Ukrainian Defense Faces Increased Threats as Viber Becomes Target for Russian Hackers

Ukrainian Defense Faces Increased Threats as Viber Becomes Target for Russian Hackers

In 2025, UAC-0184 escalates cyberattacks on Ukraine, utilizing Viber to deploy malware that silently infiltrates military systems, raising significant security concerns.

NeboAI I summarize the news with data, figures and context
IN 30 SECONDS

IN 1 SENTENCE

SENTIMENT
Neutral

𒀭
NeboAI is working, please wait...
Preparing detailed analysis
Quick summary completed
Extracting data, figures and quotes...
Identifying key players and context
DETAILED ANALYSIS
SHARE

NeboAI produces automated editions of journalistic texts in the form of summaries and analyses. Its experimental results are based on artificial intelligence. As an AI edition, texts may occasionally contain errors, omissions, incorrect data relationships and other unforeseen inaccuracies. We recommend verifying the content.

A significant increase in cyber threats targeting Ukrainian military and government organizations has been noted in 2025, primarily attributed to the Russia-aligned group known as UAC-0184, also referred to as Hive0156. This group has been utilizing the Viber messaging platform to distribute malicious ZIP files containing deceptive Windows shortcut files that mimic official Microsoft documents.

The 360 Threat Intelligence Center highlighted that these attacks are characterized by high-intensity intelligence gathering efforts. Initially documented by CERT-UA in January 2024, the group has evolved its tactics, also employing messaging services like Signal and Telegram to facilitate malware distribution.

The malicious process involves using PowerShell scripts to silently execute the Hijack Loader, which subsequently paves the way for Remcos RAT infections. This remote administration tool enables attackers to monitor activities, manage endpoints, and extract sensitive data, significantly enhancing their cyber espionage capabilities.

The loader is designed to avoid detection by security software, including popular brands such as Kaspersky and Avast, by employing sophisticated techniques like DLL side-loading and module stomping. In addition, it establishes persistence through scheduled tasks, further complicating mitigation efforts against such intrusions.

Want to read the full article? Access the original article with all the details.
Read Original Article
TL;DR

This article is an original summary for informational purposes. Image credits and full coverage at the original source. · View Content Policy

Editorial
Editorial Staff

Our editorial team works around the clock to bring you the latest tech news, trends, and insights from the industry. We cover everything from artificial intelligence breakthroughs to startup funding rounds, gadget launches, and cybersecurity threats. Our mission is to keep you informed with accurate, timely, and relevant technology coverage.

Press Enter to search or ESC to close