Hackers tried to attack defense enterprises of Ukraine
Category
Ukraine
Publication date

Hackers tried to attack defense enterprises of Ukraine

State Special Communications
Hackers tried to attack defense enterprises of Ukraine

Hacker group UAC-0185 attempted to attack Ukrainian defense enterprises, as well as the Security and Defense Forces. Hackers used phishing emails for this.

Points of attention

  • Hacker group UAC-0185 tried to attack Ukrainian defense enterprises through phishing emails, disguising them as official messages from the Ukrainian Union of Industrialists and Entrepreneurs.
  • The hacker group UAC-0185 is known for its activity of stealing messenger credentials and trying to penetrate military systems.
  • This attack represents a threat to Ukraine's cyber security and requires increased measures to protect defense structures against such attacks.
  • Public services are already taking measures to eliminate the consequences of the attack and prevent similar incidents in the future.
  • Be careful when receiving unsolicited emails and check them for signs of fraud to avoid possible computer infections.

What is known about the hacker attack on Ukrainian defense enterprises

As reported in the State Intelligence Service, the hackers disguised their letters as official messages on behalf of the Ukrainian Union of Industrialists and Entrepreneurs.

The text referred to an invitation to the conference, which took place on December 5 and was dedicated to the compliance of the products of the defense-industrial complex of Ukraine with NATO technical standards.

The email contained a hyperlink with the text 'The attachment contains important information for your participation'. Clicking on this link and opening the attached files could lead to computer infection, the department said.

What is known about the hacker group UAC-0185

This hacker group has been active since at least 2022.

The main goal of his attacks is to steal the credentials of Signal, Telegram, and WhatsApp messengers, as well as access to DELTA, TENETA, and Nettle military systems.

Less often, the group uses cyber attacks to gain unauthorized remote access to the computers of employees of defense enterprises and representatives of the security and defense forces, — adds the State Intelligence Service

By staying online, you consent to the use of cookies files, which help us make your stay here even better 

Based on your browser and language settings, you might prefer the English version of our website. Would you like to switch?