Original Article Text

Click to Toggle View

Ukrainian military targeted in new Signal spear-phishing attacks. Ukraine's Computer Emergency Response Team (CERT-UA) is warning about highly targeted attacks employing compromised Signal accounts to send malware to employees of defense industry firms and members of the country's army forces. The bulletin mentions that the attacks started this month, with Signal messages containing archives posing as meeting reports. With some of these messages sent from existing contacts targets are familiar with, the chances of them opening the archives are higher. The archive contains a PDF and an executable file, the first acting as a lure for victims to open and trigger the launching of the second. The executable is classified as the DarkTortilla cryptor/loader, which, when launched, decrypts and executes the remote access trojan Dark Crystal RAT (DCRAT). CERT-UA says the activity has been tracked under UAC-0200, a threat cluster employing Signal in similar attacks since June 2024. However, in recent attacks, the phishing lures have been updated to reflect current vital topics in Ukraine, especially those related to the military sector. "Starting in February 2025, the bait messages have shifted their focus to topics related to UAVs, electronic warfare systems, and other military technologies," explains CERT-UA in its recent bulletin. In February 2025, Google Threat Intelligence Group (GTIG) reported that Russian hackers were abusing the legitimate "Linked Devices" feature in Signal to gain unauthorized access to accounts of interest. Signal users who consider themselves potential targets of espionage and spear-phishing attacks should turn off automatic downloads of attachments and be cautious of all messages, especially those containing files. Additionally, it is recommended that the list of linked devices on Signal be regularly checked to avoid becoming a proxy for attacks. Finally, Signal users should update their messenger apps to the latest version on all platforms and enable two-factor authentication for additional account protection. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

NATION STATE ACTIVITY // Ukrainian Military Hit by Signal-Based Spear-Phishing Attacks

Ukraine’s CERT-UA has issued warnings about spear-phishing attacks targeting the country's defense sector and military personnel using compromised Signal accounts.

The attacks involve sending malware-laden Signal messages masked as meeting reports from known contacts, increasing the likelihood of the targets engaging with the malicious content.

Enclosed in the messages are archives containing a PDF that acts as a decoy and an executable file, which when launched, deploys the DarkTortilla cryptor/loader.

The executable subsequently decrypts and executes Dark Crystal RAT (DCRAT), a remote access trojan that poses severe security threats.

These attacks are part of the UAC-0200 threat cluster, which has been using Signal for similar purposes since June 2024, with a notable pivot in February 2025 to topics like UAVs and electronic warfare.

Recommendations for Signal users include disabling automatic downloads of attachments, regularly monitoring linked devices, updating the app, and enabling two-factor authentication to enhance security.

This spear-phishing campaign highlights an escalation in cyber espionage tactics focusing on military technology and strategic assets.