CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines, daily updates. Fast, privacy‑respecting. No ads, no tracking.

Fileless Phishing Campaign Targets Ukrainian Government Entities

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A fileless phishing campaign impersonating the Ukrainian police targets government entities in Ukraine. The attack uses malicious SVG files in emails to deliver Amatera Stealer and PureMiner malware. The campaign harvests credentials, system data, and mines cryptocurrency from compromised systems. The phishing emails, disguised as official notices from the National Police of Ukraine, contain an SVG attachment named 'elektronni_zapit_NPU.svg'. This file includes an embedded HTML <iframe> element that redirects victims to download malicious payloads. The attack chain involves multiple stages, including the use of a Compiled HTML Help (CHM) file and an HTML Application (HTA) CountLoader, to deploy the final payloads. The malware targets various browsers, chat applications, and system information, and can take remote control of victim devices.

Timeline

  1. 29.09.2025 17:49 1 articles · 14h ago

    Fileless Phishing Campaign Targets Ukrainian Government Entities

    A fileless phishing campaign impersonating the Ukrainian police targets government entities in Ukraine. The attack uses malicious SVG files in emails to deliver Amatera Stealer and PureMiner malware. The campaign harvests credentials, system data, and mines cryptocurrency from compromised systems. The phishing emails, disguised as official notices from the National Police of Ukraine, contain an SVG attachment named 'elektronni_zapit_NPU.svg'. This file includes an embedded HTML <iframe> element that redirects victims to download malicious payloads. The attack chain involves multiple stages, including the use of a Compiled HTML Help (CHM) file and an HTML Application (HTA) CountLoader, to deploy the final payloads. The malware targets various browsers, chat applications, and system information, and can take remote control of victim devices.

    Show sources

Information Snippets