Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

502+ Articles
116+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails
CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails
NEWS

CERT-UA Impersonation Campaign Spread AGEWHEEZE Malware to 1 Million Emails

Ukraine's Computer Emergency Response Team (CERT-UA) has disclosed a large-scale phishing campaign in which threat actor UAC-0255 impersonated the agency itself, sending over one million malicious emails to distribute the AGEWHEEZE remote administration tool.

Dylan H.

News Desk

April 1, 2026
5 min read

Ukraine's Computer Emergency Response Team (CERT-UA) has disclosed the details of a large-scale phishing campaign in which the agency itself was impersonated by threat actors to deliver a remote administration tool (RAT) known as AGEWHEEZE. The campaign, attributed to the threat cluster UAC-0255, sent over one million malicious emails targeting Ukrainian organizations and individuals.

Campaign Overview

The attackers constructed phishing emails that closely mimicked official CERT-UA communications — using spoofed sender addresses, the CERT-UA logo, and language consistent with real security advisories. Recipients were deceived into believing they were receiving a legitimate cybersecurity notification from Ukraine's national CERT.

AttributeDetails
Threat ActorUAC-0255
MalwareAGEWHEEZE (Remote Administration Tool)
Campaign Volume1,000,000+ emails
Impersonated EntityCERT-UA (Ukraine's Computer Emergency Response Team)
TargetsUkrainian government, defense, and private sector organizations
Disclosed byCERT-UA, April 2026

What Is AGEWHEEZE?

AGEWHEEZE is a remote administration tool (RAT) used by UAC-0255 in targeted campaigns against Ukrainian organizations. Key capabilities include:

  • Full remote desktop control of the compromised host
  • Keylogging and credential harvesting
  • File system access — upload, download, and deletion
  • Screen capture and live session monitoring
  • Persistent access via registry run keys and scheduled tasks
  • Encrypted C2 communications to evade network detection

AGEWHEEZE is described by CERT-UA as a tool used primarily for intelligence collection and persistent access, consistent with UAC-0255's profile as a cyber-espionage actor targeting Ukrainian government and defense entities.


The Phishing Technique

Email Impersonation

The phishing emails used several tactics to appear legitimate:

From: [email designed to mimic cert.gov.ua domain]
Subject: "Security Advisory — Urgent Action Required"
Body: Ukrainian-language text mimicking CERT-UA advisory format
Attachment: .ZIP file containing AGEWHEEZE loader

Recipients familiar with receiving actual CERT-UA advisories — particularly IT and security staff in Ukrainian organizations — were the most likely targets, as they would be conditioned to act on CERT-UA communications.

Delivery Chain

1. Victim receives email appearing to be from CERT-UA
2. Email contains a .ZIP attachment or a malicious link
3. Opening the attachment extracts an executable or script loader
4. Loader downloads and executes AGEWHEEZE from attacker-controlled server
5. AGEWHEEZE establishes C2 connection and provides full remote access
6. Attacker collects intelligence, steals credentials, pivots laterally

Who Is UAC-0255?

UAC-0255 is a threat cluster tracked by CERT-UA as a persistent actor targeting Ukrainian entities. The group has been active throughout the Russia-Ukraine conflict and conducts:

  • Spear-phishing campaigns against government and military targets
  • Impersonation of trusted entities (government agencies, security teams)
  • Deployment of RATs and information stealers for espionage
  • Lateral movement within compromised organizational networks

The scale of this campaign — one million emails — represents a shift to mass phishing targeting a broad audience rather than narrowly targeted spear-phishing, suggesting the group may be attempting to maximize initial access opportunities across Ukraine's wider organizational landscape.


Impact and Risks

Organizations whose staff received and acted on these emails may face:

  • Persistent attacker access via AGEWHEEZE backdoors
  • Credential theft — domain accounts, email, VPN, and web service passwords
  • Sensitive data exfiltration — documents, communications, and strategic materials
  • Lateral movement from initial access to deeper network compromise
  • Operational disruption if the attacker chooses to deploy destructive payloads after intelligence collection

Detection and Response

Indicators to Watch For

Indicator TypeDescription
Suspicious CERT-UA-spoofed senderCheck actual sending domain vs. cert.gov.ua
.ZIP attachments from unexpected sendersTreat unsolicited attachments as suspect
Unusual outbound connectionsAGEWHEEZE C2 traffic to external IPs
New persistence mechanismsUnexpected run keys, scheduled tasks
Remote desktop activityUnexpected RDP or VNC sessions

Immediate Actions for Affected Organizations

  1. Isolate any host suspected of running AGEWHEEZE
  2. Reset credentials for any accounts accessed from the compromised machine
  3. Review logs for outbound connections to unfamiliar external IPs
  4. Check persistence locations: HKCU\Software\Microsoft\Windows\CurrentVersion\Run, Task Scheduler, Startup folder
  5. Report to CERT-UA via official channels at cert.gov.ua

Email-Level Defenses

- Configure DMARC, DKIM, and SPF to reject spoofed CERT-UA emails
- Add sender verification warnings for emails that fail authentication
- Train staff to verify unexpected "CERT-UA" communications via official channels
- Block execution of files extracted from email attachments (AppLocker/WDAC)

Broader Context

This campaign illustrates a recurring tactic in the ongoing cyber conflict targeting Ukraine: impersonating trusted cybersecurity authorities to weaponize the very trust those organizations depend on. By mimicking CERT-UA — the entity Ukrainians rely on for security guidance — UAC-0255 turns institutional trust into an attack vector.

Security teams in Ukraine and allied nations supporting Ukrainian cyber defense should treat this campaign as an active threat and ensure detection capabilities are updated accordingly.


References

  • The Hacker News — CERT-UA Impersonation Campaign
  • CERT-UA Official Advisories

Source: The Hacker News — April 1, 2026

#Malware#Phishing#Ukraine#The Hacker News#CERT-UA#RAT#UAC-0255#Cyberwarfare

Related Articles

Axios Supply Chain Attack Pushes Cross-Platform RAT via Compromised npm Account

Two newly published versions of the widely used Axios HTTP client library — v1.14.1 and v0.30.4 — were found to contain a malicious fake dependency that delivers a cross-platform Remote Access Trojan. Developers who installed these versions through a compromised npm account should treat their environments as potentially compromised.

6 min read

DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials

Researchers have identified DeepLoad, a previously undocumented malware loader that combines ClickFix social engineering with WMI-based persistence to deliver a browser credential stealer capable of immediately exfiltrating saved passwords from Chrome, Edge, and Firefox.

6 min read

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

Pro-Ukrainian hacktivist group Bearlyfy has conducted over 70 cyberattacks against Russian companies since January 2025, recently deploying a custom...

4 min read
Back to all News