In recent news, the financially motivated organization UAC-0006 has been heavily targeting Ukraine through aggressive phishing attempts. Utilizing ZIP and RAR attachments in their emails, this group has been distributing the SMOKELOADER malware to compromise systems.
The attacks have become more sophisticated in the latest incidents, with emails containing Microsoft Access files and ZIP archives that, once opened, install weaponized malware such as RMS and TALESHOT on the compromised systems. This has caught the attention of Ukraine’s government computer emergency response team, CERT-UA, who have noticed the increased activity of UAC-0006.
According to reports from CERT-UA, there have been at least two campaigns launched by the attackers to spread the SMOKELOADER malware as of May 21, 2024. This malware primarily targets Windows-based devices and is known to install other malicious software like ransomware, cryptominers, or password stealers once it infects a system. The consequences of such an infection can be severe, including file corruption, data theft, and other harmful effects.
The recent attacks have seen emails carrying ZIP archives that may contain .IMG files with EXE files embedded within, as well as Microsoft Access (ACCDB) documents with macros designed to execute PowerShell commands to download and launch the EXE files. After a successful initial attack, RMS, TALESHOT, and other malicious applications are loaded onto the compromised machines. Reports indicate that several hundred PCs are currently part of the bot network created by UAC-0006, raising concerns about potential fraud via remote banking systems in the near future.
In response to these threats, it is recommended that companies take immediate steps to enhance the security of their automated accounting workspaces. This includes reviewing signs of compromise and ensuring that proper policies and security measures are in place to mitigate the risks posed by UAC-0006’s activities. SOC Prime Platform offers detection algorithms that have been curated and tested to help defenders thwart attacks associated with UAC-0006, as outlined in CERT-UA’s recent notice.
As the attacks continue to evolve and become more sophisticated, it is crucial for organizations to stay vigilant and proactive in protecting their systems and sensitive information. By following the recommendations provided and leveraging the tools and resources available, businesses can strengthen their defenses against malicious actors like UAC-0006 and safeguard their operations from cyber threats.

