UAC-0219 targets Ukraine’s government agencies with WRECKSTEEL stealer

UAC-0219 targets Ukraine’s government agencies with WRECKSTEEL stealer

The Ukrainian Government's Computer Emergency Response Team (CERT-UA) has issued an alert regarding a series of cyberattacks targeting critical government agencies and infrastructure to collect and steal sensitive information from compromised systems using an information stealer called ‘WRECKSTEEL.’ The malware, written in VBScript and PowerShell, is designed specifically for file exfiltration and espionage purposes.

CERT-UA has reported at least three distinct cyber incidents during the month, where attackers leveraged compromised user accounts to distribute malicious emails. These emails contained links to public file-sharing services such as DropMeFiles and Google Drive, sometimes embedded in PDF attachments. Clicking on these links triggered the download and execution of a VBScript loader, which in turn executed a PowerShell script.

The purpose of the PowerShell script is to search for and exfiltrate specific file types from the infected systems. These files include documents (.doc, .txt, .docx, .xls, .xlsx, .pdf, .rtf, .odt, .csv, .ods), presentations (.ppt, .pptx), and images (.png, .jpg, .jpeg). Additionally, the malware captures screenshots of the infected system.

Further investigation into the cyber threat revealed that this activity has been ongoing since at least the fall of 2024. During attacks throughout 2024, cybercriminals utilized EXE files created with the NSIS installer. The files contained decoy documents (PDF, JPG) and a VBScript stealer, alongside the use of the "IrfanView" image editor to capture screenshots.

Starting in 2025, the functionality to capture screenshots has been integrated directly into the PowerShell script, enhancing the malware’s capabilities.

CERT-UA tracks this activity as UAC-0219.


Back to the list

Latest Posts

Cyber Security Week in Review: April 11, 2025

Cyber Security Week in Review: April 11, 2025

In brief: Microsoft fixes yet another Windows zero-day, Russian hackers continue to target military missions, and more.
11 April 2025
Hackers exploited zero-day flaw in Gladinet CentreStack software since March

Hackers exploited zero-day flaw in Gladinet CentreStack software since March

The issue stems from a hardcoded machineKey in the web application’s configuration file.
10 April 2025
Intelligence agencies warn of Chinese spyware targeting Taiwan, Tibetan rights advocates

Intelligence agencies warn of Chinese spyware targeting Taiwan, Tibetan rights advocates

The advisory focuses on two spyware families, dubbed ‘BadBazaar’ and ‘Moonshine’ masquerading as seemingly legitimate apps.
9 April 2025