Ethical Hacking News
Russia-linked APT group UAC-0184 has been identified as behind a recent campaign targeting Ukrainian military and government entities via Viber, delivering malicious ZIP files disguised as official documents. This operation highlights the sophistication and creativity of this APT group, which is likely seeking sensitive information related to Ukrainian military operations or government affairs.
The UAC-0184 (Hive0156) group has been identified as a major player in cyber espionage.The group launched a phishing attack campaign against Ukraine's Verkhovna Rada, targeting sensitive issues such as military personnel files and compensation for killed soldiers.The attack used Viber as the initial access vector, sending malicious ZIP archives disguised as official documents.The group exploited emotional vulnerability by tapping into sensitive themes, making it harder for targets to resist social engineering attempts.UAC-0184's tactics and techniques match those of known Russian-speaking APT groups like Fancy Bear and Cozy Bear.Ukrainian military and government entities must strengthen their security posture by increasing awareness training, implementing robust encryption protocols, and enhancing access controls.
The cybersecurity landscape continues to be shaped by an ever-evolving array of threat actors, each with their own unique modus operandi and tactics. In recent months, a Russia-linked Advanced Persistent Threat (APT) group known as UAC-0184 has been making headlines for its sophisticated exploits targeting Ukrainian military and government entities. This APT group, also known as Hive0156, has been identified by various threat intelligence sources as a major player in the world of cyber espionage.
According to recent reports from 360 Advanced Threat Research Institute, UAC-0184 launched a phishing attack campaign against Ukraine's Verkhovna Rada, targeting sensitive issues such as the alteration of Ukrainian military personnel files and the refusal to pay compensation for those killed in action. This level of sophistication is indicative of a highly organized and well-funded operation, with clear objectives and a sophisticated understanding of how to manipulate vulnerable targets.
The APT group leveraged Viber as the initial access vector, sending malicious ZIP archives (A2393.zip) disguised as official Ukrainian parliamentary documents. These ZIP files were designed to mimic the appearance and style of legitimate documents, making them even more convincing to unsuspecting recipients. Once opened, these files would initiate a multi-step infection process, which included the use of PowerShell scripts, legitimate programs, and other tactics designed to avoid detection.
One of the most striking aspects of this operation is the level of creativity and cunning displayed by UAC-0184. By exploiting sensitive themes such as military personnel record changes and denied compensation for fallen soldiers, the APT group was able to tap into a rich vein of emotional vulnerability, making it even more difficult for their targets to resist their attempts at social engineering.
Furthermore, the use of Viber as an initial access vector is particularly noteworthy. While not a new technique in itself, this particular implementation suggests that UAC-0184 has developed a keen understanding of how to exploit popular messaging platforms in Ukraine. This knowledge will undoubtedly prove useful for future operations, allowing the APT group to stay one step ahead of their adversaries.
At present, it is unclear what specific intelligence or data UAC-0184 seeks to extract from its targets. However, given the nature of this operation and the sophistication displayed by the APT group, it is likely that they are seeking sensitive information related to Ukrainian military operations or government affairs.
The attribution of this operation to a specific Russia-linked APT group has been confirmed by various threat intelligence sources, including 360 Advanced Threat Research Institute. These experts have noted that UAC-0184's tactics and techniques closely match those associated with other known Russian-speaking APT groups, such as Fancy Bear and Cozy Bear.
In light of this new information, it is clear that Ukrainian military and government entities must take immediate action to strengthen their security posture. This may involve increasing awareness training for personnel, implementing robust encryption protocols, and enhancing access controls to prevent unauthorized access to sensitive systems and data.
Furthermore, it would be advisable for these organizations to closely monitor their communication channels, particularly those using popular messaging platforms like Viber. By staying vigilant and proactive, they can reduce the risk of falling victim to similar operations in the future.
In conclusion, the exploits attributed to UAC-0184 offer a sobering reminder of the ever-present threat posed by sophisticated APT groups. As we move forward into 2026, it is clear that cybersecurity will remain an increasingly critical challenge for organizations around the world.
Related Information:
https://www.ethicalhackingnews.com/articles/Russia-linked-APT-UAC-0184-Exploits-Viber-to-Spy-on-Ukrainian-Military-in-2025-ehn.shtml
Published: Mon Jan 5 17:09:50 2026 by llama3.2 3B Q4_K_M