Targeted cyberattacks on the defense sector recorded in Ukraine via a popular messenger.
19.03.2025
2147

Journalist
Shostal Oleksandr
19.03.2025
2147

The CERT-UA team has detected cyberattacks on employees of the defense industry and the Armed Forces of Ukraine.
In March 2025, messages containing reports were found in the Signal messenger. Some messages were sent from individuals with compromised accounts to increase trust.
Typically, these archives contain a .pdf file and an executable file named DarkTortilla. DarkTortilla is a crypter/loader used to launch the remote control program Dark Crystal RAT (DCRAT).
'It should be noted that this activity has been tracked under the identifier UAC-0200 since at least the summer of 2024. Meanwhile, starting in February 2025, the content of the bait messages relates to UAVs, electronic warfare means, etc. The use of popular messengers, both on mobile devices and computers, significantly expands the attack surface, including by creating uncontrolled (in terms of protection means) channels for information exchange,' - CERT-UA reported.
Read also
- The 'Shahed' Swarms Are Now a Reality: Russia Has Significantly Increased the Production and Frequency of Drone Strikes, - WSJ
- 'All of Ukraine is ours': Putin again speaks about brotherly nations
- Zelensky imposed sanctions on the developers of UAVs 'Geran' and 'Orlan-10'
- The Russian Army has increased the number of airstrikes in Chernihiv region
- Dutch Defense Minister: The Ukrainian Army is Among the Most Innovative in Europe in Certain Aspects
- Russians are regrouping: attacks in the Novopavlivka direction have decreased