Pro-Russian hackers pose as Ukraine's cyber agency to target government, businesses
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户的要求很明确,不需要用“文章内容总结”或“这篇文章”这样的开头,直接写描述即可。 首先,我得仔细阅读这篇文章。文章讲的是一个亲俄的黑客组织冒充乌克兰国家网络安全团队,进行钓鱼攻击。目标是政府机构、企业和教育机构等。他们发送邮件,谎称俄罗斯准备发动大规模网络攻击,并诱骗受害者下载带有恶意软件的文件。 接下来,恶意软件AgeWheeze可以远程控制电脑,具备多种功能。攻击主要针对多个行业的机构,但成功率不高,只感染了少量设备。CERT-UA认为这次攻击可能与CyberSerp黑客组织有关,并且该组织在Telegram上声称对攻击负责。 用户可能需要这个总结用于快速了解事件的关键点,比如攻击者是谁、目标是什么、使用的手段以及结果如何。因此,在总结时要涵盖这些核心信息:亲俄黑客冒充乌克兰团队、钓鱼邮件内容、恶意软件功能、目标行业、攻击结果以及可能的幕后组织。 现在,我需要把这些信息浓缩到100字以内。确保每个关键点都简明扼要地表达出来,避免冗余。例如,“亲俄黑客冒充乌克兰国家网络安全团队”已经涵盖了攻击者的身份和手段,“诱导下载恶意软件AgeWheeze”说明了使用的工具及其功能。 最后,检查字数是否符合要求,并确保语句通顺自然。这样用户就能迅速获取到事件的主要信息。 </think> 亲俄黑客冒充乌克兰国家网络安全团队发起钓鱼攻击,诱导受害者下载恶意软件AgeWheeze以远程控制设备,主要针对政府、医疗、金融等机构,成功率低,部分感染来自教育机构员工设备,CERT-UA认为与CyberSerp组织有关。 2026-3-31 14:30:47 Author: therecord.media(查看原文) 阅读量:6 收藏

A pro-Russian hacker group impersonated Ukraine’s national cyber incident response team in a phishing campaign targeting government agencies, businesses, and other institutions, Ukrainian cybersecurity officials said.

Researchers from Ukraine’s computer emergency response team (CERT-UA) said Sunday the attackers, tracked as UAC-0255, sent emails last week posing as the agency. The messages arned recipients about a supposed “large-scale cyberattack” allegedly being prepared by Russia against Ukrainian critical infrastructure.

The emails urged recipients to download a password-protected archive from the file-sharing service Files.fm and install what was described as specialized security software meant to protect vulnerable systems. The hackers warned that ignoring the message could lead to “serious consequences.”

The file contained a remote administration tool dubbed AgeWheeze, which allows attackers to remotely control infected computers. According to CERT-UA, the malware supports a wide range of capabilities, including executing commands, managing files and processes, streaming screen content, emulating mouse and keyboard input, and accessing the clipboard.

The phishing emails targeted organizations across multiple sectors, including government institutions, medical centers, financial companies, security firms, universities, and software developers.

CERT-UA said the campaign was largely unsuccessful and resulted in only a small number of infections, mainly on personal devices belonging to employees of educational institutions.

The agency said the operation may be linked to the CyberSerp hacker group, which later claimed responsibility for the attack on its Telegram channel. CERT-UA said it found the phrase “From Cyber Serp with Love” embedded in the code of a fake website used in the campaign.

In posts on Telegram, the group claimed it had sent malicious emails to roughly one million users of Ukr.net, a widely used Ukrainian email service, and compromised more than 200,000 devices. CERT-UA did not confirm those figures.

The hackers also praised CERT-UA’s investigation and thanked the agency for what they described as “advertising” their Telegram channel.

Emerging threat actor

CyberSerp is a relatively new threat actor targeting Ukraine. Its Telegram channel was created in November 2025, where the group describes itself as a “cyber-partisan movement” and claims Ukrainian origins.

The group has previously attempted to recruit collaborators in Ukraine, promising payment for “valuable information.”

CyberSerp has also claimed responsibility for a separate alleged breach of the Ukrainian cybersecurity company Cipher, alleging it obtained a full dump of the company’s servers, including internal correspondence and a database of clients that allegedly included government institutions.

Cipher acknowledged that attackers compromised the credentials of an employee at one of its contractors but said there was no breach of its core infrastructure. According to the company, the compromised account had access only to a single project that did not contain sensitive security information or personal data.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/pro-russian-hackers-posing-as-ukrainian-cyber-agency
如有侵权请联系:admin#unsafe.sh