Executive Summary
In early 2025, the Russia-aligned cyber-espionage group UAC-0184 undertook a targeted campaign against Ukrainian military and government organizations. Leveraging the popular Viber messaging platform, the threat actors distributed malicious ZIP archives to infiltrate sensitive networks. Security researchers from the 360 Threat Intelligence Center noted that these operations demonstrated continued intelligence-gathering efforts, employing social engineering tactics and the abuse of trusted communication channels. The attack resulted in the unauthorized access and potential exposure of confidential government and defense information, further escalating the cyber hostilities related to the conflict in Ukraine.
This incident highlights a growing trend in the weaponization of encrypted messaging apps for cyber-espionage, as nation-state actors increasingly exploit trusted consumer platforms to bypass traditional enterprise security controls. The breach underscores the urgency for robust east-west traffic monitoring, zero trust segmentation, and advanced detection capabilities across critical sectors.
Why This Matters Now
This attack demonstrates the rising risk of sophisticated nation-state groups targeting government networks through everyday communications platforms. As geopolitical tensions remain high, defenders must adapt security strategies to rapidly evolving TTPs, including the abuse of encrypted messaging services, to mitigate both lateral movement and data exfiltration risks.
Attack Path Analysis
The attacker initiated the breach by delivering malicious ZIP archives via the Viber messaging platform, leading to the compromise of endpoints in Ukrainian military and government networks. Following execution, privilege escalation likely occurred through exploitation of local credentials or vulnerable software. The attacker then moved laterally within the victim's cloud and internal environments to access additional systems and sensitive resources. Command & control traffic was established to external servers for persistent attacker communication. Sensitive information was exfiltrated, likely using encrypted or covert outbound network channels to evade detection. The overall impact included theft of confidential data for intelligence gathering and possible disruption or degradation of key operations.
Kill Chain Progression
Initial Compromise
Description
Malicious ZIP files were delivered via Viber messages, leading to infection once opened by users in targeted organizations.
Related CVEs
CVE-2025-0184
CVSS 6.5A Server-Side Request Forgery (SSRF) vulnerability in langgenius/dify version 0.10.2 allows attackers to access internal resources by exploiting external relationships in DOCX files.
Affected Products:
langgenius dify – 0.10.2
Exploit Status:
no public exploit
MITRE ATT&CK® Techniques
Phishing: Spearphishing Attachment
User Execution: Malicious File
Exfiltration Over Web Service: Exfiltration to Cloud Storage
Non-Application Layer Protocol
Dynamic Resolution: Domain Generation Algorithms
Data from Information Repositories
Application Layer Protocol: Web Protocols
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Incident Response Procedures
Control ID: 12.10.2
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management
Control ID: Article 10
CISA ZTMM 2.0 – Asset Management: Asset Inventory
Control ID: ID.AM-1
NIS2 Directive – Supply Chain Security
Control ID: Article 21.2(b)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Government Administration
Direct targeting of Ukrainian government entities through Viber exploitation creates critical cyber espionage risks requiring enhanced encrypted communications and zero trust segmentation.
Defense/Space
Military departments face active intelligence gathering operations via messaging platforms, necessitating improved threat detection, secure connectivity, and east-west traffic security controls.
Telecommunications
Messaging platform abuse for malicious payload delivery exposes communication infrastructure vulnerabilities requiring inline inspection, egress security, and multicloud visibility enforcement.
Computer/Network Security
Russia-aligned threat actors demonstrate advanced techniques targeting critical infrastructure, emphasizing need for enhanced anomaly detection, cloud native security fabric implementation.
Sources
- Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Governmenthttps://thehackernews.com/2026/01/russia-aligned-hackers-abuse-viber-to.htmlVerified
- UAC-0184 Exploits Viber for Spearphishing Ukrainian Military and Government with Remcos RAT and Hijack Loaderhttps://www.rescana.com/post/uac-0184-exploits-viber-for-spearphishing-ukrainian-military-and-government-with-remcos-rat-and-hijaVerified
- Russia-linked hackers target Ukraine via Viber malware campaignhttps://www.cybersecurity-help.cz/blog/5155.htmlVerified
- Hive0156 continues Remcos campaigns against Ukrainehttps://www.ibm.com/think/x-force/hive0156-continues-remcos-campaigns-against-ukraineVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Implementing Zero Trust Segmentation, east-west traffic controls, encrypted traffic inspection, and granular egress policy enforcement would have substantially limited the attack's ability to spread, communicate externally, and exfiltrate sensitive data. Real-time threat detection and visibility are key to identifying anomalous attacker behaviors and containing incidents before damage occurs.
Control: Threat Detection & Anomaly Response
Mitigation: Early detection of phishing or suspicious file downloads triggers incident response.
Control: Zero Trust Segmentation
Mitigation: Limits spread of compromise even with escalated privileges.
Control: East-West Traffic Security
Mitigation: Blocks unauthorized internal traffic and suspicious lateral movement.
Control: Egress Security & Policy Enforcement
Mitigation: Prevents or detects C2 communication over unauthorized channels.
Control: Encrypted Traffic (HPE) & Egress Security & Policy Enforcement
Mitigation: Mitigates data exfiltration by inspecting and restricting unauthorized encrypted outbound traffic.
Facilitates rapid incident response by providing comprehensive attack visibility and evidence.
Impact at a Glance
Affected Business Functions
- Intelligence Operations
- Government Communications
Estimated downtime: 7 days
Estimated loss: $500,000
Potential exposure of sensitive military and government communications, including strategic plans and personnel information.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation and least-privilege identity policies to contain malware spread after initial compromise.
- • Enforce strict east-west and egress traffic controls to block lateral movement and exfiltration attempts across all cloud and hybrid environments.
- • Deploy real-time anomaly detection and threat intelligence to surface and respond to suspicious user behaviors or unauthorized file execution.
- • Mandate encrypted traffic inspection capabilities to prevent covert C2 and data theft—even over HTTPS or VPN channels.
- • Centralize multicloud visibility and security policy orchestration to accelerate detection and response to advanced threats.



