Close Menu
  • Home
  • Android
  • Android Operating
  • Apple
  • Apps
  • Gadgets
  • Galaxy
  • Ipad
  • IPhone
  • Smartphone
  • Tablet

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Muse Dash, Hyperforma, Tower of Fortune 4, etc.

March 28, 2025

Best Kitchen Gadgets of 2025

March 18, 2025

The best drawing tablets of 2025: Expert tested and recommended

February 13, 2025
Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
Wtf AndroidWtf Android
  • Home
  • Android
  • Android Operating
  • Apple
  • Apps
  • Gadgets
  • Galaxy
  • Ipad
  • IPhone
  • Smartphone
  • Tablet
Wtf AndroidWtf Android
Home » Russia targets Ukrainian conscripts with Windows and Android malware
Android

Russia targets Ukrainian conscripts with Windows and Android malware

adminBy adminOctober 28, 2024No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email


Russia

A hybrid espionage/influence campaign conducted by the Russian threat group UNC5812 targeting Ukrainian military recruits using Windows and Android malware has been uncovered.

According to Google Threat Intelligence, the campaign impersonated a “Civil Defense” persona along with a website and a dedicated Telegram channel to distribute malware through a fake recruitment avoidance app that researchers dubbed “Sunspinner.”

This campaign targets Windows and Android devices using platform-specific malware, providing data theft and real-time spying capabilities for attackers.

While Google has put safeguards in place to thwart malicious activity, this operation highlights Russia’s continued use and extensive capabilities in the cyberwarfare arena.

Fake “civil defense” persona

The UNC5812 persona does not attempt to impersonate any Ukrainian civil defense or government agency, but instead is promoted as a legitimate, Ukrainian-friendly organization that provides useful software tools and advice to Ukrainian conscripts.

This person uses Telegram channels and a website to engage with potential victims and tell a story that opposes Ukraine’s recruitment and mobilization efforts, with the aim of inciting public distrust and resistance.

When Google discovered the campaign on September 18, 2024, the “Civil Defense” channel on Telegram had 80,000 subscribers.

Civil Defense Channel on Telegram
Civil Defense Channel on Telegram
Source: Google

Users who are tricked into visiting the Civil Defense website are directed to a download page for a malicious application that is advertised as a crowdsourced mapping tool. This tool allows users to track and evade the location of recruiters.

Google calls the app “Sunspinner,” and it shows a map with markers, but Google claims the data is fabricated. The app’s sole purpose is to hide malware installations that occur in the background.

Malicious websites that spread malware
Malicious websites that spread malware
Source: Google

Drops Windows and Android malware.

The fake app offers downloads for Windows and Android, but Apple platforms are not yet supported as it promises to add iOS and macOS soon as well.

Windows downloads install Pronsis Loader, a malware loader that retrieves additional malicious payloads from UNC5812’s servers, including “PureStealer,” which steals product information.

PureStealer targets information stored in web browsers, including account passwords, cookies, cryptocurrency wallet details, email clients, and messaging app data.

On Android, downloaded APK files drop CraxsRAT, another commercially available backdoor.

CraxsRAT allows an attacker to track a victim’s location in real time, record keystrokes, activate voice recordings, obtain contact lists, access SMS messages, extract files, and steal credentials. can be collected.

In order to carry out these malicious activities unchecked, the app tricks users into disabling Google Play Protect, Android’s built-in anti-malware tool, and manually granting dangerous permissions.

Video showing how to disable Play Protect
Instructional video on how to disable Play Protect
Source: Google

Google has updated protections in Google Play to detect and block Android malware early, and added domains and files related to campaigns to Chrome’s Safe Browsing feature.

A complete list of indicators of compromise related to the latest UNC5812 campaign is available here.



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

Samsung returns to S25 Ultra s Pen Bluetooth Tease

January 27, 2025

My experience using Raspberry Pi for wireless Android Auto

October 31, 2024

This Android malware can transfer your phone to hackers

October 31, 2024
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Will Google’s new anti-theft feature be a game-changer for Android users?

October 13, 2024

Huawei’s Android replacement HarmonyOS Next launches next week, permanently discontinuing Google’s operating system on existing devices

October 11, 2024

Android 15 lets you turn your phone into a useful smart home dashboard – here’s how

October 11, 2024

Google ordered to open Android app store to competition

October 10, 2024
Top Reviews
Wtf Android
Facebook X (Twitter) Instagram Pinterest Vimeo YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 wtfandroid. Designed by wtfandroid.

Type above and press Enter to search. Press Esc to cancel.