In a development that has sent shockwaves through the cybersecurity community, a group of hackers has initiated a targeted onslaught, labeled as UAC-0212, with the aim of breaching critical infrastructure facilities in Ukraine. This calculated campaign, which commenced in the latter part of 2024, employs intricate methods to infiltrate the networks of developers and suppliers of automation and process control solutions. The primary objective of the attackers is to disrupt the information and communication systems (ICS) of businesses operating in crucial sectors such as energy, water, and heat supply.
What sets the UAC-0212 campaign apart is its utilization of innovative tactics, including the dissemination of PDF documents embedded with malevolent links. These links exploit the CVE-2024-38213 vulnerability, which triggers the download of an LNK file. Once initiated, this file activates a PowerShell command that presents a decoy document while clandestinely downloading and installing malicious EXE/DLL files onto the system. Tools such as SECONDBEST, EMPIREPAST, SPARK, and CROOKBAG have been identified as being part of this sophisticated operation. Furthermore, the use of RSYNC for extended document theft underscores the assailants’ intent to acquire sensitive data.
The scope of the attack is wide-ranging, encompassing companies from various countries including Serbia, the Czech Republic, and of course, Ukraine. From July 2024 to February 2025, numerous logistics and equipment manufacturing firms fell victim to these cyber intrusions. The perpetrators often masquerade as potential clients, engaging in prolonged correspondence with targets to build rapport before sending malicious documents. This approach allows them to swiftly navigate through the network, establishing a foothold on servers and workstations shortly after the initial breach.
The repercussions of the UAC-0212 campaign underscore the escalating menace posed to critical infrastructure on a global scale. Merely identifying and reinstating affected systems may not suffice given the rapid propagation capabilities of the attackers. CERT-UA has issued a stern advisory, calling on supplier companies to seek their assistance for thorough technical investigations and incident response strategies. The agency is supplying cyber threat indicators and advocating heightened vigilance among potentially targeted enterprises. With the evolving threat landscape, it becomes imperative for organizations, especially those integral to critical infrastructure, to bolster their cybersecurity defenses. Employing advanced threat detection mechanisms and conducting routine network assessments can aid in thwarting such attacks.
The persistent nature of these cyber assaults emphasizes the necessity for continuous monitoring and collaboration among cybersecurity entities to effectively combat emergent threats. As organizations grapple with the evolving cybersecurity landscape, staying abreast of the latest security protocols and leveraging cutting-edge technologies will be vital in safeguarding critical infrastructure from malicious cyber activities.

