Ukrainian defense companies targeted in a new wave of attacks

Ukrainian defense companies targeted in a new wave of attacks

Ukraine's Computer Emergency Response Team (CERT-UA), has warned of a new series of cyberattacks targeting Ukrainian defense enterprises. The attackers are leveraging the theme of Unmanned Aerial Vehicles (UAVs) procurement to lure their victims.

The campaign has been attributed to a threat actor CERT-UA tracks as UAC-0180. The group utilizes various types of malware and may pose as government officials to gain the trust of their targets. UAC-0180’s arsenal includes a variety of malware written in various programming languages such as C (ACROBAIT), Rust (ROSEBLOOM, ROSETHORN), Go (GLUEEGG), Lua (DROPCLUE).

The attack begins with an email containing a ZIP file attachment. This ZIP file includes a PDF document with a link, urging the recipient to follow it to “download missing fonts.”

Upon clicking the link, the victim downloads a file named “adobe_acrobat_fonts_pack.exe,” which is, in reality, malicious software known as GLUEEGG. This software decrypts and runs the loader called DROPCLUE.

DROPCLUE then downloads and opens two files on the victim's computer: a decoy PDF file and an executable file named “font-pack-pdf-windows-64-bit.” Ultimately, this executable file installs a legitimate remote management tool called ATERA. This allows the attackers to gain unauthorized access to the victim's computer.

More technical details as well as Indicators of Compromise (IoCs) related to this campaign can be found in CERT-UA’s advisory.

Back to the list

Latest Posts

Cyber Security Week in Review: July 4, 2025

Cyber Security Week in Review: July 4, 2025

In brief: Google patches Chrome 0Day, the US is on the hunt for North Korean IT workers, and more.
4 July 2025
AI chatbots fall for phishing scams

AI chatbots fall for phishing scams

The models provided the correct URL only 66% of the time; nearly 30% of responses pointed users to dead or suspended domains.
3 July 2025
Chinese hackers exploited Ivanti flaws in attacks against French government

Chinese hackers exploited Ivanti flaws in attacks against French government

ANSSI believes that the Houken campaign is operated by ‘UNC5174’, an entity believed to act as an initial access broker for China’s Ministry of State Security.
2 July 2025