<rss version="2.0"
    xmlns:dc="http://purl.org/dc/elements/1.1/"
    xmlns:content="http://purl.org/rss/1.0/modules/content/"
    xmlns:atom="http://www.w3.org/2005/Atom"
    xmlns:media="http://search.yahoo.com/mrss/">
    <channel><title>Consumer Insights</title><description>News, views and insights from the Bitdefender experts</description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/</link><image><url>https://download.bitdefender.com/resources/images/favicon/favicon-32x32.png</url><title>Consumer Insights</title><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/</link></image><generator>Bitdefender Blog</generator><lastBuildDate>Fri, 03 Apr 2026 17:45:49 GMT</lastBuildDate><atom:link href="https://www.bitdefender.com/nuxt/api/en-gb/rss/hotforsecurity/ukraine" rel="self" type="application/rss+xml"/><ttl>1800</ttl><item><title>Fake CERT-UA emails push AGEWHEEZE in mass Ukraine phishing wave</title><description><![CDATA[A CERT-UA spoofing campaign used fake security tools to spread remote access malware to numerous email addresses.


CERT-UA used as a phishing lure

Ukraine’s cyber defenders are warning of a phishing operation that abused the CERT-UA brand to trick people into installing malware disguised as protection software. According to the agency, the activity was tied to UAC-0255 and relied on emails sent on March 26 and 27 to a broad mix of targets, including public sector bodies, healthcare providers, ]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/cert-ua-emails-agewheeze-phishing</link><guid isPermaLink="false">69ce50222fa53a9f2eef5aee</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Thu, 02 Apr 2026 11:19:20 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2026/04/le-vu-vSlCNmZdjHQ-unsplash.jpg" medium="image"/><content:encoded><![CDATA[A CERT-UA spoofing campaign used fake security tools to spread remote access malware to numerous email addresses.


CERT-UA used as a phishing lure

Ukraine’s cyber defenders are warning of a phishing operation that abused the CERT-UA brand to trick people into installing malware disguised as protection software. According to the agency, the activity was tied to UAC-0255 and relied on emails sent on March 26 and 27 to a broad mix of targets, including public sector bodies, healthcare providers, ]]></content:encoded></item><item><title>Ukraine claims to have hacked secrets from Russia's newest nuclear submarine</title><description><![CDATA[Ukraine's Defence Intelligence agency (HUR) claims that its hackers have successfully stolen secret files and classified data on a state-of-the-art Russian nuclear submarine, the “Knyaz Pozharsky."

The “Knyaz Pozharsky” is nuclear-powered ballistic missile submarine, that was commissioned into the Russian Navy's Northern Fleet at a shipyard in Severodvinsk during a ceremony overseen by Russian President Vladimir Putin on 24 July 2025.

The submarine features advanced stealth facilities, designe]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/ukraine-claims-to-have-hacked-secrets-from-russias-newest-nuclear-submarine</link><guid isPermaLink="false">68935a37d6c94204d9818000</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Graham CLULEY</dc:creator><pubDate>Wed, 06 Aug 2025 13:37:11 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/08/submarine.jpeg" medium="image"/><content:encoded><![CDATA[Ukraine's Defence Intelligence agency (HUR) claims that its hackers have successfully stolen secret files and classified data on a state-of-the-art Russian nuclear submarine, the “Knyaz Pozharsky."

The “Knyaz Pozharsky” is nuclear-powered ballistic missile submarine, that was commissioned into the Russian Navy's Northern Fleet at a shipyard in Severodvinsk during a ceremony overseen by Russian President Vladimir Putin on 24 July 2025.

The submarine features advanced stealth facilities, designe]]></content:encoded></item><item><title>Ukrainian Police Arrest Alleged Operator of Major Russian Cybercrime Forum</title><description><![CDATA[Ukrainian police, aided by French and Europol investigators, arrest suspected administrator of long-running Russian-language cybercrime forum.


International operation brings alleged forum admin to justice

Authorities in Ukraine have arrested a man accused of operating one of the most prominent Russian-language cybercrime forums on the internet, XSS[.]is. The arrest, the result of a four-year investigation led by the Paris public prosecutors’ office, took place in Kyiv, in coordination with Eu]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/ukrainian-police-arrest-alleged-operator-of-major-russian-cybercrime-forum</link><guid isPermaLink="false">68822e11fd8b21e92e183f1e</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Thu, 24 Jul 2025 12:59:29 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/07/handcuff-1078871_1920--1-.jpg" medium="image"/><content:encoded><![CDATA[Ukrainian police, aided by French and Europol investigators, arrest suspected administrator of long-running Russian-language cybercrime forum.


International operation brings alleged forum admin to justice

Authorities in Ukraine have arrested a man accused of operating one of the most prominent Russian-language cybercrime forums on the internet, XSS[.]is. The arrest, the result of a four-year investigation led by the Paris public prosecutors’ office, took place in Kyiv, in coordination with Eu]]></content:encoded></item><item><title>APT28 Hackers Exploit Signal Chats in Latest Malware Campaign Targeting Ukraine</title><description><![CDATA[Threat actors exploit encrypted messenger Signal chats in a wave of Russia-linked phishing attacks.


Signal chats weaponized into delivery vectors

Russian state-backed threat actors known as APT28 have launched a new wave of cyberattacks against Ukrainian government entities by weaponizing Signal chats to drop malware.

Signal, the widely used encrypted messaging app, remains secure, but perpetrators have found creative ways to exploit its communication channels for phishing.

The attacks were]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/apt28-hackers-exploit-signal-chats-in-latest-malware-campaign-targeting-ukraine</link><guid isPermaLink="false">685aaa31fd8b21e92e182ac4</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Tue, 24 Jun 2025 13:41:50 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/06/adem-ay-zs-41Br0WhQ-unsplash.jpg" medium="image"/><content:encoded><![CDATA[Threat actors exploit encrypted messenger Signal chats in a wave of Russia-linked phishing attacks.


Signal chats weaponized into delivery vectors

Russian state-backed threat actors known as APT28 have launched a new wave of cyberattacks against Ukrainian government entities by weaponizing Signal chats to drop malware.

Signal, the widely used encrypted messaging app, remains secure, but perpetrators have found creative ways to exploit its communication channels for phishing.

The attacks were]]></content:encoded></item><item><title>Hackers Are Using Macros and Telegram to Steal Data from Government Organizations in Ukraine</title><description><![CDATA[CERT-UA, the Ukrainian cybersecurity watchdog, has issued a warning about a highly sophisticated espionage campaign aimed at military innovation centers, law enforcement bodies, and local government offices across Ukraine.

The suspected threat actor, tracked as UAC-0226, has been trying to push fake government-themed documents. The goal is simple: to deliver malware designed to exfiltrate information through Telegram and remote command-and-control (C2) servers.

According to CERT-UA, the campai]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/hackers-macros-telegram-data-ukraine</link><guid isPermaLink="false">67f3e22531ab620b7b65fb3c</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Silviu STAHIE</dc:creator><pubDate>Mon, 07 Apr 2025 15:36:05 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/04/excel-1771393_1920.jpg" medium="image"/><content:encoded><![CDATA[CERT-UA, the Ukrainian cybersecurity watchdog, has issued a warning about a highly sophisticated espionage campaign aimed at military innovation centers, law enforcement bodies, and local government offices across Ukraine.

The suspected threat actor, tracked as UAC-0226, has been trying to push fake government-themed documents. The goal is simple: to deliver malware designed to exfiltrate information through Telegram and remote command-and-control (C2) servers.

According to CERT-UA, the campai]]></content:encoded></item><item><title>WRECKSTEEL Campaign Uses Fake HR Emails to Spy on Ukrainian Government Systems</title><description><![CDATA[The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert about a sophisticated cyberattack campaign actively targeting Ukrainian government agencies and other critical infrastructure since 2024.

The attackers behind this campaign, tracked as UAC-0219, have deployed a stealer tool known as WRECKSTEEL, using phishing lures and publicly hosted scripts to steal data and screenshots from compromised computers.


Social Engineering Leads the Charge



According to CERT-UA, the at]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/wrecksteel-fake-emails-spy-ukrainian</link><guid isPermaLink="false">67efff3131ab620b7b65fab6</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Silviu STAHIE</dc:creator><pubDate>Fri, 04 Apr 2025 15:53:59 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/04/robot-8452028_1920.jpg" medium="image"/><content:encoded><![CDATA[The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert about a sophisticated cyberattack campaign actively targeting Ukrainian government agencies and other critical infrastructure since 2024.

The attackers behind this campaign, tracked as UAC-0219, have deployed a stealer tool known as WRECKSTEEL, using phishing lures and publicly hosted scripts to steal data and screenshots from compromised computers.


Social Engineering Leads the Charge



According to CERT-UA, the at]]></content:encoded></item><item><title>Moscow Subway Website Hit by Cyberattack in Apparent Retaliation for Attack on Ukrainian Railways</title><description><![CDATA[Hacktivists have attacked the Moscow subway website, talking it down and creating problems for ticket buyers. This move is likely in retaliation for an attack against Ukrainian Railways (Ukrzaliznytsia) that occurred only a week ago. 

The highly sophisticated attack on Ukrzaliznytsia infrastructure affected a number of key systems, including ticketing, but authorities said train traffic remained stable and everything has been restored from backups. 

No particular group claimed the attack on Uk]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/moscow-subway-cyberattack-ukrainian-railways</link><guid isPermaLink="false">67ee813e31ab620b7b65f9e6</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Silviu STAHIE</dc:creator><pubDate>Thu, 03 Apr 2025 12:40:54 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/04/data-theft-9480273_1920.jpg" medium="image"/><content:encoded><![CDATA[Hacktivists have attacked the Moscow subway website, talking it down and creating problems for ticket buyers. This move is likely in retaliation for an attack against Ukrainian Railways (Ukrzaliznytsia) that occurred only a week ago. 

The highly sophisticated attack on Ukrzaliznytsia infrastructure affected a number of key systems, including ticketing, but authorities said train traffic remained stable and everything has been restored from backups. 

No particular group claimed the attack on Uk]]></content:encoded></item><item><title>Malicious Dark Crystal RAT Campaign Targets Ukraine’s Defense Sector</title><description><![CDATA[Threat actors launched a new malicious campaign against organizations in Ukraine’s defense sector, spreading Dark Crystal malware.


Russian malware used against Ukraine

Ukraine’s Computer Emergency Threat Response Team (CERT-UA) announced earlier this week that threat actors have been spotted using a Russian-made remote access trojan (RAT) against targets in the country.

Dark Crystal (or DCRat) is a RAT allegedly favored by many novice hackers, but with an advanced enough design to fit the ne]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/malicious-dark-crystal-rat-campaign-targets-ukraines-defense-sector</link><guid isPermaLink="false">67dd75054faf4404e67b8a28</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Fri, 21 Mar 2025 14:18:26 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/03/malicious-code-g930bbca39_1920-1.jpg" medium="image"/><content:encoded><![CDATA[Threat actors launched a new malicious campaign against organizations in Ukraine’s defense sector, spreading Dark Crystal malware.


Russian malware used against Ukraine

Ukraine’s Computer Emergency Threat Response Team (CERT-UA) announced earlier this week that threat actors have been spotted using a Russian-made remote access trojan (RAT) against targets in the country.

Dark Crystal (or DCRat) is a RAT allegedly favored by many novice hackers, but with an advanced enough design to fit the ne]]></content:encoded></item><item><title>Russian Intelligence Uses Messaging Apps and Forums to Recruit Ukrainians for Terror Attacks</title><description><![CDATA[Ukraine law enforcement has warned citizens that Russian intelligence is actively recruiting Ukrainians for terrorist attacks via messaging apps and forums.


Russian intelligence uses messaging apps as recruiting platforms

A surge in terrorist attacks against postal facilities, police, and military centers in Ukraine has authorities concerned, as Russian interference is suspected.

According to recent reports, Russian intelligence services are using online forums and messaging apps to recruit ]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/russian-intelligence-uses-messaging-apps-and-forums-to-recruit-ukrainians-for-terror-attacks</link><guid isPermaLink="false">67a9ff3e4faf4404e67b6c51</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Mon, 10 Feb 2025 13:30:17 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/02/iphone-388387_1920.jpg" medium="image"/><content:encoded><![CDATA[Ukraine law enforcement has warned citizens that Russian intelligence is actively recruiting Ukrainians for terrorist attacks via messaging apps and forums.


Russian intelligence uses messaging apps as recruiting platforms

A surge in terrorist attacks against postal facilities, police, and military centers in Ukraine has authorities concerned, as Russian interference is suspected.

According to recent reports, Russian intelligence services are using online forums and messaging apps to recruit ]]></content:encoded></item><item><title>Russian Hackers Target Diplomats in WhatsApp Spear-Phishing Campaign</title><description><![CDATA[Security experts have discovered a new spear-phishing campaign orchestrated by Russian state-backed threat actors against high-profile diplomats and Ukrainian aid organizations.


Russian malicious campaign against Ukrainian targets

Star Blizzard, a group of Russian state-sponsored hackers, has launched a ruthless spear-phishing campaign against various Ukraine-linked targets.

Perpetrators sought targets in diplomacy, defense policy, government, international relations and aid organizations in]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/russian-hackers-target-diplomats-in-whatsapp-spear-phishing-campaign</link><guid isPermaLink="false">678e55054faf4404e67b5ddc</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Scam]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Mon, 20 Jan 2025 13:53:03 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2025/01/alexander-shatov-_qsuER9xYOY-unsplash.jpg" medium="image"/><content:encoded><![CDATA[Security experts have discovered a new spear-phishing campaign orchestrated by Russian state-backed threat actors against high-profile diplomats and Ukrainian aid organizations.


Russian malicious campaign against Ukrainian targets

Star Blizzard, a group of Russian state-sponsored hackers, has launched a ruthless spear-phishing campaign against various Ukraine-linked targets.

Perpetrators sought targets in diplomacy, defense policy, government, international relations and aid organizations in]]></content:encoded></item><item><title>Suspect in ‘WhisperGate’ Cyberattack Indicted, US Posts $10 Million Bounty</title><description><![CDATA[The US Department of Justice (DoJ) recently indicted a Russian national accused of orchestrating the “WhisperGate” wiper attack on Ukrainian government computers. The attack destroyed vital infrastructure systems before Russia invaded the European country.

22-year-old Amin Stigal is believed to have ties with the Russian Military Intelligence (GRU).


Suspect Used Data Wiping Malware Against Ukrainian Targets

“In advance of the full-scale Russian invasion of Ukraine, targets included Ukrainian]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/suspect-in-whispergate-cyberattack-indicted-us-posts-10-million-bounty</link><guid isPermaLink="false">66f50fd428045a04f10d14a0</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Thu, 27 Jun 2024 10:51:12 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2024/06/hacker-gbb625524e_1920.jpg" medium="image"/><content:encoded><![CDATA[The US Department of Justice (DoJ) recently indicted a Russian national accused of orchestrating the “WhisperGate” wiper attack on Ukrainian government computers. The attack destroyed vital infrastructure systems before Russia invaded the European country.

22-year-old Amin Stigal is believed to have ties with the Russian Military Intelligence (GRU).


Suspect Used Data Wiping Malware Against Ukrainian Targets

“In advance of the full-scale Russian invasion of Ukraine, targets included Ukrainian]]></content:encoded></item><item><title>DirtyMoe Cryptojacking and DDoS Malware Infects Thousands of Ukrainian Computers</title><description><![CDATA[Over 2,000 computers in Ukraine have been infected with DirtyMoe malware, the Computer Emergency Response Team of Ukraine (CERT-UA) warns.

“As part of a detailed study of the cyber threat, a study of the received samples of malicious programs was conducted, the peculiarities of the functioning of the management server infrastructure were established, and more than 2,000 affected computers were identified in the Ukrainian segment of the Internet,” reads a CERT-UA security advisory.


Worm-like D]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/dirtymoe-cryptojacking-and-ddos-malware-infects-thousands-of-ukrainian-computers</link><guid isPermaLink="false">66f50fd328045a04f10d1285</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Mon, 05 Feb 2024 13:47:10 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2024/02/malicious-code-g930bbca39_1920-1.jpg" medium="image"/><content:encoded><![CDATA[Over 2,000 computers in Ukraine have been infected with DirtyMoe malware, the Computer Emergency Response Team of Ukraine (CERT-UA) warns.

“As part of a detailed study of the cyber threat, a study of the received samples of malicious programs was conducted, the peculiarities of the functioning of the management server infrastructure were established, and more than 2,000 affected computers were identified in the Ukrainian segment of the Internet,” reads a CERT-UA security advisory.


Worm-like D]]></content:encoded></item><item><title>Pro-Ukraine Hacktivists Wiped Massive Data Trove from Russian Research Center</title><description><![CDATA[A group of Pro-Ukraine hackers operating under the moniker “BO Team” allegedly wiped the database of a Russian research center, according to the Main Directorate of Intelligence of Ukraine’s Ministry of Defense.

The Far Eastern Scientific Research Center of Space Hydrometeorology “Planet” in Russia handles satellite data and imagery, providing relevant information to over 50 state entities, including the General Staff, Ministry of War, and the Russian Federation’s Ministry of Defense services.
]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/pro-ukraine-hacktivists-wiped-massive-data-trove-from-russian-research-center</link><guid isPermaLink="false">66f50fd328045a04f10d126b</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Mon, 29 Jan 2024 12:12:35 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2024/01/malicious-code-g930bbca39_1920.jpg" medium="image"/><content:encoded><![CDATA[A group of Pro-Ukraine hackers operating under the moniker “BO Team” allegedly wiped the database of a Russian research center, according to the Main Directorate of Intelligence of Ukraine’s Ministry of Defense.

The Far Eastern Scientific Research Center of Space Hydrometeorology “Planet” in Russia handles satellite data and imagery, providing relevant information to over 50 state entities, including the General Staff, Ministry of War, and the Russian Federation’s Ministry of Defense services.
]]></content:encoded></item><item><title>Ukrainian Cyber Alliance Disrupts Trigona Ransomware Operations, Exfiltrates Key Data</title><description><![CDATA[A group of Ukrainian cyber activists known as the Ukrainian Cyber Alliance (UCA) has infiltrated and dismantled the operations of the nefarious Trigona ransomware gang.

Using a public exploit, the UCA penetrated Trigona's defenses, exfiltrating crucial data before erasing the servers, a move aimed at crippling the ransomware gang's illicit activities.


Exploiting a Critical Vulnerability

Leveraging a known vulnerability, CVE-2023-22515, in the Confluence Data Center and Server systems, the UC]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/ukrainian-cyber-alliance-disrupts-trigona-ransomware-operations-exfiltrates-key-data</link><guid isPermaLink="false">66f50fd328045a04f10d111a</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Thu, 19 Oct 2023 11:53:12 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2023/10/fili-santillan-HeyFNqApSLQ-unsplash.jpg" medium="image"/><content:encoded><![CDATA[A group of Ukrainian cyber activists known as the Ukrainian Cyber Alliance (UCA) has infiltrated and dismantled the operations of the nefarious Trigona ransomware gang.

Using a public exploit, the UCA penetrated Trigona's defenses, exfiltrating crucial data before erasing the servers, a move aimed at crippling the ransomware gang's illicit activities.


Exploiting a Critical Vulnerability

Leveraging a known vulnerability, CVE-2023-22515, in the Confluence Data Center and Server systems, the UC]]></content:encoded></item><item><title>Ukraine Warns of Attacks Targeting State Organizations Using Open-Source Tool ‘Merlin’</title><description><![CDATA[Ukraine's Computer Emergency Response Team (CERT-UA) has warned of a new wave of cyber-attacks targeting state organizations. Threat actors were discovered using Merlin, an open-source post-exploitation tool, to carry out attacks and lateral movement within compromised networks.




Merlin: A Double-Edged Sword

Merlin, a Go-based cross-platform post-exploitation toolkit freely available on GitHub, is well-equipped with features designed to help cybersecurity experts in red team exercises. Despi]]></description><link>https://www.bitdefender.com/en-gb/blog/hotforsecurity/ukraine-warns-of-attacks-targeting-state-organizations-using-open-source-tool-merlin</link><guid isPermaLink="false">66f50fd328045a04f10d1024</guid><category><![CDATA[Industry News]]></category><category><![CDATA[Ukraine]]></category><dc:creator>Vlad CONSTANTINESCU</dc:creator><pubDate>Thu, 10 Aug 2023 09:33:58 GMT</pubDate><media:content url="https://blogapp.bitdefender.com/hotforsecurity/content/images/2023/08/hacker-gbb625524e_1920-1.jpg" medium="image"/><content:encoded><![CDATA[Ukraine's Computer Emergency Response Team (CERT-UA) has warned of a new wave of cyber-attacks targeting state organizations. Threat actors were discovered using Merlin, an open-source post-exploitation tool, to carry out attacks and lateral movement within compromised networks.




Merlin: A Double-Edged Sword

Merlin, a Go-based cross-platform post-exploitation toolkit freely available on GitHub, is well-equipped with features designed to help cybersecurity experts in red team exercises. Despi]]></content:encoded></item></channel>
        </rss>