Ukrainian Army Under Attack by Hackers Using Fake Military Apps

Published:

spot_img

Cyberwarfare Strikes Ukrainian Army: Malware-Laden Fake Military Apps Target Soldiers

In the midst of escalating tensions between Kyiv and Moscow, a new battlefield has emerged for cyber warfare: the pockets of Ukrainian army personnel. Cyber attackers have recently targeted Ukrainian military servicemen by posing as legitimate sources and luring them into downloading fake military apps embedded with malware. The goal was to steal authentication credentials and GPS coordinates from soldiers’ phones, potentially endangering lives on the battlefield.

The Ukrainian Computer Emergency Response Team (CERT-UA) collaborated with key military units to identify and neutralize two cyberattacks aimed at infiltrating mobile devices of military personnel. Attackers distributed fraudulent links disguised as legitimate apps for critical military systems, including the AI-based GRISELDA system and the military tracking system known as “Eyes.”

Hackers have evolved their tactics, shifting from targeting networks to exploiting the devices soldiers carry. By using secure messaging apps like Signal to distribute malicious links mimicking official military websites, attackers were able to trick soldiers into downloading malware disguised as mobile applications for GRISELDA and Eyes.

The malicious software, known as HYDRA, was designed to steal data and remotely access infected devices, potentially compromising sensitive military information. The attack on the Eyes tracking system posed an additional threat by allowing hackers to steal login credentials and GPS coordinates, enabling real-time tracking of soldiers.

The incident underscores the critical importance of mobile device security for military personnel. As warfare increasingly moves into the digital realm, nations must prioritize cybersecurity measures to protect against sophisticated cyber threats targeting mobile devices. The swift response and collaboration between CERT-UA, military units, and private sector cybersecurity specialists highlight the need for proactive defense mechanisms in the face of evolving cyber warfare tactics.

spot_img

Related articles

Recent articles

Webinar: Uncovering Suspicious APK Files in Wedding Card and Loan App Scams

The surge of malicious APK files in cyber fraud schemes, such as fake wedding invitations and instant loan applications, has become a growing concern....

Skylon Partners with COBNB to Launch COBNB+ Featuring L’Occitane en Provence Hotel Amenities

Skylon Partners with COBNB for a Luxurious Hospitality Experience in Kuala Lumpur Introduction to the New Partnership In an exciting development for the hospitality scene in...

Understanding CISA KEV: Key Insights and Tools for Security Teams

Understanding the CISA Known Exploited Vulnerability (KEV) Catalog The Cybersecurity and Infrastructure Security Agency (CISA) maintains the Known Exploited Vulnerability (KEV) catalog, a resource designed...

Dark Web Leak Sparks WFH Job Scams; Prayagraj Police Freeze ₹2 Crore in Fraudulent Funds

Rising Cybercrime in Prayagraj: A New Target Shifting Tactics of Cybercriminals In Prayagraj, the landscape of cybercrime is evolving. Previously, scammers predominantly targeted victims through enticing...