The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert about a sophisticated cyberattack campaign actively targeting Ukrainian government agencies and other critical infrastructure since 2024.
The attackers behind this campaign, tracked as UAC-0219, have deployed a stealer tool known as WRECKSTEEL, using phishing lures and publicly hosted scripts to steal data and screenshots from compromised computers.
According to CERT-UA, the attack chain starts with a well-crafted phishing email, often impersonating known agencies or HR departments. The emails reference various administrative topics—such as changes to salaries—and include a link to a file hosted on a legitimate-looking public sharing service like DropMeFiles.
The primary role of the email is to convince people it's real and relatable by using a topic that people would find interesting.
Victims who click the link are led to download a malicious file disguised as a document. Despite filenames such as "Spisok_spivrobitnykiv_na_zmenshennya_zarobitnoyi_platy_27_03_PDF.js", the file is not a PDF but a JavaScript-based VBScript loader. Once opened, the script launches a remote PowerShell payload.
The PowerShell script—retrieved from an attacker-controlled server (http://107[.]189[.]20[.]74/scream.ps1)—executes a series of data collection and exfiltration tasks:
This method allows the attackers to steal sensitive information and monitor user activity over time, making the campaign very difficult to detect.
CERT-UA says that earlier iterations of this attack, in 2024, used NSIS-packed executables. On the other hand, these new EXE files included:
As of 2025, attackers have streamlined their toolkit and replaced third-party tools with native PowerShell functionality.
The activity is attributed to the threat actor group UAC-0219. The group appears to be focused on espionage and data theft from Ukraine's public institutions and infrastructure-related entities.
CERT-UA has classified the malicious toolset used in these attacks as WRECKSTEEL, with known variants written in both VBScript and PowerShell.
tags
Silviu is a seasoned writer who followed the technology world for almost two decades, covering topics ranging from software to hardware and everything in between.
View all postsMay 16, 2025