BTC $59246.0759
ETH $2995.7847
BNB $560.8604
SOL $138.0744
XRP $0.5183
stETH $2982.0890
DOGE $0.1321
TON $5.1388
ADA $0.4587
AVAX $33.6055
TRX $0.1224
wstETH $3490.8845
DOT $7.2799
WETH $2992.3007
WBTC $59249.7174
BCH $430.2348
LINK $13.5938
MATIC $0.7204
ICP $13.5128
UNI $7.1109
LTC $80.3769
DAI $0.9997
FDUSD $1.0012
IMX $2.2107
CAKE $2.5395
RNDR $7.8309
ETC $25.6953
NEAR $6.0884
HBAR $0.1004
MNT $0.9960
FIL $5.9379
PEPE $0.0000
STX $2.0910
OKB $48.8337
ATOM $8.6475
WIF $2.7383
TAO $404.5622
MKR $2771.4511
VET $0.0352
KAS $0.1071
GRT $0.2510
USDE $0.9989
XMR $123.1596
AR $34.3482
XLM $0.1103
FET $2.0035
INJ $23.4527
BTC $59246.0759
ETH $2995.7847
BNB $560.8604
SOL $138.0744
XRP $0.5183
stETH $2982.0890
DOGE $0.1321
TON $5.1388
ADA $0.4587
AVAX $33.6055
TRX $0.1224
wstETH $3490.8845
DOT $7.2799
WETH $2992.3007
WBTC $59249.7174
BCH $430.2348
LINK $13.5938
MATIC $0.7204
ICP $13.5128
UNI $7.1109
LTC $80.3769
DAI $0.9997
FDUSD $1.0012
IMX $2.2107
CAKE $2.5395
RNDR $7.8309
ETC $25.6953
NEAR $6.0884
HBAR $0.1004
MNT $0.9960
FIL $5.9379
PEPE $0.0000
STX $2.0910
OKB $48.8337
ATOM $8.6475
WIF $2.7383
TAO $404.5622
MKR $2771.4511
VET $0.0352
KAS $0.1071
GRT $0.2510
USDE $0.9989
XMR $123.1596
AR $34.3482
XLM $0.1103
FET $2.0035
INJ $23.4527
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Cuba partners defiantly attack critical infrastructure in Ukraine


    The Computer Emergency Response Team of Ukraine (CERT-UA) warns of possible attacks by Cuba operators on Ukrainian critical infrastructure. On October 21, 2022, CERT-UA uncovered a phishing campaign during which attackers in emails pretended to be the press service of the General Staff of the Armed Forces of Ukraine. The phishing emails contained a link to a website that automatically started downloading a document called "Nakaz_309.pdf".

    This website has been designed in such a way as to force the reader to update the software (PDF Reader). And if the victim clicks on the “DOWNLOAD” button, then an exe file will be downloaded to their computer under the name "AcroRdrDCx642200120169_uk_UA.exe".

    Running the executable will decode and run the "rmtpak.dll" DLL, which is a Remote Access Trojan (RAT) called ROMCOM. This malware communicates with C&C servers through ICMP requests made through Windows API functions. In addition, ROMCOM RAT supports ten basic commands:

    • Get information about the connected disk;
    • Get lists of files for the specified directory;
    • Run the reverse shell svchelper.exe in the %ProgramData% folder;
    • Upload data to the management server as a ZIP file using IShellDispatch to copy files;
    • Download data and write to worker.txt in the %ProgramData% folder;
    • Delete the specified file;
    • Delete the specified directory;
    • Create a process with PID spoofing;
    • Process only the ServiceMain received from the management server and "sleep" for 120,000 ms;
    • Traverse running processes and collect their IDs.

    Recall that earlier this remote access Trojan was used by Tropical Scorpius (aka UNC2596), tracked by CERT-UA under the identifier UAC-0132 and distributing malware from Cuba.

    The CERT-UA warning said: “Given the use of the RomCom backdoor, as well as other features of the associated files, we believe it is possible to connect the detected activity with the activity of the Tropical Scorpius (aka UNC2596) group, which is responsible for distributing ransomware from Cuba.”
    Author DeepWeb
    Car dealer Pendragon refuses to pay $60 million ransom to LockBit
    Neurotransmitters of good mood: serotonin, dopamine, norepinephrine

    Comments 0

    Add comment