Cyber Security News

Signal Messenger Leveraged for Targeted Attacks on Employees of Defense Industry

A sophisticated cyber espionage campaign targeting employees of defense industrial complex enterprises and representatives of the Defense Forces of Ukraine has been uncovered.

The attackers are using the popular Signal messenger app to distribute malicious archives that purportedly contain meeting reports, exploiting the trusted nature of the platform to bypass security measures.

The malicious campaign, tracked under the identifier UAC-0200, has been active since at least summer 2024 but has intensified during March 2025.

In some instances, the threat actors compromised existing contacts’ accounts to enhance the credibility of their messages.

Computer Emergency Response Team of Ukraine analysts noted that the distributed archives typically contain a PDF file alongside an executable file classified as DarkTortilla.

This cryptor/loader is designed to decrypt and launch the Dark Crystal RAT (DCRAT) remote control tool, providing attackers with comprehensive access to victims’ systems.

Since February 2025, the decoy messages have specifically focused on topics related to UAVs, electronic warfare equipment, and other defense-related technologies.

Security researchers warn that the use of popular instant messengers on both mobile devices and computers significantly expands the potential attack surface by creating communication channels that often bypass organizational security controls.

The malicious files employ sophisticated techniques to evade detection while establishing persistence on infected systems.

Attack Chain

The campaign utilizes a multi-stage infection chain, and the infection chain from Signal message to DCRAT deployment.

Attack flow (Source – CERT-UA)

Initial archives contain executables with file sizes between 200-500KB, with names like “material.exe,” “pdfDecod.exe,” and “Office2025version46-v.exe.” When executed, these files deploy the DarkCrystal RAT payload.

Network analysis reveals communication with multiple command and control servers, including IP addresses 45.130.214.237, 62.60.235.190, and 87.249.50.64.

CERT-UA urges vigilance and immediate reporting of suspicious messages to prevent further compromise of sensitive defense industry systems.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Tushar Subhra Dutta

Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

New RedExt Chrome Extension Tool for Red Teamers with Flask-based C2 Server

A sophisticated new red team tool called RedExt has recently been released, combining a Manifest…

11 minutes ago

Aligning Cybersecurity with Business Goals – CISO Insights

Cybersecurity has rapidly evolved from a back-office technical concern to a boardroom imperative. As digital…

50 minutes ago

Ransomware Defense Playbook for CISOs in 2025

Ransomware has evolved into one of the most formidable threats to organizations worldwide, and 2025…

51 minutes ago

Assessing Third-Party Vendor Risks – CISO Best Practices

Third-party vendors are indispensable to modern enterprises, offering specialized services, cost efficiencies, and scalability. However,…

2 hours ago

FastCGI Library Vulnerability Exposes Embedded Devices to Code Execution Attacks

A critical vulnerability in the FastCGI library could allow attackers to execute arbitrary code on…

2 hours ago

React Router Vulnerabilities Let Attackers Spoof Contents & Modify Values

Significant security flaws have been discovered in React Router, a widely-used routing library for React…

2 hours ago