Loading cryptocurrency prices...

Russia-Aligned Hackers Use Fake ESET to Target Ukraine Entities

Russia-aligned threat groups InedibleOchotense and RomCom conduct spear-phishing attacks targeting Ukrainian and Western organizations with advanced backdoors and exploit zero-day vulnerabilities since mid-2025.

  • A Russia-aligned threat group called InedibleOchotense has launched phishing attacks impersonating Cybersecurity firm ESET targeting Ukrainian organizations since May 2025.
  • The attacks use spear-phishing emails and messages with links to a trojanized ESET installer designed to install a C# backdoor named Kalambur, which employs the Tor network for command-and-control.
  • The threat is linked to the Sandworm Hacking group, known for destructive wiper Malware attacks in Ukraine across various sectors including government and energy.
  • The RomCom group exploited a critical WinRAR vulnerability in July 2025 in spear-phishing campaigns targeting European and Canadian companies, deploying multiple backdoors.

Since May 2025, a previously unknown Russia-aligned cyber threat cluster named InedibleOchotense has conducted spear-phishing attacks targeting Ukrainian organizations. The group impersonated ESET, a Slovak cybersecurity firm, by sending emails and Signal text messages with links to malicious installers mimicking ESET software, as stated in ESET’s APT Activity Report Q2 2025–Q3 2025.

- Advertisement -

These fake installers delivered the authentic ESET AV Remover tool alongside a C# backdoor known as Kalambur or SUMBUR, which leverages the Tor Anonymity network for command-and-control operations. The malware can also install OpenSSH and activate remote desktop access via RDP on port 3389. Domains such as esetsmart[.]com, esetscanner[.]com, and esetremover[.]com were used to host the malicious software.

InedibleOchotense shows connections to the Sandworm group (also called APT44), which CERT-UA has subdivided into clusters including UAC-0212 and UAC-0125. Sandworm is infamous for its wiper malware campaigns in Ukraine. In April 2025, it deployed wipers named ZEROLOT and Sting targeting a university, followed by further destructive malware attacks on government, energy, logistics, and grain sectors.

Separately, another Russia-aligned actor, RomCom (also known as Storm-0978 or UNC2596), conducted spear-phishing operations in mid-July 2025 using a zero-day vulnerability in WinRAR (CVE-2025-8088, CVSS score 8.8). The exploits targeted financial, manufacturing, defense, and logistics firms in Europe and Canada. Successful intrusions installed backdoors such as SnipBot, RustyClaw, and a Mythic agent, as reported by AttackIQ and ESET.

RomCom has evolved from a cybercrime tool to a utility supporting nation-state objectives, adapting its operations based on geopolitical developments linked to the ongoing conflict in Ukraine, as noted by security researchers.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Zcash Proposes Dynamic Fee Market to Tackle Rising Transaction Costs

A developer for ZCash proposed a new dynamic fee market to replace the current...

JPMorgan’s Dimon Embraces Blockchain, Shifts Crypto View

JPMorgan CEO Jamie Dimon has revised his position on cryptocurrency and blockchain technology.Dimon now...

San Jose Widow Loses $1M in Crypto Romance Scam Warned by ChatGPT

A San Jose widow lost nearly $1 million in a crypto fake investment scam...

OCC Head: Crypto Banks Should Get Same Federal Charter as Others

Jonathan Gould of the Office of the Comptroller of the Currency (OCC) states crypto...

Tether Joins €70M Boost for Italian Humanoid Robot Startup

Tether invested in Italian humanoid robotics startup Generative Bionics during a €70 million (approximately...
- Advertisement -

Must Read

How To Travel With Bitcoin: 9 Travel Companies Accepting Bitcoin

Bitcoin travel is a reality, as several travel companies now accept payments in cryptocurrencies for their services.Those who have opened a Bitcoin account on...