2023 the attackers launched at least four waves of attacks.

The SmokeLoader malware is delivered via phishing emails in the form of a ZIP archive or a PDF document. The malware’s command-and-control server is hosted in Russia, according to CERT-UA.

The cyber defenders believe that the goal of this campaign is to steal login credentials such as logins, passwords and certificate keys from accounting software used by government agencies and/or modify banking details in financial documents in remote banking systems to steal money.

CERT-UA notes that between August and September 2023, UAC-0006 attempted to steal millions of hryvnias from organizations. The team didn’t say if any of these attempts were successful.


Back to the list

Latest Posts

Ukrainian cyberpolice dismantled phishing group behind illegal property deregistrations

Ukrainian cyberpolice dismantled phishing group behind illegal property deregistrations

The group used phishing emails to infect targets with malware granting remote access to the devices.
14 April 2025
New precision-validating phishing scheme targeting high-value accounts

New precision-validating phishing scheme targeting high-value accounts

The technique is designed to engage only with verified, legitimate email addresses.
14 April 2025
Pakistan-linked threat actor expands targeting in India with new CurlBack RAT

Pakistan-linked threat actor expands targeting in India with new CurlBack RAT

The group has also moved from using HTA files to MSI packages as the primary method for deploying the malware.
14 April 2025