{"id":322705,"date":"2025-08-06T14:25:09","date_gmt":"2025-08-06T14:25:09","guid":{"rendered":"https:\/\/www.europesays.com\/uk\/322705\/"},"modified":"2025-08-06T14:25:09","modified_gmt":"2025-08-06T14:25:09","slug":"hackers-using-fake-summonses-in-attacks-on-ukraines-defense-sector","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/uk\/322705\/","title":{"rendered":"Hackers using fake summonses in attacks on Ukraine&#8217;s defense sector"},"content":{"rendered":"<p class=\"paragraph\"> Hackers have been sending fake summons emails purportedly from Ukrainian courts to target the country\u2019s government, military and defense sector in a new cyberespionage campaign, researchers have found. <\/p>\n<p class=\"paragraph\"> The attackers behind the campaign \u2014 tracked as UAC-0099 by Ukraine\u2019s computer emergency response team (CERT-UA) \u2014 have been active in the country since at least 2022 and have gained unauthorized remote access to dozens of local computers, Ukrainian cybersecurity authorities previously <a href=\"https:\/\/cert.gov.ua\/article\/4818341\" target=\"_blank\" rel=\"noopener noreferrer\">said<\/a>. <\/p>\n<p class=\"paragraph\"> In the latest operation, the hackers sent phishing emails disguised as court summonses. These messages included links to legitimate file-sharing platforms that delivered archive files bundled with malware. <\/p>\n<p class=\"paragraph\"> The primary malware used in the campaign, dubbed Matchboil, collects system data and deploys additional malicious tools \u2014 including Matchwok, a backdoor that enables remote command execution, and Dragstare, a stealer that extracts browser data such as passwords, cookies, and desktop files. <\/p>\n<p class=\"paragraph\"> CERT-UA did not disclose how many systems were affected or the volume of data compromised. While the agency hasn\u2019t attributed the attacks to a specific nation-state, the tactics and targeting patterns resemble previous operations by Russian hackers. <\/p>\n<p class=\"paragraph\"> Ukraine\u2019s cyber agency had previously <a href=\"https:\/\/cip.gov.ua\/services\/cm\/api\/attachment\/download?id=68769\" target=\"_blank\" rel=\"noopener noreferrer\">linked<\/a> UAC-0099 to a wave of attacks in late 2024 targeting forestry departments, forensic institutions, and industrial facilities. At the time, the group used a different malware strain known as Lonepage, which now appears to have been replaced by Matchboil in more recent operations. <\/p>\n<p class=\"paragraph\"> \u201cThe change in tactics, techniques, procedures, and tooling indicates the evolving and persistent nature of the cyber threat,\u201d the researchers said. <\/p>\n<p class=\"paragraph\"> CERT-UA reports typically offer limited technical detail but provide rare insights into ongoing cyber operations amid the broader conflict between Ukraine and Russia. <\/p>\n<p class=\"paragraph\"> In earlier disclosures, the agency <a href=\"https:\/\/therecord.media\/hackers-impersonate-drone-companies-state-agencies-spy-ukraine\" target=\"_blank\" rel=\"noopener noreferrer\">warned<\/a> that hackers had impersonated Ukrainian drone manufacturers and state institutions to infect military and government systems with data-stealing malware. Another campaign <a href=\"https:\/\/therecord.media\/ukraine-new-russian-malware-social-engineering-signal-chats\" target=\"_blank\" rel=\"noopener noreferrer\">observed<\/a> in June involved malware linked to Russia\u2019s military intelligence service, delivered via the Signal messaging app. <\/p>\n<p>Get more insights with the <\/p>\n<p>Recorded Future<\/p>\n<p>Intelligence Cloud.<\/p>\n<p><a class=\"underline\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/www.recordedfuture.com\/platform?mtm_campaign=ad-unit-record\">Learn more.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Hackers have been sending fake summons emails purportedly from Ukrainian courts to target the country\u2019s government, military and&hellip;\n","protected":false},"author":2,"featured_media":322706,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7654],"tags":[2000,299,657],"class_list":{"0":"post-322705","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ukraine","8":"tag-eu","9":"tag-europe","10":"tag-ukraine"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@uk\/114982284395972019","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/322705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/comments?post=322705"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/posts\/322705\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media\/322706"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/media?parent=322705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/categories?post=322705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/uk\/wp-json\/wp\/v2\/tags?post=322705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}