Malware, Critical Infrastructure Security

Ukrainian defense sector hit with Dark Crystal RAT

Credit: Getty Images

Ukrainian military and defense contractors, as well as representatives of its Defense Forces were disclosed by the country's Computer Emergency Response Team to have been targeted with the Dark Crystal RAT malware, also known as DCRat, as part of a new attack campaign identified this month, The Hacker News reports.

Attackers, tracked under the UAC-0200 threat cluster, leveraged the Signal messaging app to deliver messages purportedly containing minutes of the meeting reports as archive files, which when opened facilitated the execution of the DarkTortilla crypter that deploys DCRat, according to the CERT-UA. Such a report from the CERT-UA comes after Signal was alleged by Ukrainian National Security and Defense Council Deputy Secretary Serhii Demediuk to have withdrawn support for the country's efforts against Russian cyber threats, an assertion which has since been repudiated by the encrypted messaging platform. "We don't officially work with any gov, Ukraine or otherwise, and we never stopped. We're not sure where this came from or why," said Signal CEO Meredith Whittaker.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

Related Terms

Adware

You can skip this ad in 5 seconds