PhantomCaptcha: Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing Operation
A coordinated spearphishing campaign targeted NGOs and Ukrainian government administrations involved in war relief efforts. The attack used emails impersonating the Ukrainian President's Office with weaponized PDFs, employing a fake Cloudflare captcha page to execute malware. The final payload was a WebSocket RAT enabling remote command execution and data exfiltration. Despite six months of preparation, the attackers' infrastructure was only active for one day, indicating sophisticated planning and operational security. An additional mobile attack vector was discovered, using fake applications to collect data from Android devices. The campaign demonstrated extensive operational planning, compartmentalized infrastructure, and deliberate exposure control.
AI Analysis
Technical Summary
This threat involves a multi-stage Remote Access Trojan (RAT) delivered through a spearphishing campaign targeting NGOs and Ukrainian government administrations engaged in war relief efforts. Attackers impersonated the Ukrainian President's Office in emails containing weaponized PDF attachments. Upon opening, victims were redirected to a fake Cloudflare captcha page, which served as a loader to execute the malware payload. The final payload is a WebSocket-based RAT that establishes a persistent, encrypted communication channel with the command and control (C2) server, enabling remote command execution, system reconnaissance, credential theft, and data exfiltration. The campaign also included a mobile attack vector using fake Android applications designed to collect sensitive data from infected devices. The attackers exhibited high operational security, preparing infrastructure over six months but limiting its active use to a single day, minimizing exposure and detection risk. Indicators of compromise include multiple file hashes, IP addresses, and suspicious domains linked to the infrastructure. The campaign leverages PowerShell scripts and various Windows commands to maintain persistence and evade defenses. No CVE or public exploit is associated, and no widespread exploitation has been observed. The campaign's sophistication and targeting suggest a state-sponsored or highly skilled threat actor focused on intelligence gathering and disruption related to the ongoing conflict in Ukraine.
Potential Impact
For European organizations, especially NGOs, government agencies, and entities supporting Ukrainian relief efforts, this threat could lead to significant data breaches, loss of sensitive operational information, and disruption of critical humanitarian activities. The WebSocket RAT's ability to execute arbitrary commands and exfiltrate data threatens confidentiality and integrity of internal communications and documents. The mobile vector increases risk by targeting Android devices, potentially compromising personnel communications and location data. Compromise could result in loss of trust, operational delays, and exposure of strategic plans or donor information. Given the campaign's short active window and sophisticated infrastructure, detection may be difficult, increasing the risk of stealthy, prolonged espionage. European organizations with direct or indirect involvement in Ukraine-related activities are at heightened risk, potentially impacting cross-border cooperation and aid delivery.
Mitigation Recommendations
Beyond standard phishing awareness training, organizations should implement advanced email filtering with attachment sandboxing to detect weaponized PDFs and suspicious redirects. Deploy network monitoring focused on WebSocket traffic anomalies and unusual outbound connections to known malicious IPs and domains listed in the indicators. Employ endpoint detection and response (EDR) solutions capable of identifying PowerShell abuse and suspicious script execution. Mobile device management (MDM) policies should restrict installation of unverified applications and enforce app vetting to prevent Android malware infection. Conduct regular threat hunting exercises using the provided hashes, IPs, and domains to identify potential compromises. Implement strict segmentation and least privilege access to limit lateral movement if infected. Incident response plans should include rapid containment and forensic analysis to address short-lived but high-impact campaigns. Collaboration with national cybersecurity centers and sharing of threat intelligence related to this campaign will improve detection and response capabilities.
Affected Countries
Ukraine, Poland, Germany, France, United Kingdom, Netherlands, Sweden
Indicators of Compromise
- hash: 77f27ffccd75fc39ea003cbde32c624b
- hash: 842d96f208b567e58c5656017fb67df6
- hash: 5ac660ecbbde66ba9d46f37f9ddbc904e4c5d9e8
- hash: 9d3a0c7c7859cb71902c61b7664a925781b08ebf
- hash: 07d9deaace25d90fc91b31849dfc12b2fc3ac5ca90e317cfa165fe1d3553eead
- hash: 19bcf7ca3df4e54034b57ca924c9d9d178f4b0b8c2071a350e310dd645cd2b23
- hash: 21bdf1638a2f3ec31544222b96ab80ba793e2bcbaa747dbf9332fb4b021a2bcd
- hash: 3324550964ec376e74155665765b1492ae1e3bdeb35d57f18ad9aaca64d50a44
- hash: 4bc8cf031b2e521f2b9292ffd1aefc08b9c00dab119f9ec9f65219a0fbf0f566
- hash: 55677db95eb5ddcca47394d188610029f06101ee7d1d8e63d9444c9c5cb04ae1
- hash: 5f42130139a09df50d52a03f448d92cbf40d7eae74840825f7b0e377ee5c8839
- hash: 6f9a7ab475b4c1ea871f7b16338a531703af0443f987c748fa5fff075b8c5f91
- hash: 8ef05f4d7d4d96ca6f758f2b5093b7d378e2e986667967fe36dbdaf52f338587
- hash: b02d8f8cf57abdc92b3af2545f1e46f1813f192f4a200a3de102fd38cf048517
- hash: bcb9e99021f88b9720a667d737a3ddd7d5b9f963ac3cae6d26e74701e406dcdc
- hash: e8d0943042e34a37ae8d79aeb4f9a2fa07b4a37955af2b0cc0e232b79c2e72f3
- ip: 167.17.188.244
- ip: 185.142.33.131
- ip: 193.233.23.81
- ip: 45.15.156.24
- ip: 91.149.253.134
- ip: 91.149.253.99
- domain: bsnowcommunications.com
- domain: goodhillsenterprise.com
- domain: lapas.live
- domain: princess-mens-club.com
- domain: princess-mens.click
- domain: zoomconference.click
PhantomCaptcha: Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing Operation
Description
A coordinated spearphishing campaign targeted NGOs and Ukrainian government administrations involved in war relief efforts. The attack used emails impersonating the Ukrainian President's Office with weaponized PDFs, employing a fake Cloudflare captcha page to execute malware. The final payload was a WebSocket RAT enabling remote command execution and data exfiltration. Despite six months of preparation, the attackers' infrastructure was only active for one day, indicating sophisticated planning and operational security. An additional mobile attack vector was discovered, using fake applications to collect data from Android devices. The campaign demonstrated extensive operational planning, compartmentalized infrastructure, and deliberate exposure control.
AI-Powered Analysis
Technical Analysis
This threat involves a multi-stage Remote Access Trojan (RAT) delivered through a spearphishing campaign targeting NGOs and Ukrainian government administrations engaged in war relief efforts. Attackers impersonated the Ukrainian President's Office in emails containing weaponized PDF attachments. Upon opening, victims were redirected to a fake Cloudflare captcha page, which served as a loader to execute the malware payload. The final payload is a WebSocket-based RAT that establishes a persistent, encrypted communication channel with the command and control (C2) server, enabling remote command execution, system reconnaissance, credential theft, and data exfiltration. The campaign also included a mobile attack vector using fake Android applications designed to collect sensitive data from infected devices. The attackers exhibited high operational security, preparing infrastructure over six months but limiting its active use to a single day, minimizing exposure and detection risk. Indicators of compromise include multiple file hashes, IP addresses, and suspicious domains linked to the infrastructure. The campaign leverages PowerShell scripts and various Windows commands to maintain persistence and evade defenses. No CVE or public exploit is associated, and no widespread exploitation has been observed. The campaign's sophistication and targeting suggest a state-sponsored or highly skilled threat actor focused on intelligence gathering and disruption related to the ongoing conflict in Ukraine.
Potential Impact
For European organizations, especially NGOs, government agencies, and entities supporting Ukrainian relief efforts, this threat could lead to significant data breaches, loss of sensitive operational information, and disruption of critical humanitarian activities. The WebSocket RAT's ability to execute arbitrary commands and exfiltrate data threatens confidentiality and integrity of internal communications and documents. The mobile vector increases risk by targeting Android devices, potentially compromising personnel communications and location data. Compromise could result in loss of trust, operational delays, and exposure of strategic plans or donor information. Given the campaign's short active window and sophisticated infrastructure, detection may be difficult, increasing the risk of stealthy, prolonged espionage. European organizations with direct or indirect involvement in Ukraine-related activities are at heightened risk, potentially impacting cross-border cooperation and aid delivery.
Mitigation Recommendations
Beyond standard phishing awareness training, organizations should implement advanced email filtering with attachment sandboxing to detect weaponized PDFs and suspicious redirects. Deploy network monitoring focused on WebSocket traffic anomalies and unusual outbound connections to known malicious IPs and domains listed in the indicators. Employ endpoint detection and response (EDR) solutions capable of identifying PowerShell abuse and suspicious script execution. Mobile device management (MDM) policies should restrict installation of unverified applications and enforce app vetting to prevent Android malware infection. Conduct regular threat hunting exercises using the provided hashes, IPs, and domains to identify potential compromises. Implement strict segmentation and least privilege access to limit lateral movement if infected. Incident response plans should include rapid containment and forensic analysis to address short-lived but high-impact campaigns. Collaboration with national cybersecurity centers and sharing of threat intelligence related to this campaign will improve detection and response capabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.sentinelone.com/labs/phantomcaptcha-multi-stage-websocket-rat-targets-ukraine-in-single-day-spearphishing-operation/"]
- Adversary
- PhantomCaptcha
- Pulse Id
- 68f9344f3414613f13b09ef2
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash77f27ffccd75fc39ea003cbde32c624b | — | |
hash842d96f208b567e58c5656017fb67df6 | — | |
hash5ac660ecbbde66ba9d46f37f9ddbc904e4c5d9e8 | — | |
hash9d3a0c7c7859cb71902c61b7664a925781b08ebf | — | |
hash07d9deaace25d90fc91b31849dfc12b2fc3ac5ca90e317cfa165fe1d3553eead | — | |
hash19bcf7ca3df4e54034b57ca924c9d9d178f4b0b8c2071a350e310dd645cd2b23 | — | |
hash21bdf1638a2f3ec31544222b96ab80ba793e2bcbaa747dbf9332fb4b021a2bcd | — | |
hash3324550964ec376e74155665765b1492ae1e3bdeb35d57f18ad9aaca64d50a44 | — | |
hash4bc8cf031b2e521f2b9292ffd1aefc08b9c00dab119f9ec9f65219a0fbf0f566 | — | |
hash55677db95eb5ddcca47394d188610029f06101ee7d1d8e63d9444c9c5cb04ae1 | — | |
hash5f42130139a09df50d52a03f448d92cbf40d7eae74840825f7b0e377ee5c8839 | — | |
hash6f9a7ab475b4c1ea871f7b16338a531703af0443f987c748fa5fff075b8c5f91 | — | |
hash8ef05f4d7d4d96ca6f758f2b5093b7d378e2e986667967fe36dbdaf52f338587 | — | |
hashb02d8f8cf57abdc92b3af2545f1e46f1813f192f4a200a3de102fd38cf048517 | — | |
hashbcb9e99021f88b9720a667d737a3ddd7d5b9f963ac3cae6d26e74701e406dcdc | — | |
hashe8d0943042e34a37ae8d79aeb4f9a2fa07b4a37955af2b0cc0e232b79c2e72f3 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip167.17.188.244 | — | |
ip185.142.33.131 | — | |
ip193.233.23.81 | — | |
ip45.15.156.24 | — | |
ip91.149.253.134 | — | |
ip91.149.253.99 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainbsnowcommunications.com | — | |
domaingoodhillsenterprise.com | — | |
domainlapas.live | — | |
domainprincess-mens-club.com | — | |
domainprincess-mens.click | — | |
domainzoomconference.click | — |
Threat ID: 68f9361b62bc771d0f55e424
Added to database: 10/22/2025, 7:52:59 PM
Last enriched: 10/22/2025, 8:01:00 PM
Last updated: 12/3/2025, 8:52:44 AM
Views: 210
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-12-02
MediumMuddyWater strikes Israel with advanced MuddyViper malware
MediumNK Hackers Push 200 Malicious npm Packages with OtterCookie Malware
MediumResearchers Capture Lazarus APT's Remote-Worker Scheme Live on Camera
MediumGoogle Patches 107 Android Flaws, Including Two Framework Bugs Exploited in the Wild
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.