


Perceptive Security
SOC/SIEM Consultancy

Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government
Published:
5 januari 2026 om 17:56:00
Alert date:
5 januari 2026 om 19:02:20
Source:
thehackernews.com
Email & Messaging, Ransomware & Malware, Data Breach & Exfiltration
Russia-aligned threat actor UAC-0184 has been observed targeting Ukrainian military and government entities using the Viber messaging platform to deliver malicious ZIP archives. The campaign represents continued high-intensity intelligence gathering activities against Ukrainian institutions throughout 2025. The attacks leverage social engineering through the popular messaging platform to distribute malware payloads. This activity is part of ongoing cyber operations against Ukraine's critical infrastructure and government systems.
Technical details
The attack chain involves using Viber messaging platform to distribute malicious ZIP archives containing Windows shortcut (LNK) files disguised as Microsoft Word and Excel documents. These LNK files serve as decoys while executing Hijack Loader in the background via PowerShell script that fetches a second ZIP archive (smoothieks.zip) from a remote server. The attack uses DLL side-loading and module stomping techniques for evasion, scans for security software by calculating CRC32 hashes, establishes persistence through scheduled tasks, and injects Remcos RAT into chime.exe process for remote control capabilities.
Mitigation steps:
Monitor for suspicious Viber message attachments containing ZIP archives, scan for LNK files disguised as Office documents, detect PowerShell scripts downloading additional ZIP archives, monitor for DLL side-loading and module stomping techniques, watch for scheduled task creation for persistence, detect Remcos RAT injections into legitimate processes like chime.exe, and implement security controls to detect CRC32 hash calculations targeting security software.
Affected products:
Viber messaging platform
Microsoft Word
Microsoft Excel
Windows systems
PowerShell
chime.exe
Related links:
https://mp.weixin.qq.com/s?__biz=MzUyMjk4NzExMA==&mid=2247507757&idx=1&sn=cf6b118e88395af45a000aae80811264&poc_token=HNnfW2mjnOhb-9voW7EL-AX6wsrUBqSd4LXEFGMn
https://thehackernews.com/2024/02/new-idat-loader-attacks-using.html
https://thehackernews.com/2024/04/ukraine-targeted-in-cyberattack.html
https://thehackernews.com/2025/07/cyber-espionage-campaign-hits-russian.html
https://thehackernews.com/2024/10/pro-ukrainian-hackers-strike-russian.html
Related CVE's:
Related threat actors:
IOC's:
smoothieks.zip, chime.exe (injection target), CRC32 hash calculations for security software detection, ZIP archives containing malicious LNK files, PowerShell scripts for second-stage payload retrieval
This article was created with the assistance of AI technology by Perceptive.
