October 31st, 2024

Russia Targeting Ukrainian Military Recruits with Android, Windows Malware

Google reported a Russian cyberespionage campaign, UNC5812, targeting Ukrainian military recruits through malware on Telegram. The campaign aims to disrupt mobilization efforts and discredit the military, prompting Google to intervene.

Read original articleLink Icon
Russia Targeting Ukrainian Military Recruits with Android, Windows Malware

Google has reported a Russian cyberespionage campaign aimed at Ukrainian military recruits, identified as UNC5812. This operation involves a Telegram persona named Civil Defense, which distributes malware disguised as software for locating military recruiters. On Android devices lacking Google Play Protect, users unknowingly install malware such as CraxsRat and SunSpinner, which can steal sensitive information and monitor device activity. Windows users are targeted with the Pronsis Loader, leading to further malware infections including PureStealer, designed to exfiltrate browser data and cryptocurrency information. The campaign, which became fully operational in September 2024, utilizes promoted posts on Ukrainian-language Telegram channels to drive traffic to the Civil Defense website, which falsely claims to protect user anonymity. The site also features anti-mobilization content aimed at discrediting the Ukrainian military. Google has alerted Ukrainian authorities, blocked the malicious website, and added the identified malware to its Safe Browsing service. The campaign reflects ongoing efforts by pro-Russian actors to undermine Ukraine's military mobilization, particularly following the introduction of a national digital military ID system.

- Russian cyberespionage campaign targets Ukrainian military recruits.

- Malware is distributed via a Telegram channel disguised as useful software.

- Android and Windows users are both targeted with different types of malware.

- The campaign aims to discredit the Ukrainian military and disrupt mobilization efforts.

- Google has taken steps to block the malicious website and inform Ukrainian authorities.

Link Icon 0 comments