Russian Hackers Serve Up Malware with a Side of “ESET” – Ukrainian Systems on the Menu
InedibleOchotense, a Russia-linked group, spoofed ESET to launch phishing attacks on Ukraine, cleverly pairing real software with a sneaky backdoor. Their emails and Signal messages urged users to download “official threat removal software” from fake ESET domains, proving once again that even cybercriminals appreciate a good disguise.

Hot Take:
When it comes to cyber shenanigans, the Russia-linked InedibleOchotense group is taking the cake—or should we say, the borscht? Their latest escapade involves masquerading as the cybersecurity giant ESET to infiltrate Ukrainian systems. It’s like showing up to a potluck with a dish that’s half lasagna and half virus. Bon appétit!
Key Points:
– Russia-linked group InedibleOchotense impersonated ESET in phishing attacks.
– Victims received emails and Signal messages with links to fake ESET domains.
– The attack involved trojanized installers, installing both ESET software and a backdoor.
– The campaign shared tactics with previous UAC-0212 and BACKORDER downloader activities.
– Language errors in phishing messages hinted at poor translations from Russian to Ukrainian.
