UAC-0056

Threat Actor updated 6 months ago (2024-05-04T20:04:21.443Z)
Download STIX
Preview STIX
The Russia-sponsored threat actor group, Nodaria (UAC-0056), has been identified as using a new information stealing malware called Graphiron against targets in Ukraine since October 2022. The malware is used to steal sensitive data from compromised websites, including Google AdSense accounts, through tactics such as typosquatting, malicious redirects, and pseudo-short URL domains. One of the primary targets of Nodaria's attacks is organizations in Ukraine. They use DDoS-Guard and other tactics to remain undetected while stealing information. The introduction of the Graphiron malware marks a new phase in Nodaria's operations, which previously relied on simpler infostealers to achieve their goals. This development highlights the ever-evolving threat landscape that organizations face and the need for robust cybersecurity measures to protect against attacks by state-sponsored threat actors like Nodaria (UAC-0056). As always, organizations are encouraged to keep their software up-to-date, maintain strict access controls, and regularly train employees on how to recognize and respond to potential security threats.
Description last updated: 2023-06-13T18:16:47.723Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the UAC-0056 Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more