Russia-Aligned Hackers Use Fake ESET to Target Ukraine Entities

Russia-aligned threat groups InedibleOchotense and RomCom conduct spear-phishing attacks targeting Ukrainian and Western organizations with advanced backdoors and exploit zero-day vulnerabilities since mid-2025.

  • A Russia-aligned threat group called InedibleOchotense has launched phishing attacks impersonating Cybersecurity firm ESET targeting Ukrainian organizations since May 2025.
  • The attacks use spear-phishing emails and messages with links to a trojanized ESET installer designed to install a C# backdoor named Kalambur, which employs the Tor network for command-and-control.
  • The threat is linked to the Sandworm Hacking group, known for destructive wiper Malware attacks in Ukraine across various sectors including government and energy.
  • The RomCom group exploited a critical WinRAR vulnerability in July 2025 in spear-phishing campaigns targeting European and Canadian companies, deploying multiple backdoors.

Since May 2025, a previously unknown Russia-aligned cyber threat cluster named InedibleOchotense has conducted spear-phishing attacks targeting Ukrainian organizations. The group impersonated ESET, a Slovak cybersecurity firm, by sending emails and Signal text messages with links to malicious installers mimicking ESET software, as stated in ESET’s APT Activity Report Q2 2025–Q3 2025.

- Advertisement -

These fake installers delivered the authentic ESET AV Remover tool alongside a C# backdoor known as Kalambur or SUMBUR, which leverages the Tor Anonymity network for command-and-control operations. The malware can also install OpenSSH and activate remote desktop access via RDP on port 3389. Domains such as esetsmart[.]com, esetscanner[.]com, and esetremover[.]com were used to host the malicious software.

InedibleOchotense shows connections to the Sandworm group (also called APT44), which CERT-UA has subdivided into clusters including UAC-0212 and UAC-0125. Sandworm is infamous for its wiper malware campaigns in Ukraine. In April 2025, it deployed wipers named ZEROLOT and Sting targeting a university, followed by further destructive malware attacks on government, energy, logistics, and grain sectors.

Separately, another Russia-aligned actor, RomCom (also known as Storm-0978 or UNC2596), conducted spear-phishing operations in mid-July 2025 using a zero-day vulnerability in WinRAR (CVE-2025-8088, CVSS score 8.8). The exploits targeted financial, manufacturing, defense, and logistics firms in Europe and Canada. Successful intrusions installed backdoors such as SnipBot, RustyClaw, and a Mythic agent, as reported by AttackIQ and ESET.

RomCom has evolved from a cybercrime tool to a utility supporting nation-state objectives, adapting its operations based on geopolitical developments linked to the ongoing conflict in Ukraine, as noted by security researchers.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Stablecoins to Dominate Payments in Decade: Druckenmiller

Billionaire investor Stanley Druckenmiller believes global payment systems could be powered by stablecoins within...

Court Deals Final Blow to Crypto Bank’s Fed Access

A US federal appeals court has ended Custodia Bank's five-year legal battle, ruling the...

Ripple Fixes XRP Ledger Node Crash Bug

Ripple released a crucial bug fix in version 3.1.2 of its "rippled" server software...

Bitcoin Tax Exemption Window Targets 2026, Report Says

The Bitcoin Policy Institute (BPI) is targeting a March-August 2026 window to pass a...

Meta to End Instagram Encrypted Chat in May

Meta will end encrypted Instagram chats after May 8, 2026.The move follows internal warnings...

Must Read

17 Best Audiobooks On Blockchain Technology For Beginners

If you're looking to dive into the world of blockchain technology, you're in for a treat. The field is rapidly evolving and the potential...