Threat Actors Distribute Fake Antivirus That Install Malware In Ukraine

March 15, 2022

Threat actors are distributing fake Windows antivirus updates in Ukraine.

According to Ukraine’s Computer Emergency Response Team, the fake antivirus update install Cobalt Strike and other malware.

Cobalt Strike offers offensive security capabilities, facilitates lateral network movement, and ensures persistence.

The fake antivirus is distributed via phishing emails impersonating Ukrainian government agencies.

The phishing email contains a link to a French website that offers download buttons for the alleged AV software updates.

After downloading and running the fake BitDefender Windows update, the victim is prompted to install a ‘Windows Update Package.’

The package instead downloads and installs the one.exe file from the Discord CDN, which is a Cobalt Strike beacon.

The Ukrainian Computer Emergency Response Team claimed a sophisticated Russian-speaking APT known as UAC-0056 is behind the campaign.

UAC-0056 uses a combination of phishing emails and custom backdoors to collect information from Ukrainian organizations.

For more information, read the original story in BleepingComputer.

Top Stories

Related Articles

April 1, 2026 Anthropic has inadvertently exposed the full source code of its Claude Code tool for the second time more...

April 1, 2026 Cisco suffered a cyberattack after attackers used stolen credentials from a compromised developer tool to access its more...

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn