Friday, March 28, 2025
HomeCyber AttackSignal Messenger Exploited in Targeted Attacks on Defense Industry Employees

Signal Messenger Exploited in Targeted Attacks on Defense Industry Employees

Published on

SIEM as a Service

Follow Us on Google News

The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of targeted cyberattacks against employees of the defense-industrial complex and members of the Defense Forces of Ukraine.

These attacks have been ongoing since at least the summer of 2024 and have escalated in recent months.

The attackers are using the Signal messenger app to distribute malicious files, often by compromising existing contacts’ accounts to increase trust.

Attack Vector and Tactics

During March 2025, CERT-UA observed that attackers were sending archived messages via Signal, claiming to contain reports from meetings.

These archives typically included a PDF file and an executable file classified as DarkTortilla, a cryptor/loader tool designed to decrypt and launch the DarkCrystal RAT (DCRAT) remote control software.

Signal Messenger
Example of a chain of damage 

The use of popular instant messaging apps like Signal expands the attack surface by creating uncontrolled information exchange channels, bypassing traditional security measures.

The content of the decoy messages has shifted to focus on topics such as UAVs and electronic warfare equipment since February 2025.

The attackers exploit the trust associated with receiving messages from known contacts, whose accounts have been compromised beforehand.

This tactic allows them to bypass security protocols and gain access to sensitive information within the defense-industrial complex.

CERT-UA has tracked this activity under the identifier UAC-0200 and urges recipients of such suspicious messages to report them immediately.

Cyber Threat Indicators

CERT-UA has identified several files and network indicators associated with these attacks. The files include various executable and archive files with specific hashes, which are used to distribute the DarkCrystal RAT.

Network indicators involve several IP addresses and URLs linked to the attackers’ infrastructure.

These indicators are crucial for identifying and mitigating potential threats within the defense sector.

In response to these targeted attacks, CERT-UA emphasizes the importance of vigilance and prompt reporting of suspicious activities.

The use of instant messengers for distributing malware highlights the evolving nature of cyber threats and the need for robust security measures across all communication channels.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Meta AI Expands to 41 European Countries in New Rollout

Meta AI has announced its rollout across 41 European countries. This development marks a...

Cloudflare Introduces OpenPubkey SSH with Single Sign-On Integration

Cloudflare has contributed to the open-sourcing of OPKSSH, a tool that integrates single sign-on...

Mozilla Releases Urgent Patch for Windows After Chrome Zero-Day Exploit

Mozilla has released an urgent update for Firefox on Windows to address a critical...

Kuala Lumpur Airport Hit by Cyberattack, Hackers Demand $10M Ransom

Kuala Lumpur International Airport (KLIA), one of Southeast Asia's busiest airports, was hit by...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Meta AI Expands to 41 European Countries in New Rollout

Meta AI has announced its rollout across 41 European countries. This development marks a...

Cloudflare Introduces OpenPubkey SSH with Single Sign-On Integration

Cloudflare has contributed to the open-sourcing of OPKSSH, a tool that integrates single sign-on...

Mozilla Releases Urgent Patch for Windows After Chrome Zero-Day Exploit

Mozilla has released an urgent update for Firefox on Windows to address a critical...