Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing Operation
A highly targeted spearphishing campaign leveraged weaponized PDFs and fake Cloudflare captcha pages to deliver a multi-stage WebSocket RAT against Ukrainian NGOs and government entities involved in war relief. The malware enables remote command execution and data exfiltration, with an additional Android malware vector using fake applications to harvest mobile data. The attackers demonstrated extensive operational security by preparing infrastructure for six months but activating it for only one day. This campaign reflects sophisticated planning, compartmentalized infrastructure, and deliberate exposure control to evade detection. Although no CVE or known exploits in the wild are reported, the threat poses significant risks to confidentiality and integrity of sensitive information. The medium severity rating reflects the complexity and targeted nature of the attack, requiring user interaction via spearphishing emails. European organizations supporting Ukraine or involved in related humanitarian efforts should be vigilant against similar tactics.
AI Analysis
Technical Summary
This threat involves a multi-stage Remote Access Trojan (RAT) delivered through a spearphishing campaign targeting NGOs and Ukrainian government administrations engaged in war relief efforts. Attackers impersonated the Ukrainian President's Office in emails containing weaponized PDF attachments. Upon opening, victims were redirected to a fake Cloudflare captcha page, which served as a loader to execute the malware payload. The final payload is a WebSocket-based RAT that establishes a persistent, encrypted communication channel with the command and control (C2) server, enabling remote command execution, system reconnaissance, credential theft, and data exfiltration. The campaign also included a mobile attack vector using fake Android applications designed to collect sensitive data from infected devices. The attackers exhibited high operational security, preparing infrastructure over six months but limiting its active use to a single day, minimizing exposure and detection risk. Indicators of compromise include multiple file hashes, IP addresses, and suspicious domains linked to the infrastructure. The campaign leverages PowerShell scripts and various Windows commands to maintain persistence and evade defenses. No CVE or public exploit is associated, and no widespread exploitation has been observed. The campaign's sophistication and targeting suggest a state-sponsored or highly skilled threat actor focused on intelligence gathering and disruption related to the ongoing conflict in Ukraine.
Potential Impact
For European organizations, especially NGOs, government agencies, and entities supporting Ukrainian relief efforts, this threat could lead to significant data breaches, loss of sensitive operational information, and disruption of critical humanitarian activities. The WebSocket RAT's ability to execute arbitrary commands and exfiltrate data threatens confidentiality and integrity of internal communications and documents. The mobile vector increases risk by targeting Android devices, potentially compromising personnel communications and location data. Compromise could result in loss of trust, operational delays, and exposure of strategic plans or donor information. Given the campaign's short active window and sophisticated infrastructure, detection may be difficult, increasing the risk of stealthy, prolonged espionage. European organizations with direct or indirect involvement in Ukraine-related activities are at heightened risk, potentially impacting cross-border cooperation and aid delivery.
Mitigation Recommendations
Beyond standard phishing awareness training, organizations should implement advanced email filtering with attachment sandboxing to detect weaponized PDFs and suspicious redirects. Deploy network monitoring focused on WebSocket traffic anomalies and unusual outbound connections to known malicious IPs and domains listed in the indicators. Employ endpoint detection and response (EDR) solutions capable of identifying PowerShell abuse and suspicious script execution. Mobile device management (MDM) policies should restrict installation of unverified applications and enforce app vetting to prevent Android malware infection. Conduct regular threat hunting exercises using the provided hashes, IPs, and domains to identify potential compromises. Implement strict segmentation and least privilege access to limit lateral movement if infected. Incident response plans should include rapid containment and forensic analysis to address short-lived but high-impact campaigns. Collaboration with national cybersecurity centers and sharing of threat intelligence related to this campaign will improve detection and response capabilities.
Affected Countries
Ukraine, Poland, Germany, France, United Kingdom, Netherlands, Sweden
Indicators of Compromise
- hash: 77f27ffccd75fc39ea003cbde32c624b
- hash: 842d96f208b567e58c5656017fb67df6
- hash: 5ac660ecbbde66ba9d46f37f9ddbc904e4c5d9e8
- hash: 9d3a0c7c7859cb71902c61b7664a925781b08ebf
- hash: 07d9deaace25d90fc91b31849dfc12b2fc3ac5ca90e317cfa165fe1d3553eead
- hash: 19bcf7ca3df4e54034b57ca924c9d9d178f4b0b8c2071a350e310dd645cd2b23
- hash: 21bdf1638a2f3ec31544222b96ab80ba793e2bcbaa747dbf9332fb4b021a2bcd
- hash: 3324550964ec376e74155665765b1492ae1e3bdeb35d57f18ad9aaca64d50a44
- hash: 4bc8cf031b2e521f2b9292ffd1aefc08b9c00dab119f9ec9f65219a0fbf0f566
- hash: 55677db95eb5ddcca47394d188610029f06101ee7d1d8e63d9444c9c5cb04ae1
- hash: 5f42130139a09df50d52a03f448d92cbf40d7eae74840825f7b0e377ee5c8839
- hash: 6f9a7ab475b4c1ea871f7b16338a531703af0443f987c748fa5fff075b8c5f91
- hash: 8ef05f4d7d4d96ca6f758f2b5093b7d378e2e986667967fe36dbdaf52f338587
- hash: b02d8f8cf57abdc92b3af2545f1e46f1813f192f4a200a3de102fd38cf048517
- hash: bcb9e99021f88b9720a667d737a3ddd7d5b9f963ac3cae6d26e74701e406dcdc
- hash: e8d0943042e34a37ae8d79aeb4f9a2fa07b4a37955af2b0cc0e232b79c2e72f3
- ip: 167.17.188.244
- ip: 185.142.33.131
- ip: 193.233.23.81
- ip: 45.15.156.24
- ip: 91.149.253.134
- ip: 91.149.253.99
- domain: bsnowcommunications.com
- domain: goodhillsenterprise.com
- domain: lapas.live
- domain: princess-mens-club.com
- domain: princess-mens.click
- domain: zoomconference.click
Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing Operation
Description
A highly targeted spearphishing campaign leveraged weaponized PDFs and fake Cloudflare captcha pages to deliver a multi-stage WebSocket RAT against Ukrainian NGOs and government entities involved in war relief. The malware enables remote command execution and data exfiltration, with an additional Android malware vector using fake applications to harvest mobile data. The attackers demonstrated extensive operational security by preparing infrastructure for six months but activating it for only one day. This campaign reflects sophisticated planning, compartmentalized infrastructure, and deliberate exposure control to evade detection. Although no CVE or known exploits in the wild are reported, the threat poses significant risks to confidentiality and integrity of sensitive information. The medium severity rating reflects the complexity and targeted nature of the attack, requiring user interaction via spearphishing emails. European organizations supporting Ukraine or involved in related humanitarian efforts should be vigilant against similar tactics.
AI-Powered Analysis
Technical Analysis
This threat involves a multi-stage Remote Access Trojan (RAT) delivered through a spearphishing campaign targeting NGOs and Ukrainian government administrations engaged in war relief efforts. Attackers impersonated the Ukrainian President's Office in emails containing weaponized PDF attachments. Upon opening, victims were redirected to a fake Cloudflare captcha page, which served as a loader to execute the malware payload. The final payload is a WebSocket-based RAT that establishes a persistent, encrypted communication channel with the command and control (C2) server, enabling remote command execution, system reconnaissance, credential theft, and data exfiltration. The campaign also included a mobile attack vector using fake Android applications designed to collect sensitive data from infected devices. The attackers exhibited high operational security, preparing infrastructure over six months but limiting its active use to a single day, minimizing exposure and detection risk. Indicators of compromise include multiple file hashes, IP addresses, and suspicious domains linked to the infrastructure. The campaign leverages PowerShell scripts and various Windows commands to maintain persistence and evade defenses. No CVE or public exploit is associated, and no widespread exploitation has been observed. The campaign's sophistication and targeting suggest a state-sponsored or highly skilled threat actor focused on intelligence gathering and disruption related to the ongoing conflict in Ukraine.
Potential Impact
For European organizations, especially NGOs, government agencies, and entities supporting Ukrainian relief efforts, this threat could lead to significant data breaches, loss of sensitive operational information, and disruption of critical humanitarian activities. The WebSocket RAT's ability to execute arbitrary commands and exfiltrate data threatens confidentiality and integrity of internal communications and documents. The mobile vector increases risk by targeting Android devices, potentially compromising personnel communications and location data. Compromise could result in loss of trust, operational delays, and exposure of strategic plans or donor information. Given the campaign's short active window and sophisticated infrastructure, detection may be difficult, increasing the risk of stealthy, prolonged espionage. European organizations with direct or indirect involvement in Ukraine-related activities are at heightened risk, potentially impacting cross-border cooperation and aid delivery.
Mitigation Recommendations
Beyond standard phishing awareness training, organizations should implement advanced email filtering with attachment sandboxing to detect weaponized PDFs and suspicious redirects. Deploy network monitoring focused on WebSocket traffic anomalies and unusual outbound connections to known malicious IPs and domains listed in the indicators. Employ endpoint detection and response (EDR) solutions capable of identifying PowerShell abuse and suspicious script execution. Mobile device management (MDM) policies should restrict installation of unverified applications and enforce app vetting to prevent Android malware infection. Conduct regular threat hunting exercises using the provided hashes, IPs, and domains to identify potential compromises. Implement strict segmentation and least privilege access to limit lateral movement if infected. Incident response plans should include rapid containment and forensic analysis to address short-lived but high-impact campaigns. Collaboration with national cybersecurity centers and sharing of threat intelligence related to this campaign will improve detection and response capabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.sentinelone.com/labs/phantomcaptcha-multi-stage-websocket-rat-targets-ukraine-in-single-day-spearphishing-operation/"]
- Adversary
- PhantomCaptcha
- Pulse Id
- 68f9344f3414613f13b09ef2
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash77f27ffccd75fc39ea003cbde32c624b | — | |
hash842d96f208b567e58c5656017fb67df6 | — | |
hash5ac660ecbbde66ba9d46f37f9ddbc904e4c5d9e8 | — | |
hash9d3a0c7c7859cb71902c61b7664a925781b08ebf | — | |
hash07d9deaace25d90fc91b31849dfc12b2fc3ac5ca90e317cfa165fe1d3553eead | — | |
hash19bcf7ca3df4e54034b57ca924c9d9d178f4b0b8c2071a350e310dd645cd2b23 | — | |
hash21bdf1638a2f3ec31544222b96ab80ba793e2bcbaa747dbf9332fb4b021a2bcd | — | |
hash3324550964ec376e74155665765b1492ae1e3bdeb35d57f18ad9aaca64d50a44 | — | |
hash4bc8cf031b2e521f2b9292ffd1aefc08b9c00dab119f9ec9f65219a0fbf0f566 | — | |
hash55677db95eb5ddcca47394d188610029f06101ee7d1d8e63d9444c9c5cb04ae1 | — | |
hash5f42130139a09df50d52a03f448d92cbf40d7eae74840825f7b0e377ee5c8839 | — | |
hash6f9a7ab475b4c1ea871f7b16338a531703af0443f987c748fa5fff075b8c5f91 | — | |
hash8ef05f4d7d4d96ca6f758f2b5093b7d378e2e986667967fe36dbdaf52f338587 | — | |
hashb02d8f8cf57abdc92b3af2545f1e46f1813f192f4a200a3de102fd38cf048517 | — | |
hashbcb9e99021f88b9720a667d737a3ddd7d5b9f963ac3cae6d26e74701e406dcdc | — | |
hashe8d0943042e34a37ae8d79aeb4f9a2fa07b4a37955af2b0cc0e232b79c2e72f3 | — |
Ip
Value | Description | Copy |
---|---|---|
ip167.17.188.244 | — | |
ip185.142.33.131 | — | |
ip193.233.23.81 | — | |
ip45.15.156.24 | — | |
ip91.149.253.134 | — | |
ip91.149.253.99 | — |
Domain
Value | Description | Copy |
---|---|---|
domainbsnowcommunications.com | — | |
domaingoodhillsenterprise.com | — | |
domainlapas.live | — | |
domainprincess-mens-club.com | — | |
domainprincess-mens.click | — | |
domainzoomconference.click | — |
Threat ID: 68f9361b62bc771d0f55e424
Added to database: 10/22/2025, 7:52:59 PM
Last enriched: 10/22/2025, 8:01:00 PM
Last updated: 10/22/2025, 10:52:54 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
New Python RAT Targets Gamers via Minecraft
MediumIIS servers owned by RudePanda like it's 2003
MediumRival Hackers Dox Alleged Operators of Lumma Stealer
MediumSocGholish Malware Using Compromised Sites and Fake Software Updates to Deliver Ransomware
MediumBrazilian Caminho Loader Employs LSB Steganography and Fileless Execution to Deliver Multiple Malware Families Across South America, Africa, and Eastern Europe
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.