Thursday, April 24, 2025
HomeCyber AttackSignal Messenger Exploited in Targeted Attacks on Defense Industry Employees

Signal Messenger Exploited in Targeted Attacks on Defense Industry Employees

Published on

SIEM as a Service

Follow Us on Google News

The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of targeted cyberattacks against employees of the defense-industrial complex and members of the Defense Forces of Ukraine.

These attacks have been ongoing since at least the summer of 2024 and have escalated in recent months.

The attackers are using the Signal messenger app to distribute malicious files, often by compromising existing contacts’ accounts to increase trust.

- Advertisement - Google News

Attack Vector and Tactics

During March 2025, CERT-UA observed that attackers were sending archived messages via Signal, claiming to contain reports from meetings.

These archives typically included a PDF file and an executable file classified as DarkTortilla, a cryptor/loader tool designed to decrypt and launch the DarkCrystal RAT (DCRAT) remote control software.

Signal Messenger
Example of a chain of damage 

The use of popular instant messaging apps like Signal expands the attack surface by creating uncontrolled information exchange channels, bypassing traditional security measures.

The content of the decoy messages has shifted to focus on topics such as UAVs and electronic warfare equipment since February 2025.

The attackers exploit the trust associated with receiving messages from known contacts, whose accounts have been compromised beforehand.

This tactic allows them to bypass security protocols and gain access to sensitive information within the defense-industrial complex.

CERT-UA has tracked this activity under the identifier UAC-0200 and urges recipients of such suspicious messages to report them immediately.

Cyber Threat Indicators

CERT-UA has identified several files and network indicators associated with these attacks. The files include various executable and archive files with specific hashes, which are used to distribute the DarkCrystal RAT.

Network indicators involve several IP addresses and URLs linked to the attackers’ infrastructure.

These indicators are crucial for identifying and mitigating potential threats within the defense sector.

In response to these targeted attacks, CERT-UA emphasizes the importance of vigilance and prompt reporting of suspicious activities.

The use of instant messengers for distributing malware highlights the evolving nature of cyber threats and the need for robust security measures across all communication channels.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...

Threat Actors Exploiting Unsecured Kubernetes Clusters for Crypto Mining

In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Verizon DBIR Report: Small Businesses Identified as Key Targets in Ransomware Attacks

Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints...

Lazarus APT Targets Organizations by Exploiting One-Day Vulnerabilities

A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group,...

ToyMaker Hackers Compromise Numerous Hosts via SSH and File Transfer Tools

In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure...