Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Exposes Kazuar Malware’s Modular P Details Malware’s
May 15, 2026
VMware Fusion Vulnerability Let Attackers Escalate Privilege to Root
May 15, 2026
Hackers Abuse Scheduled Tasks for FrostyNeighbor Persistence
May 15, 2026
Home/Threats/Hackers Abuse Scheduled Tasks for FrostyNeighbor Persistence
Threats

Hackers Abuse Scheduled Tasks for FrostyNeighbor Persistence

The state-aligned hacking group FrostyNeighbor has initiated a new series of cyberattacks against Ukrainian government organizations. These latest attacks employ a meticulously crafted infection...

Sarah simpson
Sarah simpson
May 15, 2026 4 Min Read
2 0

The state-aligned hacking group FrostyNeighbor has initiated a new series of cyberattacks against Ukrainian government organizations. These latest attacks employ a meticulously crafted infection chain, making them exceptionally difficult to detect.

The group, active since at least 2016, has a long history of targeting countries neighboring Belarus, and its latest campaign shows just how far it has evolved.

The new activity, detected starting in March 2026, blends deceptive documents, layered malware scripts, and server-side victim filtering into a single coordinated operation.

The attacks begin with spearphishing emails carrying malicious PDF files designed to look like legitimate government communications.

One lure document impersonated Ukrtelecom, a Ukrainian telecommunications company, and appeared to offer assurances about customer data protection.

When a recipient clicks the download button inside the PDF, they are directed to a server fully controlled by the attackers. What they receive next depends entirely on where they are connecting from.

ESET’s official threat research blog, WeLiveSecurity’s analysts identified and said in a report shared with Cyber Security News (CSN) that FrostyNeighbor, also tracked as Ghostwriter, UNC1151, TA445, PUSHCHA, and Storm-0257, is a long-running cyber espionage actor apparently aligned with the interests of Belarus.

ESET researchers noted that the group regularly updates its tools and methods specifically to avoid triggering security alerts.

FrostyNeighbor’s campaigns have historically focused on Ukraine, Poland, and Lithuania, with victims ranging from government and military bodies to industrial firms and healthcare organizations.

Compromise chain overview (Source - Welivesecurity)
Compromise chain overview (Source – Welivesecurity)

In its newest campaign, the group demonstrates both patience and precision, delivering the final payload only after manually confirming that a target is worth pursuing.

This selective approach makes the operation especially difficult to detect or replicate in a controlled environment.

The group has been under active surveillance for years, with past reports from CERT-UA, SentinelOne, HarfangLab, and StrikeReady all documenting its evolving tactics.

The latest findings reveal a newer delivery mechanism using JavaScript to stage the attack across multiple steps, pulling in tools cleverly disguised as ordinary image or web files.

Hackers Abuse Scheduled Tasks

Once a victim from Ukraine clicks the embedded link in the lure document, the attacker’s server delivers a RAR archive named 53_7.03.2026_R.rar.

Inside is a JavaScript file that drops a decoy PDF to keep the target occupied while quietly launching the next stage in the background.

This second-stage script, called PicassoLoader, is a downloader the group has used across multiple campaigns and in several different programming languages.

To lock in its presence on the victim’s machine, PicassoLoader downloads a scheduled task template from the command-and-control server, disguised as a JPEG image file.

The server actually delivers an XML configuration file, and the script fills in real execution parameters before registering the scheduled task on the system.

Scheduled task template downloaded from the C&C server (Source - Welivesecurity)
Scheduled task template downloaded from the C&C server (Source – Welivesecurity)

This ensures PicassoLoader runs automatically at every Windows startup, which is exactly how FrostyNeighbor maintains persistent access on compromised machines.

Cobalt Strike Deployed After Victim Validation

What makes this attack chain particularly sharp is the server-side validation step that occurs before any serious payload is delivered.

Every ten minutes, PicassoLoader sends a system fingerprint, including the username, computer name, operating system version, and list of running processes, to the command-and-control server.

A human operator then reviews this information and decides whether the target is worth the next move.

If the victim qualifies, the server responds with a third-stage JavaScript dropper. This script copies the legitimate Windows file rundll32.exe under a different name, likely to bypass security tools that flag unfamiliar executables.

A Cobalt Strike beacon is then written to disk, and a registry entry ensures it launches automatically on every startup, giving the attackers full and persistent remote control over the compromised machine.

Security researchers recommend continuous and close monitoring of the group’s infrastructure, toolset changes, and operational patterns as the most effective defense against future campaigns.

Organizations across Eastern Europe, especially those in government, defense, and critical sectors, should treat any unsolicited PDF attachment as a potential threat and remain on high alert.

Indicators of Compromise (IoCs):-

Type Indicator Description
SHA-1 776A43E46C36A539C916ED426745EE96E2392B39 53_7.03.2026_R.rar — JS/TrojanDropper.FrostyNeighbor
SHA-1 8D1F2A6DF51C7783F2EAF1A0FC0FF8D032E5B57F 53_7.03.2026_R.js — JS/TrojanDropper.FrostyNeighbor
SHA-1 B65551D339AECE718EA1465BF3542C794C445EFC Update.js — JS/TrojanDownloader.FrostyNeighbor
SHA-1 E15ABEE1CFDE8BE7D87C7C0B510450BAD6BC0906 Update.js — JS/TrojanDropper.FrostyNeighbor
SHA-1 43E30BE82D82B24A6496F6943ECB6877E83F88AB ViberPC.dll — Win32/CobaltStrike.Beacon
SHA-1 4F2C1856325372B9B7769D00141DBC1A23BDDD14 53_7.03.2026_R.pdf — PDF/TrojanDownloader.FrostyNeighbor
SHA-1 D89E5524E49199B1C3B66C524E7A63C3F0A0C199 Certificate.pdf — PDF/TrojanDownloader.FrostyNeighbor
SHA-1 7E537D8E91668580A482BD77A5A4CABA26D6BDAC certificate.js — JS/TrojanDownloader.FrostyNeighbor
SHA-1 FA6882672AD3654800987613310D7C3FBADE027E certificate.js — JS/TrojanDownloader.FrostyNeighbor
SHA-1 3FA7D1B13542F1A9EB054111F9B69C250AF68643 СетифікатCAF.rar — JS/TrojanDropper.FrostyNeighbor
SHA-1 4E52C92709A918383E90534052AAA257ACE2780C СетифікатCAF.js — JS/TrojanDropper.FrostyNeighbor
SHA-1 6FDED427A16D5314BA3E1EB9AFD120DC84449769 EdgeTaskMachine.js — JS/TrojanDropper.FrostyNeighbor
SHA-1 27FA11F6A1D653779974B6FB54DE4AF47F211232 EdgeSystemConfig.dll — Win32/CobaltStrike.Beacon
Domain attachment-storage-asset-static.needbinding[.]icu C&C server — PicassoLoader delivery
Domain book-happy.needbinding[.]icu C&C server — scheduled task template and fingerprint collection
Domain nama-belakang.nebao[.]icu C&C server — Cobalt Strike beacon C&C
Domain easiestnewsfromourpointofview.algsat[.]icu C&C infrastructure
Domain mickeymousegamesdealer.al[.]icu C&C infrastructure
Domain exavegas[.]icu C&C infrastructure
Domain hinesafar.sardk[.]icu C&C infrastructure
Domain shinesafar.sardk[.]icu C&C infrastructure
Domain best-seller.lavanille[.]buzz C&C infrastructure
URL https://book-happy.needbinding[.]icu/wp-content/uploads/2023/10/1GreenAM.jpg Scheduled task template delivery URL
URL https://book-happy.needbinding[.]icu/employment/documents-and-resources PicassoLoader fingerprint POST endpoint
URL https://nama-belakang.nebao[.]icu/statistics/discover.txt Cobalt Strike beacon C&C endpoint
Filename 53_7.03.2026_R.rar First-stage RAR archive lure
Filename 53_7.03.2026_R.js First-stage JavaScript dropper
Filename 53_7.03.2026_R.pdf Decoy PDF lure document
Filename Update.js PicassoLoader second-stage downloader
Filename WinUpdate.reg Registry file dropped by first-stage script
Filename ViberPC.exe Renamed copy of rundll32.exe
Filename ViberPC.dll Cobalt Strike beacon payload
Filename ViberPC.reg Registry file for Cobalt Strike persistence
Filename ViberPC.lnk Shortcut file for Cobalt Strike execution
Filename EdgeTaskMachine.js Additional FrostyNeighbor dropper
Filename EdgeSystemConfig.dll Additional Cobalt Strike beacon

Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwarephishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

79 Chrome Vulnerabilities Patched, Including 14 Critical One’s

Next Post

VMware Fusion Vulnerability Let Attackers Escalate Privilege to Root

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Next.js Flaw Exposes Cloud Vulnerability Credentials
May 15, 2026
OpenAI Confirms Security Breach from TanStack npm Attack
May 15, 2026
Cisco Catalyst SD-WAN Controller 0-Day Actively Exploited to Gain
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us