Ukraine’s Defense Forces Under Attack: ‘SickSync’ Malware Strikes Again

The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a new campaign, “SickSync,” by the Vermin hacking group targeting Ukrainian defense forces. Vermin uses the legitimate file-syncing software SyncThing combined with SPECTR malware to steal sensitive military information.

Hot Take:

Looks like the Vermin are getting creative with their data theft techniques—Syncing their way into sensitive info like a rogue DJ at a silent disco!

Key Points:

  • CERT-UA identifies “SickSync” campaign by UAC-0020 (Vermin).
  • Attack targets Ukrainian defense using SyncThing and SPECTR malware.
  • Phishing email initiates the attack with a password-protected RARSFX archive.
  • SyncThing is modified for stealthy data synchronization and exfiltration.
  • SPECTR malware has multiple modules for stealing various types of data.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here