Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»PhantomCaptcha Campaign Targets Ukraine Relief Organizations
News

PhantomCaptcha Campaign Targets Ukraine Relief Organizations

Team-CWDBy Team-CWDOctober 22, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A coordinated phishing campaign aimed at humanitarian and government organizations supporting Ukraine’s war relief efforts has been uncovered by cybersecurity researchers. 

The operation, known as “PhantomCaptcha,” impersonated the Ukrainian President’s Office to trick victims into downloading malware through a malicious PDF document.

According to a new advisory by SentinelLABS and the Digital Security Lab of Ukraine published today, the attack began on October 8 2025, when targeted employees from the International Red Cross, UNICEF, the Norwegian Refugee Council and several Ukrainian regional administrations received phishing emails. 

These messages contained an eight-page PDF masquerading as an official government memo. Once opened, the document directed users to a fake Zoom site, zoomconference[.]app, which hosted malicious scripts on infrastructure owned by a Russian provider.

Victims were presented with what appeared to be a Cloudflare verification page. The page prompted them to perform several actions that ultimately executed a PowerShell command, allowing attackers to install malware onto their systems.

This technique, known as “ClickFix” or “Paste and Run,” relies on users unknowingly running commands themselves, bypassing standard security checks.

The malware operated in three separate stages:

  • Stage 1: A heavily obfuscated downloader script exceeding 500KB that retrieved additional payloads

  • Stage 2: A reconnaissance module gathering system identifiers, usernames and domain information

  • Stage 3: A WebSocket-based remote access Trojan (RAT) enabling command execution and data exfiltration

Researchers noted the infrastructure was active for just one day, reflecting a deliberate strategy to evade detection. However, backend servers remained online to manage infected devices.

Read more on malware delivery techniques and social engineering trends: AI-Driven Social Engineering Top Cyber Threat for 2026, ISACA Survey Reveals

Further analysis linked PhantomCaptcha to a wider operation involving malicious Android apps disguised as adult entertainment or cloud storage services.

One such domain, princess-mens[.]click, distributed an app called princess.apk, which collected contacts, media, SIM data and location details from infected devices. Although connected, this mobile vector is being tracked as a separate activity cluster.

“The PhantomCaptcha campaign reflects a highly capable adversary, demonstrating extensive operational planning, compartmentalized infrastructure, and deliberate exposure control,” SentinelLABS said.

“The six-month period between initial infrastructure registration and attack execution, followed by the swift takedown of user-facing domains while maintaining backend command-and-control, underscores an operator well-versed in both offensive tradecraft and defensive detection evasion.”

To defend against this threat, the company advised users to remain cautious of instructions requiring them to paste commands into Windows Run dialogs.

Organizations should also monitor PowerShell activity, enforce execution policy restrictions and track suspicious WebSocket connections, particularly those associated with newly registered or impersonated domains.

Image credit: rospoint / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleWhat AI Reveals About Web Applications— and Why It Matters
Next Article New Pixnapping Android Flaw Lets Rogue Apps Steal 2FA Codes Without Permissions
Team-CWD
  • Website

Related Posts

News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How the always-on generation can level up their cybersecurity game

September 11, 2025

When ‘hacking’ your game becomes a security risk

October 17, 2025

What it is and how to protect yourself

January 8, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.