CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内。首先,我需要仔细阅读文章,抓住主要信息。 文章讲的是乌克兰的CERT-UA机构披露了一个新的网络钓鱼活动。攻击者冒充CERT-UA,分发了一个名为AGEWHEEZE的远程管理工具。邮件是在2026年3月26日和27日发送的,目标包括政府机构、医疗机构、安全公司等。ZIP文件下载了恶意软件,该软件支持多种命令,如执行命令、文件操作等,并通过计划任务等方式保持持久性。 攻击效果不佳,只感染了少数设备。分析显示假网站可能是用AI生成的。威胁者称攻击了100万个邮箱和20万台设备,但声称不会伤害普通公民。此外,他们还声称入侵了一家乌克兰网络安全公司。 总结的时候要涵盖攻击者、目标、恶意软件功能、攻击效果、AI工具使用以及威胁者的声明等关键点。同时要控制在100字以内,避免使用总结性的开头。 可能的结构是:乌克兰CERT-UA披露网络钓鱼活动,冒充机构分发恶意软件AGEWHEEZE,目标包括多个行业,恶意软件功能多样,攻击效果有限,假网站用AI生成,威胁者声称影响有限但入侵了Cipher公司。 检查字数是否合适,并确保信息准确全面。 </think> 乌克兰网络安全机构CERT-UA披露一起网络钓鱼攻击事件,攻击者冒充该机构分发恶意软件AGEWHEEZE以控制系统。目标包括政府机构、医疗机构等关键部门。尽管攻击影响有限,但假网站被发现使用AI生成技术制作。 2026-4-1 16:10:0 Author: thehackernews.com(查看原文) 阅读量:4 收藏

Email Security / Artificial Intelligence

The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a new phishing campaign in which the cybersecurity agency itself was impersonated to distribute a remote administration tool known as AGEWHEEZE.

As part of the attacks, the threat actors, tracked as UAC-0255, sent emails on March 26 and 27, 2026, posing as CERT-UA to distribute a password-protected ZIP archive hosted on Files.fm and urged recipients to install the "specialized software."

The targets of the campaign included state organizations, medical centers, security companies, educational institutions, financial institutions, and software development companies. Some of the emails were sent from the email address "incidents@cert-ua[.]tech."

The ZIP file ("CERT_UA_protection_tool.zip") is designed to download malware packaged as security software from the agency. The malware, per CERT-UA, is a remote access trojan codenamed AGEWHEEZE. 

A Go-based malware, AGEWHEEZE communicates with an external server ("54.36.237[.]92") over WebSockets and supports a wide range of commands to execute commands, perform file operations, modify the clipboard, emulate mouse and keyboard, take screenshots, and manage processes and services. It also creates persistence by using a scheduled task, modifying the Windows Registry, or adding itself to the Startup directory.

The attack is assessed to have been largely unsuccessful. "No more than a few infected personal devices belonging to employees of educational institutions of various forms of ownership were identified," the agency said. "The team's specialists provided the necessary methodological and practical assistance."

An analysis of the bogus website "cert-ua[.]tech" has revealed that it was likely generated with assistance from artificial intelligence (AI) tools, with the HTML source code also including a comment: "С Любовью, КИБЕР СЕРП," meaning "With Love, CYBER SERP."

In posts on Telegram, Cyber Serp claims that they are "cyber-underground operatives from Ukraine." The Telegram channel was created in November 2025 and has more than 700 subscribers.

The threat actor also said the phishing emails were sent to 1 million ukr[.]net mailboxes as part of the campaign, and that over 200,000 devices have been compromised. "We are not bandits – the average Ukrainian citizen will never suffer as a result of our actions," it said in a post.

Last month, Cyber Serp took responsibility for an alleged breach of Ukrainian cybersecurity company Cipher, stating it obtained a complete dump of the servers, including a client database and source code for their line of CIPS products, among others.

In a statement on its website, Cipher acknowledged that attackers compromised the credentials of an employee at one of its technology companies but said its infrastructure was operating normally. The infected user had access to a single project, which did not contain sensitive data, it added.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/cert-ua-impersonation-campaign-spread.html
如有侵权请联系:admin#unsafe.sh