Threat actors launched a new malicious campaign against organizations in Ukraine’s defense sector, spreading Dark Crystal malware.
Ukraine’s Computer Emergency Threat Response Team (CERT-UA) announced earlier this week that threat actors have been spotted using a Russian-made remote access trojan (RAT) against targets in the country.
Dark Crystal (or DCRat) is a RAT allegedly favored by many novice hackers, but with an advanced enough design to fit the needs of more advanced attackers, as well. Seasoned threat actors can use custom plug-ins and the malware’s modular structure to adapt the RAT to their liking.
CERT-UA spotted the campaign earlier this month. The agency says the threat group, tracked as UAC-0200, has been targeting individuals in Ukraine’s Defense Forces and employees of defense-industrial organizations. The perpetrators reportedly use rogue archived messages on Signal to spread malware.
“Typically, the mentioned archives contain a file with the extension ".pdf", as well as an executable file classified as DarkTortilla, which is a cryptor/loader type software tool, the purpose of which is to decrypt and launch (including by injection) the Dark Crystal RAT (DCRAT) remote control software tool,” reads the CERT-UA security advisory.
Despite being preferred by so-called “script kiddies,” DCRat is a competent, destructive tool that can wreak havoc on compromised machines.
It serves numerous malicious purposes, including:
RATs are among the most destructive strains of malware in the cyber landscape. Dedicated software like Bitdefender Ultimate Security can help protect your devices against them and similar threats, including viruses, zero-day exploits, worms, rootkits, ransomware, and spyware.
Key features include comprehensive, continuous monitoring and protection, network threat prevention, behavioral detection for active apps, multi-layer ransomware protection, web attack prevention, and AI-powered scam detection.
tags
Vlad's love for technology and writing created rich soil for his interest in cybersecurity to sprout into a full-on passion. Before becoming a Security Analyst, he covered tech and security topics.
View all postsMarch 12, 2025
February 20, 2025
February 11, 2025
December 24, 2024