Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述。首先,我需要仔细阅读文章,理解主要内容。 文章主要讲的是一个与俄罗斯相关的威胁行为者UAC-0184,他们利用Viber messaging平台向乌克兰的军事和政府机构发送恶意ZIP文件。里面包含伪装成微软文档的LNK文件,这些文件会执行Hijack Loader,进而下载Remcos RAT进行远程控制和数据窃取。 接下来,我需要提取关键信息:威胁行为者是谁?目标是谁?使用了什么工具和方法?攻击链是怎样的?以及攻击带来的后果是什么。 然后,我要把这些信息浓缩到100字以内。可能的结构是:威胁行为者利用Viber发送恶意文件,伪装成文档诱骗打开,执行恶意软件Hijack Loader和Remcos RAT,用于间谍活动和数据窃取。 需要注意的是不要遗漏关键点:Viber作为初始入侵载体、恶意ZIP、LNK文件、Hijack Loader、Remcos RAT、乌克兰军政府目标、间谍活动和数据窃取。 最后,确保语言简洁明了,符合用户的要求。 </think> 俄罗斯相关威胁组织UAC-0184利用Viber平台向乌克兰军政府机构分发恶意ZIP文件。这些文件伪装成微软文档诱骗用户打开,并通过LNK文件执行Hijack Loader加载器下载Remcos远程控制工具。该组织通过多阶段技术规避检测,在目标系统中植入间谍软件窃取数据。 2026-1-5 17:56:0 Author: thehackernews.com(查看原文) 阅读量:3 收藏

Cyber Espionage / Windows Security

The Russia-aligned threat actor known as UAC-0184 has been observed targeting Ukrainian military and government entities by leveraging the Viber messaging platform to deliver malicious ZIP archives.

"This organization has continued to conduct high-intensity intelligence gathering activities against Ukrainian military and government departments in 2025," the 360 Threat Intelligence Center said in a technical report.

Also tracked as Hive0156, the hacking group is primarily known for leveraging war-themed lures in phishing emails to deliver Hijack Loader in attacks targeting Ukrainian entities. The malware loader subsequently acts as a pathway for Remcos RAT infections.

The threat actor was first documented by CERT-UA in early January 2024. Subsequent attack campaigns have been found to leverage messaging apps like Signal and Telegram as a delivery vehicle for malware. The latest findings from the Chinese security vendors point to a further evolution of this tactic.

Cybersecurity

The attack chain involves the use of Viber as an initial intrusion vector to distribute malicious ZIP archives containing multiple Windows shortcut (LNK) files disguised as official Microsoft Word and Excel documents to trick recipients into opening them.

The LNK files are designed to serve as a decoy document to the victim to lower their suspicion, while silently executing Hijack Loader in the background by fetching a second ZIP archive ("smoothieks.zip") from a remote server by means of a PowerShell script.

The attack reconstructs and deploys Hijack Loader in memory through a multi-stage process that employs techniques like DLL side-loading and module stomping to evade detection by security tools. The loader then scans the environment for installed security software, such as those related to Kaspersky, Avast, BitDefender, AVG, Emsisoft, Webroot, and Microsoft, by calculating the CRC32 hash of the corresponding program.

Besides establishing persistence by means of scheduled tasks, the loader takes steps to subvert static signature detection before covertly executing Remcos RAT by injecting it into "chime.exe." The remote administration tool grants the attackers the ability to manage the endpoint, execute payloads, monitor activities, and steal data.

"Although marketed as legitimate system management software, its powerful intrusive capabilities make it frequently used by various malicious attackers for cyber espionage and data theft activities," the 360 Threat Intelligence Center said. "Through the graphical user interface (GUI) control panel provided by Remcos, attackers can perform batch automated management or precise manual interactive operations on the victim's host."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/russia-aligned-hackers-abuse-viber-to.html
如有侵权请联系:admin#unsafe.sh