Ukraine Under Siege: UAC-0099’s Cyber Shakedown and Gamaredon’s Phishing Frenzy!
CERT-UA warns of cyber attacks by UAC-0099 targeting Ukraine’s defense sector. Using phishing emails, they deploy malware like MATCHBOIL, MATCHWOK, and DRAGSTARE. The attack chain cleverly lures victims with court-related emails, dropping malware to steal data and execute remote commands.

Hot Take:
Ukraine’s cyber defenders must feel like they’re playing a never-ending game of digital whack-a-mole with UAC-0099. It’s like the threat actor is the annoying neighbor who keeps throwing wild parties, and CERT-UA is the exhausted resident constantly calling the cops to shut it down. But with malware names that sound like rejected Pokémon, who can take them seriously? Still, better keep those firewalls stocked with caffeine, because this is one “MATCH” they’re determined to win.
Key Points:
– UAC-0099 targets Ukrainian government and defense sectors using phishing emails.
– Malware used includes MATCHBOIL, MATCHWOK, and DRAGSTARE.
– Attacks exploit WinRAR vulnerabilities for malware propagation.
– Email lures mimic court summons using URL shorteners.
– Gamaredon group also targets Ukraine, using various stealthy malware tools.