UAC-0098 is a so-called access agent that gives extortion groups access to compromised systems. The group uses the IcedID banking trojan.
what is known
- TAG has been monitoring the UAC-0098 event since April. Then the hackers started a phishing campaign in which the AnchorMail backdoor (a modified Anchor developed by the Conti group) was distributed.
- His attacks are reportedly observed between mid-April and mid-June. Attackers often changed tactics and bait.
- Experts say that the targets are Ukrainian organizations (for example, hotel chains), and the hackers are posing as representatives of the Ukrainian National Cyber ​​Police or Elon Musk and the company StarLink.
- In subsequent campaigns targeting Ukrainian organizations and European NGOs, UAC-0098 distributed IcedID and Cobalt Strike payloads through phishing attacks.
Based on various indications, TAG believes that some members of UAC-0098 are ex-members of the Conti cybercriminal group, which has redirected its methods to attack Ukraine.
– UAC-0098 said researchers who found numerous matches between Trickbot and Conti.
According to the researchers, the activities of UAC-0098 are a clear example of how the boundaries between financially motivated and “government” attacks are blurring, and hackers can change their targets “to suit regional geopolitical interests.”
Source: 24 Tv
John Wilkes is a seasoned journalist and author at Div Bracket. He specializes in covering trending news across a wide range of topics, from politics to entertainment and everything in between.