Threat Intelligence, Phishing, Malware

New APT28-linked cyberespionage campaign aimed at Central Asia

Cyber security concept. Toy horse on a digital screen, symbolizes the attack of the Trojan virus. 3D illustration.

Central Asian diplomatic entities have been subjected to an ongoing cyberespionage campaign by hacking group UAC-0063, which has been linked to Russian state-backed threat operation APT28, according to The Record, a news site by cybersecurity firm Recorded Future.

UAC-0063 leveraged trojanized legitimate documents from Kazakhstan's Ministry of Foreign Affairs tackling the country's diplomatic cooperation with other nations between 2021 and 2024 to facilitate the distribution of the Hatvibe and Cherryspy payloads, a report from Sekoia revealed. While both malware strains had already been used in older cyberespionage intrusions against Ukraine and Asia, UAC-0063's attacks have been primarily focused on circumventing detection by security systems. "The objective of this partially uncovered campaign is likely to gather strategic and economic intelligence on Kazakhstan's relations with Western and Central Asian countries, aiming to preserve Russia's influence in a region historically within its sphere of control," said researchers.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds