Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing Operation

0
Medium
Published: Wed Oct 22 2025 (10/22/2025, 19:45:18 UTC)
Source: AlienVault OTX General

Description

A highly targeted spearphishing campaign leveraged weaponized PDFs and fake Cloudflare captcha pages to deliver a multi-stage WebSocket RAT against Ukrainian NGOs and government entities involved in war relief. The malware enables remote command execution and data exfiltration, with an additional Android malware vector using fake applications to harvest mobile data. The attackers demonstrated extensive operational security by preparing infrastructure for six months but activating it for only one day. This campaign reflects sophisticated planning, compartmentalized infrastructure, and deliberate exposure control to evade detection. Although no CVE or known exploits in the wild are reported, the threat poses significant risks to confidentiality and integrity of sensitive information. The medium severity rating reflects the complexity and targeted nature of the attack, requiring user interaction via spearphishing emails. European organizations supporting Ukraine or involved in related humanitarian efforts should be vigilant against similar tactics.

AI-Powered Analysis

AILast updated: 10/22/2025, 20:01:00 UTC

Technical Analysis

This threat involves a multi-stage Remote Access Trojan (RAT) delivered through a spearphishing campaign targeting NGOs and Ukrainian government administrations engaged in war relief efforts. Attackers impersonated the Ukrainian President's Office in emails containing weaponized PDF attachments. Upon opening, victims were redirected to a fake Cloudflare captcha page, which served as a loader to execute the malware payload. The final payload is a WebSocket-based RAT that establishes a persistent, encrypted communication channel with the command and control (C2) server, enabling remote command execution, system reconnaissance, credential theft, and data exfiltration. The campaign also included a mobile attack vector using fake Android applications designed to collect sensitive data from infected devices. The attackers exhibited high operational security, preparing infrastructure over six months but limiting its active use to a single day, minimizing exposure and detection risk. Indicators of compromise include multiple file hashes, IP addresses, and suspicious domains linked to the infrastructure. The campaign leverages PowerShell scripts and various Windows commands to maintain persistence and evade defenses. No CVE or public exploit is associated, and no widespread exploitation has been observed. The campaign's sophistication and targeting suggest a state-sponsored or highly skilled threat actor focused on intelligence gathering and disruption related to the ongoing conflict in Ukraine.

Potential Impact

For European organizations, especially NGOs, government agencies, and entities supporting Ukrainian relief efforts, this threat could lead to significant data breaches, loss of sensitive operational information, and disruption of critical humanitarian activities. The WebSocket RAT's ability to execute arbitrary commands and exfiltrate data threatens confidentiality and integrity of internal communications and documents. The mobile vector increases risk by targeting Android devices, potentially compromising personnel communications and location data. Compromise could result in loss of trust, operational delays, and exposure of strategic plans or donor information. Given the campaign's short active window and sophisticated infrastructure, detection may be difficult, increasing the risk of stealthy, prolonged espionage. European organizations with direct or indirect involvement in Ukraine-related activities are at heightened risk, potentially impacting cross-border cooperation and aid delivery.

Mitigation Recommendations

Beyond standard phishing awareness training, organizations should implement advanced email filtering with attachment sandboxing to detect weaponized PDFs and suspicious redirects. Deploy network monitoring focused on WebSocket traffic anomalies and unusual outbound connections to known malicious IPs and domains listed in the indicators. Employ endpoint detection and response (EDR) solutions capable of identifying PowerShell abuse and suspicious script execution. Mobile device management (MDM) policies should restrict installation of unverified applications and enforce app vetting to prevent Android malware infection. Conduct regular threat hunting exercises using the provided hashes, IPs, and domains to identify potential compromises. Implement strict segmentation and least privilege access to limit lateral movement if infected. Incident response plans should include rapid containment and forensic analysis to address short-lived but high-impact campaigns. Collaboration with national cybersecurity centers and sharing of threat intelligence related to this campaign will improve detection and response capabilities.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.sentinelone.com/labs/phantomcaptcha-multi-stage-websocket-rat-targets-ukraine-in-single-day-spearphishing-operation/"]
Adversary
PhantomCaptcha
Pulse Id
68f9344f3414613f13b09ef2
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash77f27ffccd75fc39ea003cbde32c624b
hash842d96f208b567e58c5656017fb67df6
hash5ac660ecbbde66ba9d46f37f9ddbc904e4c5d9e8
hash9d3a0c7c7859cb71902c61b7664a925781b08ebf
hash07d9deaace25d90fc91b31849dfc12b2fc3ac5ca90e317cfa165fe1d3553eead
hash19bcf7ca3df4e54034b57ca924c9d9d178f4b0b8c2071a350e310dd645cd2b23
hash21bdf1638a2f3ec31544222b96ab80ba793e2bcbaa747dbf9332fb4b021a2bcd
hash3324550964ec376e74155665765b1492ae1e3bdeb35d57f18ad9aaca64d50a44
hash4bc8cf031b2e521f2b9292ffd1aefc08b9c00dab119f9ec9f65219a0fbf0f566
hash55677db95eb5ddcca47394d188610029f06101ee7d1d8e63d9444c9c5cb04ae1
hash5f42130139a09df50d52a03f448d92cbf40d7eae74840825f7b0e377ee5c8839
hash6f9a7ab475b4c1ea871f7b16338a531703af0443f987c748fa5fff075b8c5f91
hash8ef05f4d7d4d96ca6f758f2b5093b7d378e2e986667967fe36dbdaf52f338587
hashb02d8f8cf57abdc92b3af2545f1e46f1813f192f4a200a3de102fd38cf048517
hashbcb9e99021f88b9720a667d737a3ddd7d5b9f963ac3cae6d26e74701e406dcdc
hashe8d0943042e34a37ae8d79aeb4f9a2fa07b4a37955af2b0cc0e232b79c2e72f3

Ip

ValueDescriptionCopy
ip167.17.188.244
ip185.142.33.131
ip193.233.23.81
ip45.15.156.24
ip91.149.253.134
ip91.149.253.99

Domain

ValueDescriptionCopy
domainbsnowcommunications.com
domaingoodhillsenterprise.com
domainlapas.live
domainprincess-mens-club.com
domainprincess-mens.click
domainzoomconference.click

Threat ID: 68f9361b62bc771d0f55e424

Added to database: 10/22/2025, 7:52:59 PM

Last enriched: 10/22/2025, 8:01:00 PM

Last updated: 10/22/2025, 10:52:54 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats