Network Security, Threat Intelligence, Malware

Ukrainian orgs targeted with PicassoLoader malware

(Adobe Stock)

Organizations across Ukraine were noted by the country's Computer Emergency Response Team to have been targeted by Belarus-linked advanced persistent threat operation GhostWriter, also known as UAC-0057, in attacks distributing the PicassoLoader malware, Security Affairs reports.

Intrusions conducted from July 12 to 18 involved the utilization of malicious documents associated with taxation, local government reform, and financial and economic measurements to spread PicassoLoader and eventually result in Cobalt Strike Beacon delivery, according to a report from CERT-UA.

"Based on this, it can be inferred that UAC-0057 might have targeted both project office specialists and their counterparts among the employees of relevant local government bodies in Ukraine," said CERT-UA.

Such a development comes four years after organizations in Belarus were targeted by GhostWriter prior to the 2020 elections, with Belarusian authorities later apprehending some of the opposition members impacted by the hacking operation.

An In-Depth Guide to Network Security

Get essential knowledge and practical strategies to fortify your network security.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.

You can skip this ad in 5 seconds