UNG0801: Tracking Threat Clusters obsessed with AV Icon Spoofing targeting Israel
An analysis of threat clusters, dubbed UNG0801 or Operation IconCat, targeting Israeli organizations. The actors use socially engineered phishing lures in Hebrew, exploiting antivirus icon spoofing from well-known vendors like SentinelOne and Check Point. Two distinct infection chains were identified, both utilizing AV-themed decoys dropped by malicious Word and PDF documents. The first campaign deploys a PyInstaller-based implant called PYTRIC, capable of system-wide wipes and backup deletion. The second campaign uses a Rust-based implant named RUSTRIC, focusing on antivirus enumeration and system information gathering. Both campaigns share similar tactics but differ in their ultimate objectives, with the first aimed at destruction and the second at espionage.
AI Analysis
Technical Summary
UNG0801, also referred to as Operation IconCat, is a tracked threat cluster targeting Israeli organizations through sophisticated phishing campaigns that exploit antivirus icon spoofing. The attackers craft phishing lures in Hebrew, embedding malicious Word and PDF documents that drop AV-themed decoys mimicking icons from well-known security vendors such as SentinelOne and Check Point. This social engineering tactic increases the likelihood of user interaction and trust. Two distinct infection chains have been identified: the first deploys PYTRIC, a PyInstaller-based implant designed for destructive operations including system-wide data wiping and backup deletion, severely impacting system availability and data integrity. The second chain uses RUSTRIC, a Rust-based implant focused on reconnaissance activities such as antivirus enumeration and system information gathering, facilitating espionage and potential follow-on attacks. Both implants utilize advanced techniques including living-off-the-land binaries (LOLBins), process injection, and command and control communications over standard protocols, complicating detection. The campaigns share similar delivery and evasion tactics but diverge in their ultimate objectives—destruction versus espionage. Although the campaigns currently focus on Israeli targets, the use of globally deployed AV products and common phishing vectors suggests potential risks to other regions. No specific affected software versions or known exploits in the wild have been reported, and the threat is rated medium severity. The threat actors demonstrate a high level of operational security and targeted social engineering, indicating a motivated and capable adversary.
Potential Impact
For European organizations, the primary impact of UNG0801 would stem from the phishing-based delivery leveraging AV icon spoofing, which could deceive users into executing malicious documents. Organizations using security products from vendors like SentinelOne and Check Point may be at increased risk due to the familiarity of the spoofed icons. The destructive capabilities of PYTRIC pose a significant risk to data availability and integrity, potentially leading to operational disruption and data loss if backups are also targeted. RUSTRIC’s espionage focus threatens confidentiality by enabling attackers to gather detailed system and security posture information, which could facilitate further intrusions or data exfiltration. European entities involved in sectors with geopolitical relevance or those collaborating with Israeli counterparts might be targeted for intelligence gathering or sabotage. The use of living-off-the-land techniques and common protocols complicates detection and response efforts, increasing dwell time and potential damage. While no direct evidence of European targeting exists, the tactics and malware capabilities warrant vigilance, especially in critical infrastructure, government, and security-sensitive industries.
Mitigation Recommendations
European organizations should implement targeted phishing awareness training emphasizing the risks of AV icon spoofing and the dangers of opening unsolicited Word and PDF attachments, especially those requesting macro or script execution. Deploy advanced email filtering solutions capable of detecting and quarantining malicious documents with embedded decoys or suspicious macros. Security teams should monitor for indicators of living-off-the-land binary usage and anomalous process injection behaviors, leveraging endpoint detection and response (EDR) tools with behavioral analytics. Regularly audit and restrict the use of administrative tools and scripting environments to limit attacker lateral movement and execution capabilities. Maintain robust, immutable backups stored offline or in segregated environments to mitigate destructive malware impact. Ensure antivirus and endpoint security solutions are up to date and configured to detect known PyInstaller and Rust-based implants. Network monitoring should focus on detecting unusual outbound connections over common protocols that may indicate command and control activity. Collaboration with threat intelligence sharing platforms can provide early warnings if the threat expands beyond Israel. Finally, implement strict access controls and multi-factor authentication to reduce the risk of credential compromise and lateral movement.
Affected Countries
Israel, Germany, United Kingdom, France, Netherlands, Italy
Indicators of Compromise
- hash: 3c2fd296da55d1398edd7b6bb375a960
- hash: 7f4ded56abaacb2bf4649665ac259c7c
- hash: f06e30dee8629e951cefa73373fdef9d
- hash: f97650ede0c39a29b0b5c5472f685d11
- hash: 25f27131e8de91f8d6fdf9bfa1901577f992ce33
- hash: 6071349b86368768365d4a926e75f2972410fa04
- hash: 8ef8d08d98a7680d1cc7f3a367813e5568b2033d
- hash: d6ae00e158a266eb8427b61ce06ea8f9468bc7b2
- hash: 2afcac3231235b5cea0fc702d705ec76afec424a9cec820749b83b6299d1fe1b
- hash: 54ebdea80d30660f1d7be0b71bc3eb04189ef2036cdbba24d60f474547d3516a
- hash: 6df21646d13c5b68c14c70516dfc74ef2aef4a4246970d7f4fbd072053ba40e6
- hash: 6f079c1e2655ed391fb8f0b6bfafa126acf905732b5554f38a9d32d0b9ca407d
- hash: 77ceeb88a1fe4fb03af1acc589e02aeb156e3b22b110124ce1b25c940b0d9bbe
- hash: e422c2f25fbb4951f069c6ba24e9b917e95edb9019c10d34de4309f480c342df
- ip: 159.198.68.25
- domain: stratioai.org
UNG0801: Tracking Threat Clusters obsessed with AV Icon Spoofing targeting Israel
Description
An analysis of threat clusters, dubbed UNG0801 or Operation IconCat, targeting Israeli organizations. The actors use socially engineered phishing lures in Hebrew, exploiting antivirus icon spoofing from well-known vendors like SentinelOne and Check Point. Two distinct infection chains were identified, both utilizing AV-themed decoys dropped by malicious Word and PDF documents. The first campaign deploys a PyInstaller-based implant called PYTRIC, capable of system-wide wipes and backup deletion. The second campaign uses a Rust-based implant named RUSTRIC, focusing on antivirus enumeration and system information gathering. Both campaigns share similar tactics but differ in their ultimate objectives, with the first aimed at destruction and the second at espionage.
AI-Powered Analysis
Technical Analysis
UNG0801, also referred to as Operation IconCat, is a tracked threat cluster targeting Israeli organizations through sophisticated phishing campaigns that exploit antivirus icon spoofing. The attackers craft phishing lures in Hebrew, embedding malicious Word and PDF documents that drop AV-themed decoys mimicking icons from well-known security vendors such as SentinelOne and Check Point. This social engineering tactic increases the likelihood of user interaction and trust. Two distinct infection chains have been identified: the first deploys PYTRIC, a PyInstaller-based implant designed for destructive operations including system-wide data wiping and backup deletion, severely impacting system availability and data integrity. The second chain uses RUSTRIC, a Rust-based implant focused on reconnaissance activities such as antivirus enumeration and system information gathering, facilitating espionage and potential follow-on attacks. Both implants utilize advanced techniques including living-off-the-land binaries (LOLBins), process injection, and command and control communications over standard protocols, complicating detection. The campaigns share similar delivery and evasion tactics but diverge in their ultimate objectives—destruction versus espionage. Although the campaigns currently focus on Israeli targets, the use of globally deployed AV products and common phishing vectors suggests potential risks to other regions. No specific affected software versions or known exploits in the wild have been reported, and the threat is rated medium severity. The threat actors demonstrate a high level of operational security and targeted social engineering, indicating a motivated and capable adversary.
Potential Impact
For European organizations, the primary impact of UNG0801 would stem from the phishing-based delivery leveraging AV icon spoofing, which could deceive users into executing malicious documents. Organizations using security products from vendors like SentinelOne and Check Point may be at increased risk due to the familiarity of the spoofed icons. The destructive capabilities of PYTRIC pose a significant risk to data availability and integrity, potentially leading to operational disruption and data loss if backups are also targeted. RUSTRIC’s espionage focus threatens confidentiality by enabling attackers to gather detailed system and security posture information, which could facilitate further intrusions or data exfiltration. European entities involved in sectors with geopolitical relevance or those collaborating with Israeli counterparts might be targeted for intelligence gathering or sabotage. The use of living-off-the-land techniques and common protocols complicates detection and response efforts, increasing dwell time and potential damage. While no direct evidence of European targeting exists, the tactics and malware capabilities warrant vigilance, especially in critical infrastructure, government, and security-sensitive industries.
Mitigation Recommendations
European organizations should implement targeted phishing awareness training emphasizing the risks of AV icon spoofing and the dangers of opening unsolicited Word and PDF attachments, especially those requesting macro or script execution. Deploy advanced email filtering solutions capable of detecting and quarantining malicious documents with embedded decoys or suspicious macros. Security teams should monitor for indicators of living-off-the-land binary usage and anomalous process injection behaviors, leveraging endpoint detection and response (EDR) tools with behavioral analytics. Regularly audit and restrict the use of administrative tools and scripting environments to limit attacker lateral movement and execution capabilities. Maintain robust, immutable backups stored offline or in segregated environments to mitigate destructive malware impact. Ensure antivirus and endpoint security solutions are up to date and configured to detect known PyInstaller and Rust-based implants. Network monitoring should focus on detecting unusual outbound connections over common protocols that may indicate command and control activity. Collaboration with threat intelligence sharing platforms can provide early warnings if the threat expands beyond Israel. Finally, implement strict access controls and multi-factor authentication to reduce the risk of credential compromise and lateral movement.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.seqrite.com/blog/ung0801-tracking-threat-clusters-obsessed-with-av-icon-spoofing-targeting-israel/"]
- Adversary
- UNG0801
- Pulse Id
- 69497ab14e1d473cf9e65693
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash3c2fd296da55d1398edd7b6bb375a960 | — | |
hash7f4ded56abaacb2bf4649665ac259c7c | — | |
hashf06e30dee8629e951cefa73373fdef9d | — | |
hashf97650ede0c39a29b0b5c5472f685d11 | — | |
hash25f27131e8de91f8d6fdf9bfa1901577f992ce33 | — | |
hash6071349b86368768365d4a926e75f2972410fa04 | — | |
hash8ef8d08d98a7680d1cc7f3a367813e5568b2033d | — | |
hashd6ae00e158a266eb8427b61ce06ea8f9468bc7b2 | — | |
hash2afcac3231235b5cea0fc702d705ec76afec424a9cec820749b83b6299d1fe1b | — | |
hash54ebdea80d30660f1d7be0b71bc3eb04189ef2036cdbba24d60f474547d3516a | — | |
hash6df21646d13c5b68c14c70516dfc74ef2aef4a4246970d7f4fbd072053ba40e6 | — | |
hash6f079c1e2655ed391fb8f0b6bfafa126acf905732b5554f38a9d32d0b9ca407d | — | |
hash77ceeb88a1fe4fb03af1acc589e02aeb156e3b22b110124ce1b25c940b0d9bbe | — | |
hashe422c2f25fbb4951f069c6ba24e9b917e95edb9019c10d34de4309f480c342df | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip159.198.68.25 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainstratioai.org | — |
Threat ID: 694a5f2d033f6f66d772eafb
Added to database: 12/23/2025, 9:21:49 AM
Last enriched: 1/5/2026, 11:08:32 AM
Last updated: 2/4/2026, 7:01:42 PM
Views: 238
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
341 Malicious Clawed Skills Found by the Bot They Were Targeting
MediumAPT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks
MediumThreatFox IOCs for 2026-02-03
MediumNotepad++ supply chain attack breakdown
MediumInfostealers without borders: macOS, Python stealers, and platform abuse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.