Monday, April 28, 2025
Homecyber securityUAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

Published on

SIEM as a Service

Follow Us on Google News

In a concerning development, CERT-UA, Ukraine’s Computer Emergency Response Team, has reported a series of cyberattacks attributed to the hacker group identified as UAC-0219.

These attacks, which have been ongoing since the fall of 2024, utilize an advanced PowerShell-based malware tool named WRECKSTEEL to infiltrate computers and extract sensitive data.

The primary targets include government agencies and critical infrastructure facilities across Ukraine.

- Advertisement - Google News

Sophisticated Attack Methodology

The cyber espionage campaign employs a multi-stage attack mechanism.

Initially, compromised accounts are used to distribute phishing emails containing links to public file-sharing services such as DropMeFiles and Google Drive.

These links often appear in PDF attachments and lead victims to download VBScript loaders disguised as “.js” files.

Once executed, these scripts deploy a PowerShell payload designed to search for specific file types such as “.doc”, “.pdf”, “.xlsx”, and “.jpeg” and upload them using cURL commands.

Additionally, the malware captures screenshots of infected computers to further enhance data collection capabilities.

CERT-UA’s analysis reveals that earlier versions of this malware relied on EXE files created with the NSIS installer, which included decoy documents and tools like the IrfanView graphics editor for screenshot capture.

However, since 2025, the screenshot functionality has been fully integrated into the PowerShell script itself, demonstrating an evolution in the attackers’ tactics.

WRECKSTEEL: A Versatile Data-Stealing Tool

The WRECKSTEEL malware is central to these operations and exists in both VBScript and PowerShell variants.

Its primary function is to systematically steal files from compromised systems.

The malware’s design reflects a high level of sophistication, allowing it to evade detection while efficiently gathering targeted data.

CERT-UA has tracked this activity under the identifier UAC-0219 and warns that similar tools may be deployed in future attacks against other critical sectors.

The ongoing cyberattacks highlight the persistent threat posed by UAC-0219 and similar groups.

CERT-UA emphasizes the importance of vigilance among organizations handling sensitive information.

Indicators of compromise (IoCs), including malicious scripts and network addresses associated with these attacks, have been shared publicly to aid in detection efforts.

Organizations are urged to report any signs of compromise immediately to CERT-UA for rapid response and mitigation measures.

As Ukraine continues to face cyber threats targeting its critical infrastructure, CERT-UA remains committed to analyzing incidents and providing timely updates on emerging risks.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...

React Router Vulnerabilities Allow Attackers to Spoof Content and Alter Values

The widely used React Router library, a critical navigation tool for React applications, has...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Obfuscation Techniques: A Key Weapon in the Ongoing War Between Hackers and Defenders

Obfuscation stands as a powerful weapon for attackers seeking to shield their malicious code...