4 September 2024

Threat actors target Ukrainian military via fake Griselda app and Google Drive links


Threat actors target Ukrainian military via fake Griselda app and Google Drive links

The Ukrainian Government Computer Emergency Response Team (CERT-UA), in collaboration with the Ministry of Defense's Joint Response Team (MILCERT), has identified and analyzed two cyberattacks aimed at Ukrainian military personnel. The attacks involved the dissemination of messages via Signal, containing links to download APK files that were disguised as military systems Griselda and the surveillance system called “Eyes.”

In the first case, threat actors created a fake version of the official Griselda project website. Griselda is an automated system for data entry, processing, and transmission using artificial intelligence.

The site prompted users to download a “mobile version” of the Griselda application—a software that does not actually exist. Instead, the APK file contained the HYDRA malware, capable of stealing session data (HTTP Cookies), contacts, performing keylogging, and more.

In the second case, the attackers exploited a Google Drive link to distribute an APK file, which appeared to be a legitimate version of the Eyes surveillance system. However, this APK was modified to include malicious code designed to steal users' login credentials and passwords, as well as to track and transmit the GPS coordinates of the device. It is believed that the attackers added a third-party JAVA class to the legitimate software and implemented its invocation within the relevant blocks of code.

CERT-UA tracks this activity as UAC-0210.

Back to the list

Latest Posts

What is Vulnerability Management? A Beginner's Guide

What is Vulnerability Management? A Beginner's Guide

In this article will try to cover basics of vulnerability management process and why it is important to every company.
11 September 2024
Cyber Security Week in Review: September 6, 2024

Cyber Security Week in Review: September 6, 2024

In brief: the US charges Russian GRU hackers for attacks on Ukraine, Apache, Cisco, Zyxel patch high-risk flaws, Google fixes Android zero-day, and more.
6 September 2024
Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Threat actors using MacroPack Red Team framework to deploy Brute Ratel, Havoc and PhantomCore

Some of the documents appeared to be part of legitimate Red Team exercises, while other were intended for malicious purposes.
5 September 2024