UAC-0063’s Mischief: How Cyber Espionage is Turning Europe into a Malware Playground
UAC-0063, an advanced persistent threat group, is back at it again, using stolen documents to spread the HATVIBE malware. With a toolkit that includes DownExPyer and PyPlunderPlug, they’re targeting government entities for espionage. It’s like a spy movie, but with less glamour and more Python scripts.

Hot Take:
UAC-0063: bringing the fine art of cyber espionage to a government near you! These guys are the Michelangelo of malware, chiseling away at privacy with precision and flair. Who knew hacking could be so… cultured?
Key Points:
- UAC-0063 is an APT group exploiting confidential documents to spread malware, targeting European embassies.
- The group has ties to Russian state-sponsored actor APT28 and has been active since at least 2021.
- Recent campaigns involve spear-phishing using stolen documents to deploy the HATVIBE malware.
- UAC-0063’s arsenal includes DownEx, DownExPyer, LOGPIE, and PyPlunderPlug, focused on espionage.
- The group’s operations highlight potential Russian strategic interests in targeted government entities.
Already a member? Log in here