Russia-linked APT InedibleOchotense impersonates ESET to deploy backdoor on Ukrainian systems
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内。首先,我需要通读文章,抓住主要信息。文章讲的是一个与俄罗斯有关的网络攻击组织InedibleOchotense,他们伪装成ESET公司,向乌克兰的目标发送钓鱼邮件和Signal消息,目的是部署后门程序Kalambur。 接下来,我得确定关键点:攻击者是谁,他们用了什么手法,目标是谁,以及他们的动机。攻击者是InedibleOchotense,手法是伪造ESET的安装程序,目标是乌克兰的系统。动机可能是为了植入后门进行进一步的攻击。 然后,我需要把这些信息浓缩到100字以内。要注意用词简洁,避免冗余。例如,“Russia-linked group”可以简化为“俄罗斯相关组织”,“phishing attacks”可以译为“钓鱼攻击”。 最后,检查一下是否符合用户的要求:不需要特定的开头词,直接描述内容即可。确保在一百字以内,并且信息准确无误。 </think> 俄罗斯相关组织InedibleOchotense伪装成ESET公司,在2025年5月针对乌克兰目标发起钓鱼攻击。通过伪造的ESET安装程序和Signal消息传播恶意软件,并植入Kalambur后门程序。 2025-11-7 08:39:55 Author: securityaffairs.com(查看原文) 阅读量:7 收藏

Russia-linked APT InedibleOchotense impersonates ESET to deploy backdoor on Ukrainian systems

Pierluigi Paganini November 07, 2025

Russia-linked group InedibleOchotense used fake ESET installers in phishing attacks on Ukrainian targets in May 2025.

Russia-linked group InedibleOchotense used trojanized ESET installers in phishing attacks against Ukrainian entities detected in May 2025. The campaign used emails and Signal messages to deliver trojanized ESET installers that installed both legitimate software and the Kalambur backdoor.

“Another Russia-aligned threat actor, InedibleOchotense, conducted a spearphishing campaign impersonating ESET. This campaign involved emails and Signal messages delivering a trojanized ESET installer that leads to the download of a legitimate ESET product along with the Kalambur backdoor.” reads the report published by ESET.

The Russia-aligned group sent phishing emails and Signal messages containing links to trojanized ESET installers hosted on fake domains. The campaign shares tactics with activity previously attributed to UAC-0212 and the BACKORDER downloader.

The researchers noticed that messages contained minor language errors, suggesting poor translation from Russian to Ukrainian.

The phishing email impersonating ESET warned users of suspicious activity linked to their email and urged them to download “official threat removal software.” The link directed victims to fake ESET domains (e.g., esetsmart[.]com, esetscanner[.]com, esetremover[.]com) hosting a ZIP file with a legitimate ESET AV Remover and a Kalambur backdoor.

The InedibleOchotense group exploited ESET’s strong reputation in Ukraine to trick users into installing malware.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, malware)




文章来源: https://securityaffairs.com/184303/apt/russia-linked-apt-inedibleochotense-impersonates-eset-to-deploy-backdoor-on-ukrainian-systems.html
如有侵权请联系:admin#unsafe.sh