UAC-0212 Hackers Targeting Ukraine's Critical Infrastructure
Cybersecurity3 min read

UAC-0212 Hackers Targeting Ukraine's Critical Infrastructure

25 Feb 202525 Feb 2025 cybersecuritynews.com

The UAC-0212 hackers have intensified their destructive attacks on critical infrastructure in Ukraine. With a focus on energy and transport sectors, they are employing advanced malware techniques to infiltrate systems.

Key Takeaways

  • 1.“This shows how sophisticated their approach is; utilizing layered techniques significantly complicates detection and response,” explained an industry analyst.
  • 2.The actions taken now will significantly influence the resilience of Ukraine's critical infrastructure in the face of these ongoing cyber aggressions.
  • 3.The landscape of cybersecurity threats has shifted recently, as a sophisticated group known as UAC-0212 has increased its attacks on critical infrastructure in Ukraine.

The landscape of cybersecurity threats has shifted recently, as a sophisticated group known as UAC-0212 has increased its attacks on critical infrastructure in Ukraine. This information comes from an advisory issued by the Computer Emergency Response Team of Ukraine (CERT-UA).

Since July 2024, the UAC-0212 group has launched a series of targeted campaigns aimed at vital sectors including energy, water supply, grain logistics, and transportation. “Their approach is marked by coordinated supply-chain compromises that exploit various vulnerabilities within operational technology environments,” stated a CERT-UA spokesperson.

The methods deployed by UAC-0212 are concerning as they blend traditional cyber-espionage tactics with destructive intents. Initially, the group exploits phishing attacks that involve malicious attachments disguised as PDF documents. “We’ve seen weaponized PDF files that deploy harmful LNK files, indicating a highly malicious strategy,” said the CERT-UA advisory. The specific file name linked to these attacks includes `CV_Vitaliy_Klymenko_22.11.2024.pdf.lnk`, which leverages a critical Windows vulnerability, CVE-2024-382, enabling arbitrary PowerShell command execution.

Person using laptop with holographic cybersecurity shield and digital interface elements
Person using laptop with holographic cybersecurity shield and digital interface elements

Once activated, these malicious files can download innocuous-looking documents while stealthily implementing modular malware such as SECONDBEST, EMPIREPAST, and SPARK in the background. “The sophistication of their techniques allows them to hide in plain sight, using legitimate network protocols like RSYNC for lateral movements and data exfiltration,” the spokesperson added.

Establishing persistent access to compromised systems, UAC-0212 modifies registry entries and startup scripts, ensuring they remain operational even after initial detection. An example highlighted by CERT-UA involves modifying the Windows registry at `HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemZ_611`.

The attack chain initiated by UAC-0212 starts with those initially infected PDFs containing obfuscated PowerShell commands. One such snippet demonstrates how the attackers are leveraging XOR-based payload decryption to connect with a command-and-control server. “This shows how sophisticated their approach is; utilizing layered techniques significantly complicates detection and response,” explained an industry analyst.

Among the notorious payloads used by this group is SPARK, a remote access trojan (RAT) that reportedly communicates with servers over TCP/443. Additionally, the EMPIREPAST functions as a DLL sideloader mimicking legitimate software updates, a tactic that has been increasingly common in modern cyber attacks. “Such strategies allow attackers to blend in with trusted software, evading traditional security measures,” noted cybersecurity expert Niko Ivanov.

Data center server room with multiple monitors displaying code and red LED lighting
Data center server room with multiple monitors displaying code and red LED lighting

Infrastructure specifically targeted by UAC-0212 includes logistics firms within Ukraine that manage hazardous materials, alongside grain storage systems essential for the region. These attacks aim to exfiltrate critical data such as engineering schematics and industrial control system credentials, thereby facilitating more extensive downstream assaults. “The stakes are incredibly high; such breaches could have dire consequences for operational integrity and public safety,” said Ivanov.

Impact and Legacy

In light of these developments, CERT-UA is calling on critical infrastructure operators to conduct thorough audits of their systems and implement enhanced security protocols to protect against ongoing threats. “By fortifying defenses and ensuring stringent monitoring of network activity, organizations can mitigate the impact of such sophisticated attacks,” advised a CERT-UA official.

Impact and Legacy

As the situation unfolds, it remains crucial for stakeholders in critical sectors to stay vigilant against these emerging threats and collaborate to bolster defenses. The actions taken now will significantly influence the resilience of Ukraine's critical infrastructure in the face of these ongoing cyber aggressions.

More Stories