Ghostwriter reactivates: campaigns directed against Ukraine reveal an increasingly mature cyber threat

Published 4 min de lectura 39 reading

An actor in line with Belarus known publicly as Ghostwriter - also traced as FrostyNeedbor, PUSHCHA, Storm-0257, TA445, Umbral Bison / RepeatingUmbra, NC1151, among others - has reactivated a series of campaigns directed against government and defence institutions in Ukraine, according to recent analysis shared with media and selling labs. These operations, active since at least 2016, show a constant evolution in methods and tools: from the use of PicassoLoader and Cobalt Strike to the exploitation of vulnerabilities in WinRAR (CVE-2023-38831) and Roundcube webmail (CVE-2024-42009).

What distinguishes this group is not only historical persistence, but its operational maturity. The attackers combine servo-side validations to avoid activating malicious loads off-target (geofencing), use dynamic CAPTCHAs as anti-analysis technique, and manually select high-value victims after collecting prints from the system. The typical flow detected since March 2026 uses decoy PDFs that include links to RAR files; these RAR contain JavaScript payloads that run a version of PicassoLoader to ultimately deploy Cobalt Strike Beacon in the systems of interest.

Ghostwriter reactivates: campaigns directed against Ukraine reveal an increasingly mature cyber threat
Image generated with IA.

In addition to the main objective in Ukraine, previous and parallel campaigns have affected Poland, Lithuania and other countries in the region, with a broader victimology covering industrial, health and logistical sectors. The strategy of compromising legitimate mail accounts and using them to spread new phishing messages increases the risk: a single mailbox taken can become a chain engagement platform, allowing internal surveys, exfiltration of contacts and escalation of access.

These tactics fit into a broader context where both state or aligned groups and criminal and hacktivist actors operate with different but often overlapping objectives: to interrupt, spy or profit. Contemporary reports have pointed out Gamaredon's campaigns against Ukrainian institutions, pro-Ukrainian hacktivist operations against Russian targets and financial scams that abuse committed accounts to divert payments.

For defenders and security officials, this has several practical implications. First, the combination of convincing lures and validations servo-side complicates the traditional analysis, because many samples do not show the payload if they are consulted from PIs or use agents outside the target. Second, the existence of multiple stages (dropper JavaScript → loader → Beacon) requires detection at various levels: attachment analysis and links, browser instrumentation / JS, endpoint behavior and persistent network telemetry.

The specific recommendations begin by correcting known operating vectors: apply patches and mitigation for components such as WinRAR and Roundcube, review configurations and update to versions without the related vulnerabilities (see CVE chips for technical details). For official references on the above vulnerabilities, see the entries in the national vulnerability database: CVE-2023-38831 and CVE-2024-42009.

In parallel, strengthen protection on the perimeter and mail: enable mandatory multifactor authentication, implement SPF / DKIM / DMARC policies with active monitoring, disable or restrict code execution from compressed files or embedded documents, and use link and attachment sandboxing. EDR instrumentation with behavior detection (e.g. processes that start PowerShell / JS from RAR or open persistent connections to unusual domains) increases the probability of early detection.

Ghostwriter reactivates: campaigns directed against Ukraine reveal an increasingly mature cyber threat
Image generated with IA.

From the network, monitor and block IOCs indicators and beaconing patterns associated with loads such as Cobalt Strike; limit outgoing traffic to authorized destinations and apply segmentation to prevent side movements. For organizations operating in the defence and public administration environment, consider additional controls such as white application allowlisting and rigorous reviews of privileges and remote access.

If you suspect commitment, act with immediate containment: isolate the affected machines, preserve logs and evidence, change committed credentials and conduct a range search to detect exfiltrations and accounts used to pivote. Coordinate the response with national cybersecurity authorities and intelligence providers, and share TTPs and artifacts to improve collective detection.

The relationship between state operations, hacktivism and organized crime in the region shows that cybersecurity is no longer a technical issue but a geopolitical and economic issue. To maintain an effective defensive position, organizations and suppliers must combine diligent patching, multi-layer monitoring and sectoral collaboration. To follow the technical coverage and analysis published on these campaigns, the specialized press and the sales analysis are available: The Hacker News and research reports in the safety ecosystem such as those published by ESET in WeLiveSecurity.

Coverage

Related

More news on the same subject.