{"id":14918,"date":"2026-05-19T10:08:26","date_gmt":"2026-05-19T10:08:26","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=14918"},"modified":"2026-05-19T10:08:26","modified_gmt":"2026-05-19T10:08:26","slug":"contemporary-mischief-and-digital-shenanigans","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=14918","title":{"rendered":"Contemporary mischief and digital shenanigans"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>This blogpost covers newly found actions attributed to FrostyNeighbor, focusing on governmental organizations in Ukraine. FrostyNeighbor has been working continuous cyberoperations, altering and updating its toolset repeatedly, updating its compromise chain and strategies to evade detection \u2013 focusing on victims situated in Japanese Europe, in accordance with our telemetry.<\/p>\n<blockquote>\n<p><strong>Key factors of the report:<\/strong><\/p>\n<ul>\n<li>FrostyNeighbor is a long-running cyberespionage actor apparently aligned with the pursuits of Belarus.<\/li>\n<li>The group primarily targets governmental, navy, and key sectors in Japanese Europe.<\/li>\n<li>This report paperwork new exercise noticed that began in March 2026, displaying continued evolution of tooling and compromise chains.<\/li>\n<li>FrostyNeighbor makes use of server-side validation of its victims earlier than delivering the ultimate payload.<\/li>\n<li>The group has been lively not too long ago in campaigns focusing on governmental organizations in Ukraine.<\/li>\n<\/ul>\n<\/blockquote>\n<h2>Introduction<\/h2>\n<p>FrostyNeighbor, also referred to as Ghostwriter, UNC1151, UAC\u20110057, TA445, PUSHCHA, or Storm-0257, is a bunch allegedly <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/unc1151-linked-to-belarus-government\/\" target=\"_blank\" rel=\"noopener\">working from Belarus<\/a>. In response to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.mandiant.com\/resources\/blog\/unc1151-linked-to-belarus-government\" target=\"_blank\" rel=\"noopener\">Mandiant<\/a>, the group has been lively since not less than 2016. The vast majority of FrostyNeighbor\u2019s operations have focused international locations neighboring Belarus; a small minority have been noticed in different European international locations. FrostyNeighbor performs campaigns that make the most of spearphishing, unfold disinformation, and try and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/ghostwriter-influence-campaign\" target=\"_blank\" rel=\"noopener\">affect<\/a> their targets (just like the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.mandiant.com\/resources\/blog\/espionage-group-unc1151-likely-conducts-ghostwriter-influence-activity\" target=\"_blank\" rel=\"noopener\">Ghostwriter affect exercise<\/a>) however has additionally compromised a wide range of governmental and personal sector entities, with a concentrate on Ukraine, Poland, and Lithuania.<\/p>\n<p>FrostyNeighbor has demonstrated a continued evolution in its ways, methods, and procedures (TTPs), leveraging over time a various arsenal of malware and supply mechanisms to focus on entities. Key developments embrace the deployment of a number of variants of the group\u2019s principal payload downloader, named PicassoLoader by <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cert.gov.ua\/article\/5661411\" target=\"_blank\" rel=\"noopener\">CERT-UA<\/a>. Variants of this downloader are written in .NET, PowerShell, JavaScript, and C++. The identify comes from the truth that it retrieves a <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.cobaltstrike.com\/\" target=\"_blank\" rel=\"noopener\">Cobalt Strike<\/a> beacon, from an attacker-controlled setting, disguised as a renderable picture or hidden in a web-associated file kind, like CSS, JS, or SVG. Cobalt Strike is a post-exploitation framework broadly used each by pentesters and risk actors, and its related beacon acts as an preliminary implant, permitting the attacker to completely management the compromised sufferer\u2019s laptop.<\/p>\n<p>Furthermore, the group makes use of all kinds of lure paperwork to compromise its targets, equivalent to CHM, XLS, PPT, or DOC, and it has exploited the WinRAR vulnerability <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-38831\" target=\"_blank\" rel=\"noopener\">CVE\u20112023\u201138831<\/a>. FrostyNeighbor has additionally exploited professional companies equivalent to Slack for payload supply, and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/canarytokens.com\/\" target=\"_blank\" rel=\"noopener\">Canarytokens<\/a> for sufferer monitoring, complicating detection and attribution efforts.<\/p>\n<p>Whereas Ukrainian focusing on appears to be targeted on navy, protection sector, and governmental entities, the victimology in Poland and Lithuania is broader and consists of, amongst others, all kinds of sectors like industrial and manufacturing, healthcare and prescribed drugs, logistics, and lots of governmental organizations. As this report is solely primarily based on our telemetry, different campaigns towards entities in international locations in the identical area can&#8217;t be excluded.<\/p>\n<p>FrostyNeighbor has performed spearphishing campaigns focusing on customers of Polish organizations, specializing in main free e mail suppliers equivalent to <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/poczta.interia.pl\/\" target=\"_blank\" rel=\"noopener\">Interia Poczta<\/a> and <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/konto.onet.pl\/\" target=\"_blank\" rel=\"noopener\">Onet Poczta<\/a>. These campaigns included spoofed login pages designed to reap credentials. Moreover, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cert.pl\/en\/posts\/2025\/06\/unc1151-campaign-roundcube\/\" target=\"_blank\" rel=\"noopener\">CERT-PL<\/a> reported that the group exploited the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-42009\" target=\"_blank\" rel=\"noopener\">CVE\u20112024\u201142009<\/a> XSS vulnerability in Roundcube, which allows JavaScript execution upon opening of weaponized e mail messages, to exfiltrate the sufferer\u2019s credentials. This displays the group\u2019s effort in each malware compromise and credential harvesting.<\/p>\n<h2>Previous publications<\/h2>\n<p>FrostyNeighbor\u2019s campaigns have been lively for years and have subsequently been broadly documented publicly over time. A few of these embrace studies from July 2024, when <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/cert.gov.ua\/article\/6280159\" target=\"_blank\" rel=\"noopener\">CERT-UA<\/a> reported a few surge of exercise attributed to the group, focusing on Ukrainian governmental entities. In February 2025, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.sentinelone.com\/labs\/ghostwriter-new-campaign-targets-ukrainian-government-and-belarusian-opposition\/\">SentinelOne<\/a> documented a surge of exercise focusing on Ukrainian authorities and opposition activists in Belarus, utilizing new diversifications of beforehand noticed payloads.<\/p>\n<p>In August 2025, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/harfanglab.io\/insidethelab\/uac-0057-pressure-ukraine-poland\/\" target=\"_blank\" rel=\"noopener\">HarfangLab<\/a> noticed new clusters of exercise that concerned malicious archives in particular compromise chains to focus on Ukrainian and Polish entities. Lastly, in December 2025, <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/strikeready.com\/blog\/captch-ya-if-you-can\/\" target=\"_blank\" rel=\"noopener\">StrikeReady<\/a> documented a brand new anti-analysis approach, utilizing dynamic CAPTCHAs that the victims needed to remedy, executed by a VBA macro within the lure doc.<\/p>\n<h2>Newly found exercise<\/h2>\n<p>Since March 2026, we&#8217;ve got detected new actions that we attributed to FrostyNeighbor, utilizing hyperlinks in malicious PDFs despatched by way of spearphishing attachments to focus on governmental organizations in Ukraine. The compromise chain is the latest noticed so far, utilizing a JavaScript model of PicassoLoader to ship a Cobalt Strike payload, as illustrated in Determine\u00a01.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 1. Compromise chain overview\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/frostyneighbor\/figure-1-1-2.png\" alt=\"Figure 1. Compromise chain overview (2)\" width=\"\" height=\"\"\/><figcaption><em>Determine 1. Compromise chain overview<\/em><\/figcaption><\/figure>\n<p>It begins with a blurry lure PDF file named <span style=\"font-family: courier new, courier, monospace;\">53_7.03.2026_R.pdf<\/span>, proven in Determine\u00a02, impersonating the Ukrainian telecommunications firm <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/ukrtelecom.ua\/\">Ukrtelecom<\/a>, with a message that it purportedly <em>\u201censures dependable defending of buyer information\u201d<\/em> (machine translated), and a obtain button with a hyperlink resulting in a doc hosted on a supply server managed by the group.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 2. PDF lure document with a remote download link\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/frostyneighbor\/figure-2.png\" alt=\"Figure 2. PDF lure document with a remote download link\" width=\"\" height=\"\"\/><figcaption><em>Determine 2. PDF lure doc with a distant obtain hyperlink<\/em><\/figcaption><\/figure>\n<p>If the sufferer is just not from the anticipated geographic location, the server delivers a benign PDF file with the identical identify, <span style=\"font-family: courier new, courier, monospace;\">53_7.03.2026_R.pdf<\/span>, associated to rules within the subject of digital communications from 2024 to 2026 from Ukraine\u2019s Nationwide Fee for the State Regulation of Digital Communications, Radio Frequency Spectrum and the Provision of Postal Providers (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/nkek.gov.ua\/\" target=\"_blank\" rel=\"noopener\">nkek.gov.ua<\/a>), as proven in Determine\u00a03.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 3. Decoy PDF file related to strategic priorities and regulations in the field of electronic communications\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/frostyneighbor\/figure-3.png\" alt=\"Figure 3. Decoy PDF file\" width=\"\" height=\"\"\/><figcaption><em>Determine 3. Decoy PDF file associated to strategic priorities and rules within the subject of digital communications<\/em><\/figcaption><\/figure>\n<p>If the sufferer is utilizing an IP deal with from Ukraine, the server as an alternative delivers a RAR archive named <span style=\"font-family: courier new, courier, monospace;\">53_7.03.2026_R.rar<\/span>, containing the primary stage of the assault named <span style=\"font-family: courier new, courier, monospace;\">53_7.03.2026_R.js<\/span> \u2013 a JavaScript file that drops and shows a PDF file as a decoy. Concurrently, it additionally executes the second stage: a JavaScript model of the PicassoLoader downloader, recognized for use by the group. The primary-stage script has been deobfuscated and refactored for readability, with a shortened model offered in Determine\u00a04.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 4. First-stage JavaScript dropper 53_7.03.2026_R.js\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/frostyneighbor\/figure-4.png\" alt=\"Figure 4. First-stage JavaScript dropper 53_7.03.2026_R.js\" width=\"\" height=\"\"\/><figcaption><em>Determine 4. First-stage JavaScript dropper<\/em> <span style=\"font-family: courier new, courier, monospace;\">53_7.03.2026_R.js<\/span><\/figcaption><\/figure>\n<p>On first execution, the script decodes and shows to the sufferer the identical PDF decoy illustrated in Determine\u00a03, and executes itself with the <span style=\"font-family: courier new, courier, monospace;\">\u2011\u2011replace<\/span> flag to succeed in the opposite part of the code; the opposite flags aren&#8217;t used in any respect.<\/p>\n<p>Throughout the second execution, the script drops the second-stage downloader (PicassoLoader), which is embedded within the script (encoded utilizing base64) as <span style=\"font-family: courier new, courier, monospace;\">%AppDatapercentWinDataScopeUpdate.js<\/span>, and downloads a scheduled job template from <span style=\"font-family: courier new, courier, monospace;\">https:\/\/book-happy.needbinding[.]icu\/wp-content\/uploads\/2023\/10\/1GreenAM.jpg<\/span>, as proven in Determine\u00a05.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 5. Scheduled task template downloaded from the C&amp;C server\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/frostyneighbor\/figure-5.png\" alt=\"Figure 5. Scheduled task template downloaded from the C&amp;C server\" width=\"\" height=\"\"\/><figcaption><em>Determine 5. Scheduled job template downloaded from the C&amp;C server<\/em><\/figcaption><\/figure>\n<p>Regardless of a JPG picture being requested, the server responds with text-based content material, utilizing the Content material-Kind and Content material-Disposition headers to promote an XML attachment from their C&amp;C server hosted behind the Cloudflare infrastructure:<\/p>\n<p><span style=\"font-family: courier new, courier, monospace;\">Content material-Kind: utility\/xml<\/span><br \/><span style=\"font-family: courier new, courier, monospace;\">Server: cloudflare<\/span><br \/><span style=\"font-family: courier new, courier, monospace;\">Content material-Disposition: attachment; filename=&#8221;config.xml&#8221;<\/span><\/p>\n<p>To realize persistence and set off the primary execution of PicassoLoader, the script then replaces the placeholder values with the info parsed from the response file<span style=\"font-family: courier new, courier, monospace;\"> 1GreenAM.jpg<\/span>:<\/p>\n<p>The primary stage, <span style=\"font-family: courier new, courier, monospace;\">53_7.03.2026_R.js<\/span>, additionally drops a REG file below <span style=\"font-family: courier new, courier, monospace;\">%AppDatapercentWinDataScope<\/span> as <span style=\"font-family: courier new, courier, monospace;\">WinUpdate.reg<\/span>, whose contents are imported into the registry by the PicassoLoader downloader. The PicassoLoader script has been deobfuscated and refactored for readability, with a shortened model offered in Determine\u00a06.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 6. Second-stage JavaScript PicassoLoader downloader\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/frostyneighbor\/figure-6.png\" alt=\"Figure 6. Second-stage JavaScript PicassoLoader downloader\" width=\"\" height=\"\"\/><figcaption><em>Determine 6. Second-stage JavaScript PicassoLoader downloader<\/em><\/figcaption><\/figure>\n<p>When working, PicassoLoader fingerprints the sufferer\u2019s laptop by amassing the username, laptop identify, OS model, the boot time of the pc, the present time, and the record of working processes with their course of IDs (PIDs). Each 10\u00a0minutes, the compromised laptop\u2019s fingerprint is shipped to the C&amp;C server by way of an HTTP POST request to <span style=\"font-family: courier new, courier, monospace;\">https:\/\/book-happy.needbinding[.]icu\/employment\/documents-and-resources<\/span>. If the C&amp;C server response content material is bigger than 100\u00a0bytes, the obtained information is executed utilizing the <span style=\"font-family: courier new, courier, monospace;\">eval<\/span> technique.<\/p>\n<p>The choice whether or not or to not ship a payload may be very seemingly manually carried out by the operators, primarily based on the collected data to determine if the sufferer is of curiosity. If they&#8217;re, the C&amp;C server responds with a third-stage JavaScript dropper for Cobalt Strike; in any other case, it returns an empty response. This third-stage script has been deobfuscated and refactored for readability, with a shortened model offered in Determine\u00a07.<\/p>\n<figure class=\"image\"><img decoding=\"async\" title=\"Figure 7. Third-stage Cobalt Strike dropper\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/2026\/05-26\/frostyneighbor\/figure-7.png\" alt=\"Figure 7. Third-stage Cobalt Strike dropper\" width=\"\" height=\"\"\/><figcaption><em>Determine 7. Third-stage Cobalt Strike dropper<\/em><\/figcaption><\/figure>\n<p>This extra script begins by copying the professional <span style=\"font-family: courier new, courier, monospace;\">rundll32.exe<\/span> to <span style=\"font-family: courier new, courier, monospace;\">%ProgramDatapercentViberPC.exe<\/span>, very more likely to bypass some safety mechanisms or detection guidelines.<\/p>\n<p>Then, a Cobalt Strike beacon embedded on this stage is base64 decoded and written to disk as <span style=\"font-family: courier new, courier, monospace;\">%ProgramDatapercentViberPC.dll<\/span>. Lastly, persistence is achieved by creating and importing a REG file named <span style=\"font-family: courier new, courier, monospace;\">ViberPC.reg<\/span>, which registers within the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/setupapi\/run-and-runonce-registry-keys\">HKCU Run key<\/a> a LNK file, named <span style=\"font-family: courier new, courier, monospace;\">%ProgramDatapercentViberPC.lnk<\/span>, that executes the copied model of <span style=\"font-family: courier new, courier, monospace;\">rundll32.exe<\/span> with the command line argument <span style=\"font-family: courier new, courier, monospace;\">%ProgramDatapercentViberPC.dll<\/span>, calling its DLL export <span style=\"font-family: courier new, courier, monospace;\">SettingTimeAPI<\/span>.<\/p>\n<p>The ultimate payload is a Cobalt Strike beacon that contacts its C&amp;C server at <span style=\"font-family: courier new, courier, monospace;\">https:\/\/nama-belakang.nebao[.]icu\/statistics\/uncover.txt<\/span>.<\/p>\n<h2>Conclusion<\/h2>\n<p>FrostyNeighbor stays a persistent and adaptive risk actor, demonstrating a excessive degree of operational maturity with using numerous lure paperwork, evolving lure and downloader variants, and new supply mechanisms. This latest compromise chain we detected is a continuation of the group\u2019s willingness to replace and renew its arsenal, attempting to evade detection to compromise its targets.<\/p>\n<p>The group\u2019s campaigns proceed to concentrate on Japanese Europe, with a notable emphasis on the governmental, protection, and key sectors, particularly in Poland, Lithuania, and Ukraine, in accordance with ESET telemetry.<\/p>\n<p>The payload is simply delivered after server-side sufferer validation, combining automated checks of the requesting consumer agent and IP deal with with the guide validation by the operators. Steady and shut monitoring of the group\u2019s operations, infrastructure, and toolset adjustments is important to detect and mitigate future operations.<\/p>\n<blockquote>\n<div><em>For any inquiries about our analysis revealed on WeLiveSecurity, please contact us at <a rel=\"nofollow\" target=\"_blank\" style=\"background-color: #f4f4f4;\" href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/frostyneighbor-fresh-mischief-digital-shenanigans\/mailto:threatintel@eset.com?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=autotagging&amp;utm_content=eset-research&amp;utm_term=en\">threatintel@eset.com<\/a>.\u00a0<\/em><\/div>\n<div><em>ESET Analysis affords non-public APT intelligence studies and information feeds. For any inquiries about this service, go to the <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/int\/business\/services\/threat-intelligence\/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=wls-research&amp;utm_content=frostyneighbor-fresh-mischief-digital-shenanigans&amp;sfdccampaignid=7011n0000017htTAAQ\" target=\"_blank\" rel=\"noopener\">ESET Menace Intelligence<\/a> web page.<\/em><\/div>\n<\/blockquote>\n<h2>IoCs<\/h2>\n<p>A complete record of indicators of compromise (IoCs) and samples might be present in our <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/eset\/malware-ioc\/tree\/master\/frostyneighbor\">GitHub repository<\/a>.<\/p>\n<h3>Recordsdata<\/h3>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"175\"><strong>SHA\u20111<\/strong><\/td>\n<td width=\"175\"><strong>Filename<\/strong><\/td>\n<td width=\"142\"><strong>Detection<\/strong><\/td>\n<td width=\"150\"><strong>Description<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">776A43E46C36A539C916<wbr\/>ED426745EE96E2392B39<\/span><\/td>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">53_7.03.2026_R<wbr\/>.rar<\/span><\/td>\n<td width=\"142\">JS\/TrojanDropper.Fr<wbr\/>ostyNeighbor.E<\/td>\n<td width=\"150\">Lure RAR archive.<\/td>\n<\/tr>\n<tr>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">8D1F2A6DF51C7783F2EA<wbr\/>F1A0FC0FF8D032E5B57F<\/span><\/td>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">53_7.03.2026_R<wbr\/>.js<\/span><\/td>\n<td width=\"142\">JS\/TrojanDropper.Fr<wbr\/>ostyNeighbor.E<\/td>\n<td width=\"150\">JavaScript dropper.<\/td>\n<\/tr>\n<tr>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">B65551D339AECE718EA1<wbr\/>465BF3542C794C445EFC<\/span><\/td>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">Replace.js<\/span><\/td>\n<td width=\"142\">JS\/TrojanDownloader<wbr\/>.FrostyNeighbor.D<\/td>\n<td width=\"150\">JavaScript PicassoLoader downloader.<\/td>\n<\/tr>\n<tr>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">E15ABEE1CFDE8BE7D87C<wbr\/>7C0B510450BAD6BC0906<\/span><\/td>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">Replace.js<\/span><\/td>\n<td width=\"142\">JS\/TrojanDropper.Fr<wbr\/>ostyNeighbor.D<\/td>\n<td width=\"150\">Cobalt Strike dropper.<\/td>\n<\/tr>\n<tr>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">43E30BE82D82B24A6496<wbr\/>F6943ECB6877E83F88AB<\/span><\/td>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">ViberPC.dll<\/span><\/td>\n<td width=\"142\">Win32\/CobaltStrike.<wbr\/>Beacon.S<\/td>\n<td width=\"150\">Cobalt Strike beacon.<\/td>\n<\/tr>\n<tr>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">4F2C1856325372B9B776<wbr\/>9D00141DBC1A23BDDD14<\/span><\/td>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">53_7.03.2026_R<wbr\/>.pdf<\/span><\/td>\n<td width=\"142\">PDF\/TrojanDownloade<wbr\/>r.FrostyNeighbor.D<\/td>\n<td width=\"150\">Lure PDF doc.<\/td>\n<\/tr>\n<tr>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">D89E5524E49199B1C3B6<wbr\/>6C524E7A63C3F0A0C199<\/span><\/td>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">Certificates.pdf<\/span><\/td>\n<td width=\"142\">PDF\/TrojanDownloade<wbr\/>r.FrostyNeighbor.E<\/td>\n<td width=\"150\">Lure PDF doc.<\/td>\n<\/tr>\n<tr>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">7E537D8E91668580A482<wbr\/>BD77A5A4CABA26D6BDAC<\/span><\/td>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">certificates.js<\/span><\/td>\n<td width=\"142\">JS\/TrojanDownloader<wbr\/>.FrostyNeighbor.G<\/td>\n<td width=\"150\">JavaScript PicassoLoader downloader.<\/td>\n<\/tr>\n<tr>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">FA6882672AD365480098<wbr\/>7613310D7C3FBADE027E<\/span><\/td>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">certificates.js<\/span><\/td>\n<td width=\"142\">JS\/TrojanDownloader<wbr\/>.FrostyNeighbor.E<\/td>\n<td width=\"150\">JavaScript PicassoLoader downloader.<\/td>\n<\/tr>\n<tr>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">3FA7D1B13542F1A9EB05<wbr\/>4111F9B69C250AF68643<\/span><\/td>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">\u0421\u0435\u0442\u0438\u0444\u0456\u043a\u0430\u0442_CAF.rar<\/span><\/td>\n<td width=\"142\">JS\/TrojanDropper.Fr<wbr\/>ostyNeighbor.G<\/td>\n<td width=\"150\">Lure RAR archive.<\/td>\n<\/tr>\n<tr>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">4E52C92709A918383E90<wbr\/>534052AAA257ACE2780C<\/span><\/td>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">\u0421\u0435\u0442\u0438\u0444\u0456\u043a\u0430\u0442_CAF.js<\/span><\/td>\n<td width=\"142\">JS\/TrojanDropper.Fr<wbr\/>ostyNeighbor.G<\/td>\n<td width=\"150\">JavaScript dropper.<\/td>\n<\/tr>\n<tr>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">6FDED427A16D5314BA3E<wbr\/>1EB9AFD120DC84449769<\/span><\/td>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">EdgeTaskMachine<wbr\/>.js<\/span><\/td>\n<td width=\"142\">JS\/TrojanDropper.Fr<wbr\/>ostyNeighbor.F<\/td>\n<td width=\"150\">JavaScript PicassoLoader downloader.<\/td>\n<\/tr>\n<tr>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">27FA11F6A1D653779974<wbr\/>B6FB54DE4AF47F211232<\/span><\/td>\n<td width=\"175\"><span style=\"font-family: courier new, courier, monospace;\">EdgeSystemConfig<wbr\/>.dll<\/span><\/td>\n<td width=\"142\">Win32\/CobaltStrike.<wbr\/>Beacon.S<\/td>\n<td width=\"150\">Cobalt Strike beacon.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3>Community<\/h3>\n<table style=\"height: 612px;\" border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr style=\"height: 68px;\">\n<td style=\"width: 39px; height: 68px;\" width=\"49\"><strong>IP<\/strong><\/td>\n<td style=\"width: 279px; height: 68px;\" width=\"213\"><strong>Area<\/strong><\/td>\n<td style=\"width: 89px; height: 68px;\" width=\"115\"><strong>Internet hosting supplier<\/strong><\/td>\n<td style=\"width: 92px; height: 68px;\" width=\"107\"><strong>First seen<\/strong><\/td>\n<td style=\"width: 128px; height: 68px;\" width=\"158\"><strong>Particulars<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr style=\"height: 68px;\">\n<td style=\"width: 39px; height: 68px;\" width=\"49\">N\/A<\/td>\n<td style=\"width: 279px; height: 68px;\" width=\"213\"><span style=\"font-family: courier new, courier, monospace;\">attachment-storage-asset-<wbr\/>static.needbinding[.]icu<\/span><\/td>\n<td style=\"width: 89px; height: 68px;\" width=\"115\">N\/A<\/td>\n<td style=\"width: 92px; height: 68px;\" width=\"107\">2026\u201103\u201110<\/td>\n<td style=\"width: 128px; height: 68px;\" width=\"158\">PicassoLoader C&amp;C server.<\/td>\n<\/tr>\n<tr style=\"height: 68px;\">\n<td style=\"width: 39px; height: 68px;\" width=\"49\">N\/A<\/td>\n<td style=\"width: 279px; height: 68px;\" width=\"213\"><span style=\"font-family: courier new, courier, monospace;\">book-happy.needbindin<wbr\/>g[.]icu<\/span><\/td>\n<td style=\"width: 89px; height: 68px;\" width=\"115\">N\/A<\/td>\n<td style=\"width: 92px; height: 68px;\" width=\"107\">2026\u201103\u201110<\/td>\n<td style=\"width: 128px; height: 68px;\" width=\"158\">PicassoLoader C&amp;C server.<\/td>\n<\/tr>\n<tr style=\"height: 68px;\">\n<td style=\"width: 39px; height: 68px;\" width=\"49\">N\/A<\/td>\n<td style=\"width: 279px; height: 68px;\" width=\"213\"><span style=\"font-family: courier new, courier, monospace;\">nama-belakang.nebao[.]icu<\/span><\/td>\n<td style=\"width: 89px; height: 68px;\" width=\"115\">N\/A<\/td>\n<td style=\"width: 92px; height: 68px;\" width=\"107\">2026\u201103\u201110<\/td>\n<td style=\"width: 128px; height: 68px;\" width=\"158\">Cobalt Strike C&amp;C server.<\/td>\n<\/tr>\n<tr style=\"height: 68px;\">\n<td style=\"width: 39px; height: 68px;\" width=\"49\">N\/A<\/td>\n<td style=\"width: 279px; height: 68px;\" width=\"213\"><span style=\"font-family: courier new, courier, monospace;\">easiestnewsfromourpointof<wbr\/>view.algsat[.]icu<\/span><\/td>\n<td style=\"width: 89px; height: 68px;\" width=\"115\">N\/A<\/td>\n<td style=\"width: 92px; height: 68px;\" width=\"107\">2026\u201104\u201114<\/td>\n<td style=\"width: 128px; height: 68px;\" width=\"158\">PicassoLoader C&amp;C server.<\/td>\n<\/tr>\n<tr style=\"height: 68px;\">\n<td style=\"width: 39px; height: 68px;\" width=\"49\">N\/A<\/td>\n<td style=\"width: 279px; height: 68px;\" width=\"213\"><span style=\"font-family: courier new, courier, monospace;\">mickeymousegamesdealer.al<wbr\/>exavegas[.]icu<\/span><\/td>\n<td style=\"width: 89px; height: 68px;\" width=\"115\">N\/A<\/td>\n<td style=\"width: 92px; height: 68px;\" width=\"107\">2026\u201103\u201126<\/td>\n<td style=\"width: 128px; height: 68px;\" width=\"158\">PicassoLoader C&amp;C server.<\/td>\n<\/tr>\n<tr style=\"height: 68px;\">\n<td style=\"width: 39px; height: 68px;\" width=\"49\">N\/A<\/td>\n<td style=\"width: 279px; height: 68px;\" width=\"213\"><span style=\"font-family: courier new, courier, monospace;\">hinesafar.sardk[.]icu<\/span><\/td>\n<td style=\"width: 89px; height: 68px;\" width=\"115\">N\/A<\/td>\n<td style=\"width: 92px; height: 68px;\" width=\"107\">2026\u201104\u201114<\/td>\n<td style=\"width: 128px; height: 68px;\" width=\"158\">PicassoLoader C&amp;C server.<\/td>\n<\/tr>\n<tr style=\"height: 68px;\">\n<td style=\"width: 39px; height: 68px;\" width=\"49\">N\/A<\/td>\n<td style=\"width: 279px; height: 68px;\" width=\"213\"><span style=\"font-family: courier new, courier, monospace;\">shinesafar.sardk[.]icu<\/span><\/td>\n<td style=\"width: 89px; height: 68px;\" width=\"115\">N\/A<\/td>\n<td style=\"width: 92px; height: 68px;\" width=\"107\">2026\u201104\u201114<\/td>\n<td style=\"width: 128px; height: 68px;\" width=\"158\">PicassoLoader C&amp;C server.<\/td>\n<\/tr>\n<tr style=\"height: 68px;\">\n<td style=\"width: 39px; height: 68px;\" width=\"49\">N\/A<\/td>\n<td style=\"width: 279px; height: 68px;\" width=\"213\"><span style=\"font-family: courier new, courier, monospace;\">best-seller.lavanill<wbr\/>e[.]buzz<\/span><\/td>\n<td style=\"width: 89px; height: 68px;\" width=\"115\">N\/A<\/td>\n<td style=\"width: 92px; height: 68px;\" width=\"107\">2026\u201104\u201114<\/td>\n<td style=\"width: 128px; height: 68px;\" width=\"158\">Cobalt Strike C&amp;C server.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>MITRE ATT&amp;CK methods<\/h2>\n<p>This desk was constructed utilizing <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/resources\/versions\/\">model 18 <\/a>of the MITRE ATT&amp;CK framework.<\/p>\n<table border=\"1\" width=\"642\" cellspacing=\"0\" cellpadding=\"0\">\n<thead>\n<tr>\n<td width=\"113\"><strong>Tactic<\/strong><\/td>\n<td width=\"113\"><strong>ID<\/strong><\/td>\n<td width=\"151\"><strong>Identify<\/strong><\/td>\n<td width=\"265\"><strong>Description<\/strong><\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td rowspan=\"3\" width=\"113\"><strong>Useful resource Improvement<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1583\">T1583<\/a><\/td>\n<td width=\"151\">Purchase Infrastructure<\/td>\n<td width=\"265\">FrostyNeighbor acquires domains and rents C&amp;C servers.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1608\">T1608<\/a><\/td>\n<td width=\"151\">Stage Capabilities<\/td>\n<td width=\"265\">FrostyNeighbor hosts the ultimate payload on a C&amp;C server.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1588\/002\">T1588.002<\/a><\/td>\n<td width=\"151\">Receive Capabilities: Device<\/td>\n<td width=\"265\">FrostyNeighbor obtained a leaked model of Cobalt Strike to generate payloads.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><strong>Preliminary Entry<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1566\/001\">T1566.001<\/a><\/td>\n<td width=\"151\">Phishing: Spearphishing Attachment<\/td>\n<td width=\"265\">FrostyNeighbor sends a weaponized lure doc in e mail attachments.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\" width=\"113\"><strong>Execution<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1204\/002\">T1204.002<\/a><\/td>\n<td width=\"151\">Consumer Execution: Malicious File<\/td>\n<td width=\"265\">FrostyNeighbor tips its victims into opening or modifying a doc to realize code execution.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1053\/005\">T1053.005<\/a><\/td>\n<td width=\"151\">Scheduled Job\/Job: Scheduled Job<\/td>\n<td width=\"265\">FrostyNeighbor makes use of scheduled duties to realize persistence.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1059\">T1059<\/a><\/td>\n<td width=\"151\">Command and Scripting Interpreter<\/td>\n<td width=\"265\">FrostyNeighbor makes use of scripting languages equivalent to JavaScript, Visible Fundamental, and PowerShell.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><strong>Persistence<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1060\">T1060<\/a><\/td>\n<td width=\"151\">Registry Run Keys \/ Startup Folder<\/td>\n<td width=\"265\">FrostyNeighbor makes use of the registry Run key and the Startup Folder to realize persistence.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\" width=\"113\"><strong>Protection Evasion<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1027\">T1027<\/a><\/td>\n<td width=\"151\">Obfuscated Recordsdata or Data<\/td>\n<td width=\"265\">FrostyNeighbor obfuscates scripts and compiled binaries.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1027\/009\">T1027.009<\/a><\/td>\n<td width=\"151\">Obfuscated Recordsdata or Data: Embedded Payloads<\/td>\n<td width=\"265\">FrostyNeighbor embeds subsequent levels or payloads contained in the preliminary lure doc.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1036\/005\">T1036.005<\/a><\/td>\n<td width=\"151\">Masquerading: Match Reputable Useful resource Identify or Location<\/td>\n<td width=\"265\">FrostyNeighbor drops malicious recordsdata utilizing frequent Microsoft filenames and areas.<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"2\" width=\"113\"><strong>Discovery<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1057\">T1057<\/a><\/td>\n<td width=\"151\">Course of Discovery<\/td>\n<td width=\"265\">PicassoLoader collects the record of working processes.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1082\">T1082<\/a><\/td>\n<td width=\"151\">System Data Discovery<\/td>\n<td width=\"265\">PicassoLoader collects system and consumer data.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><strong>Command and Management<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1071\/001\">T1071.001<\/a><\/td>\n<td width=\"151\">Utility Layer Protocol: Internet Protocols<\/td>\n<td width=\"265\">FrostyNeighbor makes use of HTTPS for C&amp;C communication and payload supply.<\/td>\n<\/tr>\n<tr>\n<td width=\"113\"><strong>Exfiltration<\/strong><\/td>\n<td width=\"113\"><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/attack.mitre.org\/versions\/v18\/techniques\/T1041\">T1041<\/a><\/td>\n<td width=\"151\">Exfiltration Over C2 Channel<\/td>\n<td width=\"265\">FrostyNeighbor makes use of HTTPS with Cobalt Strike.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.eset.com\/int\/business\/services\/threat-intelligence\/?utm_source=welivesecurity.com&amp;utm_medium=referral&amp;utm_campaign=wls-research&amp;utm_content=frostyneighbor-fresh-mischief-digital-shenanigans&amp;sfdccampaignid=7011n0000017htTAAQ\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/web-assets.esetstatic.com\/wls\/eti-eset-threat-intelligence.png\" alt=\"\" width=\"915\" height=\"296\"\/><\/a><\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>This blogpost covers newly found actions attributed to FrostyNeighbor, focusing on governmental organizations in Ukraine. FrostyNeighbor has been working continuous cyberoperations, altering and updating its toolset repeatedly, updating its compromise chain and strategies to evade detection \u2013 focusing on victims situated in Japanese Europe, in accordance with our telemetry. Key factors of the report: FrostyNeighbor [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":14920,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[1687,3138,9129,9130],"class_list":["post-14918","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-digital","tag-fresh","tag-mischief","tag-shenanigans"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14918"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14918\/revisions"}],"predecessor-version":[{"id":14919,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14918\/revisions\/14919"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/14920"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-20 04:00:27 UTC -->