Ukraine's DELTA military intelligence system had its users targeted by phishing attacks spreading the FateGrab and StealDeal information stealing malware, according to The Hacker News.
The UAC-0142 threat cluster sent phishing emails relating to fake root certificate update warnings that included PDF attachments with links to archive files on a fake DELTA domain, which then proceeds to deploy the malware, said the Computer Emergency Response Team of Ukraine.
Files containing certain extensions are being exfiltrated by FateGrab while passwords and other data stored in web browsers are being targeted by the StealDeal malware.
Such an attack against DELTA comes amid the failed attack by Russia-linked hacking group Gamaredon against a NATO member state-based petroleum refinery.
Moreover, Ukraine-based organizations have also been impacted by Vidar stealer and RomCom RAT attacks. Phishing attacks involving emails spoofing Ukraine's State Emergency Service have also targeted Ukrainian state-owned entities with the DolphinCape backdoor, which is based on the Delphi programming language.
Ukrainian hacktivist operation IT Army has taken responsibility for a significant distributed denial-of-service attack against Russian local airline booking system Leonardo, which is used by over 50 Russian carriers, according to The Record, a news site by cybersecurity firm Recorded Future.
New attacks with the updated SysUpdate toolkit have been deployed by Chinese advanced persistent threat operation Budworm, also known as APT27, Emissary Panda, Bronze Union, Lucky Mouse, Iron Tiger, and Red Phoenix, against an Asian government and a Middle East-based telecommunications provider, reports The Hacker News.
Forty-five malicious NPM and PyPI packages have been deployed by threat actors to facilitate extensive data theft operations as part of a campaign that commenced on Sept. 12, according to BleepingComputer.