Pressure on Ukraine and Poland Continues
NetmanageIT OpenCTI - opencti.netmanageit.com

SUMMARY :
Recent analysis reveals two clusters of malicious archives targeting Ukraine and Poland since April 2025, linked to UAC-0057 (also known as UNC1151, FrostyNeighbor or Ghostwriter). The infection chains aim to collect system information and deploy implants for further exploitation, using readily available tools for obfuscation and packing. The threat actor's toolset and practices have evolved, including the use of Slack for C2 communication and transitions to new top-level domains for infrastructure. The campaigns consistently target Ukraine and Poland, with potential expansion to other European countries. Notable tactics include weaponized XLS spreadsheets with obfuscated VBA macros, C# and C++ downloaders, and infrastructure mimicking legitimate websites.
OPENCTI LABELS :
cobalt strike,espionage,ukraine,infrastructure,poland,xls,c++,vba macros,downloaders,c#,slack
AI COMMENTARY :
1. In the landscape of modern cyber espionage, the report titled Pressure on Ukraine and Poland Continues unveils a sophisticated campaign that has been active since April 2025. Recent analysis highlights two distinct clusters of malicious archives specifically designed to infiltrate networks in Ukraine and Poland. These archives, tied to the threat actor UAC-0057—also referred to as UNC1151, FrostyNeighbor, or Ghostwriter—demonstrate a clear focus on gathering system information and deploying implants for deeper exploitation.
2. The identified clusters reveal an evolving threat actor methodology that leverages common tools and advanced obfuscation techniques. By avoiding reliance on novel malware, the adversary is able to blend into legitimate traffic. The use of weaponized XLS spreadsheets containing obfuscated VBA macros serves as the initial infection vector, enabling the execution of secondary payloads without raising immediate alarms within targeted environments.
3. Once the XLS files have executed their macros, the infection chain progresses through the deployment of C# and C++ downloaders that retrieve additional modules from remote servers. These downloaders are packed or obfuscated to evade signature-based detection, ensuring persistence on compromised hosts. The combination of C# for flexibility and C++ for performance allows the threat actor to maintain a robust foothold and execute a range of post‐exploitation activities.
4. A notable component of the adversary’s toolset is the adaptation of publicly available frameworks, including the deployment of Cobalt Strike for command and control. The integration of these frameworks within the infection chain underscores a shift toward commoditized attack platforms that can be tailored to specific missions. Additionally, custom downloaders facilitate the retrieval of implants and reconnaissance tools, further expanding the actor’s capabilities without the need to develop complex code from scratch.
5. Communication channels for command and control have also evolved, with the threat actor adopting Slack APIs for real-time coordination. This unconventional choice offers encrypted messaging and dynamic channel creation, making it difficult to detect or block. Alongside this, the infrastructure has undergone transitions to new top-level domains, while mimicking legitimate websites to host payloads and decoy content, complicating attribution efforts and impeding takedown operations.
6. The consistent targeting of Ukraine and Poland suggests strategic intent, possibly aligned with geopolitical objectives or long-term intelligence gathering. Although current campaigns remain focused on these two countries, indicators point to a potential expansion into other European regions. Organizations across the continent should remain vigilant, monitor for indicators of compromise related to XLS macros, C# or C++ downloaders, and unusual Slack traffic patterns tied to unknown workspaces.
7. In conclusion, the Pressure on Ukraine and Poland Continues report underscores the importance of layered defense strategies. By combining threat intelligence with proactive monitoring of cobalt strike activations, espionage indicators, and infrastructure anomalies, defenders can disrupt UAC-0057 operations. Enhanced email filtering to catch weaponized Xls files, behavioral analysis to flag obfuscated macro execution, and rigorous domain reputation checks will be key in mitigating the evolving threat landscape.
OPEN NETMANAGEIT OPENCTI REPORT LINK!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
Pressure on Ukraine and Poland Continues