Network Security, Threat Intelligence, Malware

Ukrainian orgs targeted with PicassoLoader malware

Share
computer screen with programming code and a skull, concept of computer security, malware or hacker attack (3d render)

Organizations across Ukraine were noted by the country's Computer Emergency Response Team to have been targeted by Belarus-linked advanced persistent threat operation GhostWriter, also known as UAC-0057, in attacks distributing the PicassoLoader malware, Security Affairs reports.

Intrusions conducted from July 12 to 18 involved the utilization of malicious documents associated with taxation, local government reform, and financial and economic measurements to spread PicassoLoader and eventually result in Cobalt Strike Beacon delivery, according to a report from CERT-UA.

"Based on this, it can be inferred that UAC-0057 might have targeted both project office specialists and their counterparts among the employees of relevant local government bodies in Ukraine," said CERT-UA.

Such a development comes four years after organizations in Belarus were targeted by GhostWriter prior to the 2020 elections, with Belarusian authorities later apprehending some of the opposition members impacted by the hacking operation.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.