Russia clings to malware as attacks on Ukraine persist
Briefly

Equipped with ample personal data and contact phone numbers, UAC-0184 hackers impersonate others and initiate communication with their intended victims, often through Signal. It's worth noting that they employ any available resources to 'groom' their targets, including dating platforms.
After gaining the victim's trust, under the guise of sending documents related to awards, combat footage, or recruitment to other units, the hackers send an archive containing a shortcut file. Opening the shortcut file on a computer displays a decoy file relevant to the conversation topic while simultaneously infecting the system with a downloader malware.
The report details a case study in which UAC-0184, a known Russian cyberespionage outfit, targets military personnel, specifically using messaging apps such as Signal to steal sensitive documents.
Read at Theregister
[
|
]