Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

UNG0801: Tracking Threat Clusters obsessed with AV Icon Spoofing targeting Israel

0
Medium
Published: Mon Dec 22 2025 (12/22/2025, 17:06:57 UTC)
Source: AlienVault OTX General

Description

An analysis of threat clusters, dubbed UNG0801 or Operation IconCat, targeting Israeli organizations. The actors use socially engineered phishing lures in Hebrew, exploiting antivirus icon spoofing from well-known vendors like SentinelOne and Check Point. Two distinct infection chains were identified, both utilizing AV-themed decoys dropped by malicious Word and PDF documents. The first campaign deploys a PyInstaller-based implant called PYTRIC, capable of system-wide wipes and backup deletion. The second campaign uses a Rust-based implant named RUSTRIC, focusing on antivirus enumeration and system information gathering. Both campaigns share similar tactics but differ in their ultimate objectives, with the first aimed at destruction and the second at espionage.

AI-Powered Analysis

AILast updated: 01/05/2026, 11:08:32 UTC

Technical Analysis

UNG0801, also referred to as Operation IconCat, is a tracked threat cluster targeting Israeli organizations through sophisticated phishing campaigns that exploit antivirus icon spoofing. The attackers craft phishing lures in Hebrew, embedding malicious Word and PDF documents that drop AV-themed decoys mimicking icons from well-known security vendors such as SentinelOne and Check Point. This social engineering tactic increases the likelihood of user interaction and trust. Two distinct infection chains have been identified: the first deploys PYTRIC, a PyInstaller-based implant designed for destructive operations including system-wide data wiping and backup deletion, severely impacting system availability and data integrity. The second chain uses RUSTRIC, a Rust-based implant focused on reconnaissance activities such as antivirus enumeration and system information gathering, facilitating espionage and potential follow-on attacks. Both implants utilize advanced techniques including living-off-the-land binaries (LOLBins), process injection, and command and control communications over standard protocols, complicating detection. The campaigns share similar delivery and evasion tactics but diverge in their ultimate objectives—destruction versus espionage. Although the campaigns currently focus on Israeli targets, the use of globally deployed AV products and common phishing vectors suggests potential risks to other regions. No specific affected software versions or known exploits in the wild have been reported, and the threat is rated medium severity. The threat actors demonstrate a high level of operational security and targeted social engineering, indicating a motivated and capable adversary.

Potential Impact

For European organizations, the primary impact of UNG0801 would stem from the phishing-based delivery leveraging AV icon spoofing, which could deceive users into executing malicious documents. Organizations using security products from vendors like SentinelOne and Check Point may be at increased risk due to the familiarity of the spoofed icons. The destructive capabilities of PYTRIC pose a significant risk to data availability and integrity, potentially leading to operational disruption and data loss if backups are also targeted. RUSTRIC’s espionage focus threatens confidentiality by enabling attackers to gather detailed system and security posture information, which could facilitate further intrusions or data exfiltration. European entities involved in sectors with geopolitical relevance or those collaborating with Israeli counterparts might be targeted for intelligence gathering or sabotage. The use of living-off-the-land techniques and common protocols complicates detection and response efforts, increasing dwell time and potential damage. While no direct evidence of European targeting exists, the tactics and malware capabilities warrant vigilance, especially in critical infrastructure, government, and security-sensitive industries.

Mitigation Recommendations

European organizations should implement targeted phishing awareness training emphasizing the risks of AV icon spoofing and the dangers of opening unsolicited Word and PDF attachments, especially those requesting macro or script execution. Deploy advanced email filtering solutions capable of detecting and quarantining malicious documents with embedded decoys or suspicious macros. Security teams should monitor for indicators of living-off-the-land binary usage and anomalous process injection behaviors, leveraging endpoint detection and response (EDR) tools with behavioral analytics. Regularly audit and restrict the use of administrative tools and scripting environments to limit attacker lateral movement and execution capabilities. Maintain robust, immutable backups stored offline or in segregated environments to mitigate destructive malware impact. Ensure antivirus and endpoint security solutions are up to date and configured to detect known PyInstaller and Rust-based implants. Network monitoring should focus on detecting unusual outbound connections over common protocols that may indicate command and control activity. Collaboration with threat intelligence sharing platforms can provide early warnings if the threat expands beyond Israel. Finally, implement strict access controls and multi-factor authentication to reduce the risk of credential compromise and lateral movement.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.seqrite.com/blog/ung0801-tracking-threat-clusters-obsessed-with-av-icon-spoofing-targeting-israel/"]
Adversary
UNG0801
Pulse Id
69497ab14e1d473cf9e65693
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash3c2fd296da55d1398edd7b6bb375a960
hash7f4ded56abaacb2bf4649665ac259c7c
hashf06e30dee8629e951cefa73373fdef9d
hashf97650ede0c39a29b0b5c5472f685d11
hash25f27131e8de91f8d6fdf9bfa1901577f992ce33
hash6071349b86368768365d4a926e75f2972410fa04
hash8ef8d08d98a7680d1cc7f3a367813e5568b2033d
hashd6ae00e158a266eb8427b61ce06ea8f9468bc7b2
hash2afcac3231235b5cea0fc702d705ec76afec424a9cec820749b83b6299d1fe1b
hash54ebdea80d30660f1d7be0b71bc3eb04189ef2036cdbba24d60f474547d3516a
hash6df21646d13c5b68c14c70516dfc74ef2aef4a4246970d7f4fbd072053ba40e6
hash6f079c1e2655ed391fb8f0b6bfafa126acf905732b5554f38a9d32d0b9ca407d
hash77ceeb88a1fe4fb03af1acc589e02aeb156e3b22b110124ce1b25c940b0d9bbe
hashe422c2f25fbb4951f069c6ba24e9b917e95edb9019c10d34de4309f480c342df

Ip

ValueDescriptionCopy
ip159.198.68.25

Domain

ValueDescriptionCopy
domainstratioai.org

Threat ID: 694a5f2d033f6f66d772eafb

Added to database: 12/23/2025, 9:21:49 AM

Last enriched: 1/5/2026, 11:08:32 AM

Last updated: 2/4/2026, 7:01:42 PM

Views: 238

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats