Cyber Security News

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine’s Computer Emergency Response Team, has reported a series of cyberattacks attributed to the hacker group identified as UAC-0219.

These attacks, which have been ongoing since the fall of 2024, utilize an advanced PowerShell-based malware tool named WRECKSTEEL to infiltrate computers and extract sensitive data.

The primary targets include government agencies and critical infrastructure facilities across Ukraine.

Sophisticated Attack Methodology

The cyber espionage campaign employs a multi-stage attack mechanism.

Initially, compromised accounts are used to distribute phishing emails containing links to public file-sharing services such as DropMeFiles and Google Drive.

These links often appear in PDF attachments and lead victims to download VBScript loaders disguised as “.js” files.

Once executed, these scripts deploy a PowerShell payload designed to search for specific file types such as “.doc”, “.pdf”, “.xlsx”, and “.jpeg” and upload them using cURL commands.

Additionally, the malware captures screenshots of infected computers to further enhance data collection capabilities.

CERT-UA’s analysis reveals that earlier versions of this malware relied on EXE files created with the NSIS installer, which included decoy documents and tools like the IrfanView graphics editor for screenshot capture.

However, since 2025, the screenshot functionality has been fully integrated into the PowerShell script itself, demonstrating an evolution in the attackers’ tactics.

WRECKSTEEL: A Versatile Data-Stealing Tool

The WRECKSTEEL malware is central to these operations and exists in both VBScript and PowerShell variants.

Its primary function is to systematically steal files from compromised systems.

The malware’s design reflects a high level of sophistication, allowing it to evade detection while efficiently gathering targeted data.

CERT-UA has tracked this activity under the identifier UAC-0219 and warns that similar tools may be deployed in future attacks against other critical sectors.

The ongoing cyberattacks highlight the persistent threat posed by UAC-0219 and similar groups.

CERT-UA emphasizes the importance of vigilance among organizations handling sensitive information.

Indicators of compromise (IoCs), including malicious scripts and network addresses associated with these attacks, have been shared publicly to aid in detection efforts.

Organizations are urged to report any signs of compromise immediately to CERT-UA for rapid response and mitigation measures.

As Ukraine continues to face cyber threats targeting its critical infrastructure, CERT-UA remains committed to analyzing incidents and providing timely updates on emerging risks.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra

Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Recent Posts

Shuckworm Group Leverages GammaSteel Malware in Targeted PowerShell Attacks

The Russia-linked cyber-espionage group known as Shuckworm (also identified as Gamaredon or Armageddon) has been…

23 minutes ago

ViperSoftX Malware Spreads Through Cracked Software, Targeting Unsuspecting Users

AhnLab Security Intelligence Center (ASEC) has unearthed a complex cyber campaign in which attackers, suspected…

38 minutes ago

The State of AI Malware and Defenses Against It

AI has recently been added to the list of things that keep cybersecurity leaders awake.…

1 hour ago

Rogue Account‑Creation Flaw Leaves 100 K WordPress Sites Exposed

A severe vulnerability has been uncovered in the SureTriggers WordPress plugin, which could leave over…

1 hour ago

GOFFEE Deploys PowerModul in Coordinated Strikes on Government and Energy Networks

The threat actor known as GOFFEE has launched a series of targeted attacks against critical…

1 hour ago

A Seven‑Year‑Old Cisco Flaw Now Lets Hackers Execute Code Remotely on Network Gear

A Cisco’s Smart Install protocol (CVE-2018-0171), first patched in 2018, remains a pervasive threat to…

1 hour ago