The Latest Cyberthreat to Ukraine: HOMESTEEL Malware

Published:

spot_img

Recent Cyber Campaign Targeting Critical Ukrainian Data Repositories: Malware Variant HOMESTEEL by Threat Actor UAC-0218

A recent cyber campaign by the threat actor tracked as UAC-0218 has raised alarms in Ukraine, as a new malware variant named HOMESTEEL targets critical data repositories in the country. Ukraine’s Computer Emergency Response Team (CERT-UA) flagged this offensive, signaling a familiar tactic used by adversaries to steal sensitive information from government and business networks.

The phishing methods employed in this campaign involve emails with subject lines like “account” and “details,” leading recipients to a deceptive “eDisk” platform link. Upon clicking, users unwittingly download RAR files containing password-protected documents labeled as “Contract20102024.doc” and “Invoice20102024.xlsx.” A hidden Visual Basic Script file, “Password.vbe,” then triggers HOMESTEEL’s data extraction process.

HOMESTEEL goes beyond traditional malware by selectively targeting specific file types – such as xls, xlsx, doc, and pdf – within user directories. By utilizing HTTP PUT requests, the malware transfers extracted files under 10MB to an external server, evading detection while maximizing data collection.

Moreover, HOMESTEEL adapts to proxy settings on compromised systems, masking its network traffic and facilitating persistent surveillance. The malware relies on PowerShell commands to perform additional file reconnaissance, scouring directories for specific extensions and transferring files via HTTP POST requests for centralized storage.

The campaign’s infrastructure tactics link it to previous attacks back to August 2024, showcasing a pattern of using shared components and domain registrations for increased efficiency. As Ukraine continues to face evolving cyber threats, CERT-UA’s proactive monitoring of UAC-0218 highlights the importance of detecting and mitigating sophisticated malware campaigns like HOMESTEEL.

spot_img

Related articles

Recent articles

Dark Web Contest Awards $10,000 for Technical Writing on Vulnerability Exploitation

Dark Web Contest Awards $10,000 for Technical Writing on Vulnerability Exploitation In a notable shift within the underground cyber landscape, the TierOne forum has announced...

Kaspersky Report Reveals 1 Million Banking Accounts Compromised as E-Commerce Scams Surge to 85% of Financial Phishing in the Middle East

Kaspersky Report Reveals 1 Million Banking Accounts Compromised as E-Commerce Scams Surge to 85% of Financial Phishing in the Middle East In a significant shift...

The Strategic Framework Strengthening Security in Hospitality by 2026

The Strategic Framework Strengthening Security in Hospitality by 2026 The hospitality industry is evolving into a complex ecosystem where security plays a pivotal role in...

Hackers Exploit Kali Forms Vulnerability to Achieve Remote Code Execution on WordPress Sites

Hackers Exploit Kali Forms Vulnerability to Achieve Remote Code Execution on WordPress Sites A newly uncovered vulnerability in the Kali Forms plugin, a popular drag-and-drop...