Cyber Security News

Signal Messenger Exploited in Targeted Attacks on Defense Industry Employees

The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of targeted cyberattacks against employees of the defense-industrial complex and members of the Defense Forces of Ukraine.

These attacks have been ongoing since at least the summer of 2024 and have escalated in recent months.

The attackers are using the Signal messenger app to distribute malicious files, often by compromising existing contacts’ accounts to increase trust.

Attack Vector and Tactics

During March 2025, CERT-UA observed that attackers were sending archived messages via Signal, claiming to contain reports from meetings.

These archives typically included a PDF file and an executable file classified as DarkTortilla, a cryptor/loader tool designed to decrypt and launch the DarkCrystal RAT (DCRAT) remote control software.

Signal MessengerSignal Messenger
Example of a chain of damage

The use of popular instant messaging apps like Signal expands the attack surface by creating uncontrolled information exchange channels, bypassing traditional security measures.

The content of the decoy messages has shifted to focus on topics such as UAVs and electronic warfare equipment since February 2025.

The attackers exploit the trust associated with receiving messages from known contacts, whose accounts have been compromised beforehand.

This tactic allows them to bypass security protocols and gain access to sensitive information within the defense-industrial complex.

CERT-UA has tracked this activity under the identifier UAC-0200 and urges recipients of such suspicious messages to report them immediately.

Cyber Threat Indicators

CERT-UA has identified several files and network indicators associated with these attacks. The files include various executable and archive files with specific hashes, which are used to distribute the DarkCrystal RAT.

Network indicators involve several IP addresses and URLs linked to the attackers’ infrastructure.

These indicators are crucial for identifying and mitigating potential threats within the defense sector.

In response to these targeted attacks, CERT-UA emphasizes the importance of vigilance and prompt reporting of suspicious activities.

The use of instant messengers for distributing malware highlights the evolving nature of cyber threats and the need for robust security measures across all communication channels.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup – Try for Free

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Threat Actors Use Fake DocuSign Notifications to Steal Corporate Data

DocuSign has emerged as a cornerstone for over 1.6 million customers worldwide, including 95% of…

7 hours ago

Government Calls on Organizations to Adopt SIEM and SOAR Solutions

In a landmark initiative, international cybersecurity agencies have released a comprehensive series of publications to…

8 hours ago

WordPress TI WooCommerce Wishlist Plugin Flaw Puts Over 100,000 Websites at Risk of Cyberattack

A severe security flaw has been identified in the TI WooCommerce Wishlist plugin, a widely…

8 hours ago

Microsoft Alerts on Void Blizzard Hackers Targeting Telecommunications and IT Sectors

Microsoft Threat Intelligence Center (MSTIC) has issued a critical warning about a cluster of global…

9 hours ago

Hackers Use Fake OneNote Login to Capture Office365 and Outlook Credentials

A recent investigation by security analysts has uncovered a persistent phishing campaign targeting Italian and…

9 hours ago

Hackers Exploit Craft CMS Vulnerability to Inject Cryptocurrency Miner Malware

Threat actors have exploited a critical Remote Code Execution (RCE) vulnerability, identified as CVE-2025-32432, in…

9 hours ago