Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
Cybersecurity researchers have disclosed details of a coordinated spear-phishing campaign dubbed PhantomCaptcha targeting organizations associated with Ukraine's war relief efforts to deliver a remote access trojan that uses a WebSocket for command-and-control (C2). The activity, which took place on October 8, 2025, targeted individual members of the International Red Cross, Norwegian Refugee
AI Analysis
Technical Summary
PhantomCaptcha is a spear-phishing campaign disclosed in October 2025 that targets organizations involved in Ukraine's war relief efforts, including the International Red Cross, Norwegian Refugee Council, UNICEF Ukraine, and regional Ukrainian governments. The attack begins with phishing emails impersonating the Ukrainian President's Office, delivering weaponized PDFs containing embedded links. When victims click these links, they are redirected to a fake Zoom website (zoomconference[.]app) that simulates a Cloudflare CAPTCHA page to trick users into running a malicious PowerShell command. This command downloads an obfuscated downloader that fetches a second-stage payload performing host reconnaissance and then installs a WebSocket-based remote access trojan (RAT). The RAT connects to a command-and-control server hosted on Russian infrastructure, communicating via WebSocket with Base64-encoded JSON messages to execute arbitrary PowerShell commands and exfiltrate data. The campaign infrastructure was registered months in advance, with domains used briefly to evade detection. Additionally, fake Android applications hosted on other domains were used to collect extensive device data. The campaign demonstrates advanced operational security, compartmentalized infrastructure, and sophisticated social engineering tactics. While no direct attribution is confirmed, similarities with Russia-linked COLDRIVER group tactics are noted. The campaign’s targeting of humanitarian and government entities involved in Ukraine relief efforts highlights its strategic intent and potential geopolitical motivations.
Potential Impact
European organizations involved in humanitarian aid, government administration, and international relief efforts related to Ukraine face significant risks from this campaign. Compromise of such entities could lead to unauthorized access to sensitive personal data, operational disruption, and leakage of strategic information related to Ukraine’s war relief activities. The RAT’s capabilities allow attackers to execute arbitrary commands, exfiltrate data, and deploy further malware, potentially undermining organizational integrity and availability of critical services. The use of fake Zoom meetings exploits trust in widely used collaboration tools, increasing the likelihood of successful social engineering. Additionally, the campaign’s targeting of Android devices could expose European aid workers’ mobile data, including location and communications, further endangering operational security. The medium severity rating reflects the targeted nature and complexity of the attack, but the potential for significant impact on confidentiality, integrity, and availability of critical humanitarian operations is high. European organizations supporting Ukraine must be vigilant against such sophisticated threats that blend social engineering with advanced malware delivery.
Mitigation Recommendations
1. Implement strict email filtering and phishing detection mechanisms focused on spear-phishing indicators, including domain impersonation and weaponized PDF attachments. 2. Conduct targeted user awareness training emphasizing the risks of executing commands from unsolicited documents and verifying meeting invitations, especially those purporting to be from high-profile government offices. 3. Enforce application whitelisting and restrict execution of PowerShell scripts unless explicitly approved and monitored. 4. Deploy endpoint detection and response (EDR) solutions capable of detecting obfuscated PowerShell activity and anomalous WebSocket communications. 5. Monitor network traffic for unusual WebSocket connections to suspicious domains, particularly those with short-lived or newly registered infrastructure. 6. Validate Zoom meeting invitations through official channels and discourage users from clicking links in unsolicited emails. 7. For mobile devices, enforce mobile device management (MDM) policies to prevent installation of unauthorized applications and monitor for suspicious app behavior. 8. Maintain up-to-date threat intelligence feeds to detect emerging indicators related to this campaign. 9. Coordinate with national cybersecurity centers and international partners to share intelligence and respond to incidents rapidly. 10. Conduct regular incident response exercises simulating social engineering attacks involving collaboration tools to improve organizational readiness.
Affected Countries
Ukraine, Italy, Slovakia, Norway, United Kingdom, Germany, Poland, France
Ukraine Aid Groups Targeted Through Fake Zoom Meetings and Weaponized PDF Files
Description
Cybersecurity researchers have disclosed details of a coordinated spear-phishing campaign dubbed PhantomCaptcha targeting organizations associated with Ukraine's war relief efforts to deliver a remote access trojan that uses a WebSocket for command-and-control (C2). The activity, which took place on October 8, 2025, targeted individual members of the International Red Cross, Norwegian Refugee
AI-Powered Analysis
Technical Analysis
PhantomCaptcha is a spear-phishing campaign disclosed in October 2025 that targets organizations involved in Ukraine's war relief efforts, including the International Red Cross, Norwegian Refugee Council, UNICEF Ukraine, and regional Ukrainian governments. The attack begins with phishing emails impersonating the Ukrainian President's Office, delivering weaponized PDFs containing embedded links. When victims click these links, they are redirected to a fake Zoom website (zoomconference[.]app) that simulates a Cloudflare CAPTCHA page to trick users into running a malicious PowerShell command. This command downloads an obfuscated downloader that fetches a second-stage payload performing host reconnaissance and then installs a WebSocket-based remote access trojan (RAT). The RAT connects to a command-and-control server hosted on Russian infrastructure, communicating via WebSocket with Base64-encoded JSON messages to execute arbitrary PowerShell commands and exfiltrate data. The campaign infrastructure was registered months in advance, with domains used briefly to evade detection. Additionally, fake Android applications hosted on other domains were used to collect extensive device data. The campaign demonstrates advanced operational security, compartmentalized infrastructure, and sophisticated social engineering tactics. While no direct attribution is confirmed, similarities with Russia-linked COLDRIVER group tactics are noted. The campaign’s targeting of humanitarian and government entities involved in Ukraine relief efforts highlights its strategic intent and potential geopolitical motivations.
Potential Impact
European organizations involved in humanitarian aid, government administration, and international relief efforts related to Ukraine face significant risks from this campaign. Compromise of such entities could lead to unauthorized access to sensitive personal data, operational disruption, and leakage of strategic information related to Ukraine’s war relief activities. The RAT’s capabilities allow attackers to execute arbitrary commands, exfiltrate data, and deploy further malware, potentially undermining organizational integrity and availability of critical services. The use of fake Zoom meetings exploits trust in widely used collaboration tools, increasing the likelihood of successful social engineering. Additionally, the campaign’s targeting of Android devices could expose European aid workers’ mobile data, including location and communications, further endangering operational security. The medium severity rating reflects the targeted nature and complexity of the attack, but the potential for significant impact on confidentiality, integrity, and availability of critical humanitarian operations is high. European organizations supporting Ukraine must be vigilant against such sophisticated threats that blend social engineering with advanced malware delivery.
Mitigation Recommendations
1. Implement strict email filtering and phishing detection mechanisms focused on spear-phishing indicators, including domain impersonation and weaponized PDF attachments. 2. Conduct targeted user awareness training emphasizing the risks of executing commands from unsolicited documents and verifying meeting invitations, especially those purporting to be from high-profile government offices. 3. Enforce application whitelisting and restrict execution of PowerShell scripts unless explicitly approved and monitored. 4. Deploy endpoint detection and response (EDR) solutions capable of detecting obfuscated PowerShell activity and anomalous WebSocket communications. 5. Monitor network traffic for unusual WebSocket connections to suspicious domains, particularly those with short-lived or newly registered infrastructure. 6. Validate Zoom meeting invitations through official channels and discourage users from clicking links in unsolicited emails. 7. For mobile devices, enforce mobile device management (MDM) policies to prevent installation of unauthorized applications and monitor for suspicious app behavior. 8. Maintain up-to-date threat intelligence feeds to detect emerging indicators related to this campaign. 9. Coordinate with national cybersecurity centers and international partners to share intelligence and respond to incidents rapidly. 10. Conduct regular incident response exercises simulating social engineering attacks involving collaboration tools to improve organizational readiness.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/10/ukraine-aid-groups-targeted-through.html","fetched":true,"fetchedAt":"2025-10-23T01:21:32.800Z","wordCount":1188}
Threat ID: 68f9831e93bcde9f320bfbd9
Added to database: 10/23/2025, 1:21:34 AM
Last enriched: 10/23/2025, 1:22:06 AM
Last updated: 12/7/2025, 7:47:17 AM
Views: 262
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-12-06
MediumResearchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
CriticalChinese State Hackers Use New BRICKSTORM Malware Against VMware Systems
MediumCritical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
CriticalAutoIT3 Compiled Scripts Dropping Shellcodes, (Fri, Dec 5th)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.