Russia-Aligned UAC-0184 Uses Viber to Target Ukrainian Military

UAC-0184 (Hive0156) Distributes Remcos RAT via Viber in Attacks on Ukrainian Military

HIGH
January 6, 2026
6m read
Threat ActorCyberattackMalware

Related Entities

Threat Actors

UAC-0184Hive0156

Organizations

360 Threat Intelligence Center

Products & Tech

Viber

Other

Remcos RAT Hijack LoaderUkrainian military

Full Report

Executive Summary

The Russia-aligned threat actor UAC-0184 (also known as Hive0156) is continuing its intelligence-gathering campaigns against Ukrainian military and government entities. In a tactical evolution, the group is now leveraging the Viber messaging application as an initial access vector. According to a report from the 360 Threat Intelligence Center, the attackers distribute malicious ZIP archives containing booby-trapped Windows Shortcut (LNK) files. Executing these shortcuts triggers a multi-stage infection process that culminates in the installation of the Remcos Remote Administration Tool (RAT). This provides the attackers with persistent access for data theft, surveillance, and remote control of compromised systems.

Threat Overview

UAC-0184 is a persistent threat actor focused on cyberespionage against Ukrainian targets. Their latest campaign demonstrates an adaptation to their targets' communication habits, moving to popular messaging platforms like Viber to increase the likelihood of success. This shift away from traditional email-based phishing shows tactical agility.

The attack begins with a social engineering lure, where the target receives a ZIP archive via a message on Viber. The archive contains an LNK file disguised with an icon for a common document type, such as a Microsoft Word or Excel file. The filename is likely themed around military or official government business to entice the recipient to open it.

Once the victim clicks the LNK file, it executes a hidden script. This script initiates a download of the next stage payload from an attacker-controlled server, leading to the installation and execution of the Remcos RAT. Remcos is a commercially available RAT that is widely abused by criminals and state-sponsored actors for its powerful feature set, including keylogging, screen capture, file system access, and remote command execution.

Technical Analysis

The use of LNK files as a malware dropper is a well-established technique. These files can be configured to execute arbitrary commands, including PowerShell or command prompt scripts that download and run malware from the internet. The entire process is designed to bypass simple email gateways that might flag executable files.

MITRE ATT&CK Techniques

Impact Assessment

A successful infection provides UAC-0184 with complete control over the compromised endpoint within a Ukrainian military or government department. This access can be used to exfiltrate sensitive documents, steal credentials for lateral movement, monitor communications, and gain strategic intelligence relevant to the ongoing conflict. The impact of such a breach is severe, potentially compromising operational security, troop movements, and government plans. Each compromised machine serves as a potential pivot point for deeper intrusion into sensitive government and military networks.

Detection & Response

  • Endpoint Monitoring: Use an EDR solution to monitor for suspicious process chains. A legitimate application like Viber.exe should not spawn cmd.exe or powershell.exe which in turn makes a network connection to download a file. This is a key detection opportunity.
  • LNK File Analysis: Configure security policies to show file extensions by default. Suspicious LNK files can be analyzed with tools to inspect the command they are configured to execute. Use File Analysis (D3-FA) to inspect file metadata and content.
  • Network Traffic Analysis: Monitor for network connections from endpoints to unknown or uncategorized domains, especially following alerts for suspicious process execution. Block known C2 domains associated with Remcos and other RATs.

Mitigation

  • User Training: This is the most critical mitigation. Personnel must be trained to be suspicious of unsolicited files received via any communication platform, including trusted apps like Viber, Signal, or Telegram. They should be taught to never open files from unknown senders and to verify the legitimacy of files from known contacts. This aligns with MITRE mitigation M1017 - User Training.
  • Execution Prevention: Configure Attack Surface Reduction (ASR) rules on Windows to block script execution from LNK files or to block untrusted and unsigned processes from running. This is a form of Executable Denylisting (D3-EDL).
  • Application Whitelisting: Where possible, implement application whitelisting solutions like AppLocker to prevent unauthorized executables like Remcos from running, even if they are successfully downloaded to the system.

Timeline of Events

1
January 6, 2026
This article was published

MITRE ATT&CK Mitigations

Train users to identify and report suspicious files received through any medium, including trusted messaging apps like Viber.

Use security policies like Windows ASR rules to block the execution of scripts from LNK files and other potentially malicious vectors.

Mapped D3FEND Techniques:

Deploy and maintain updated antivirus and EDR solutions that can detect and block known RATs like Remcos and their delivery mechanisms.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To counter the UAC-0184 attack chain, continuous Process Analysis on endpoints is essential. Security teams should leverage an EDR solution to monitor process parent-child relationships. A critical detection rule would be to alert whenever a messaging application process (e.g., Viber.exe) spawns a command-line interpreter (cmd.exe, powershell.exe) or a script host (wscript.exe). This is highly anomalous behavior. The rule should be further refined to look for subsequent network connections made by these spawned processes, which would indicate the download of a second-stage payload like Remcos. Baselining normal process behavior on workstations is key to reducing false positives. In this specific scenario, analyzing the process tree would clearly show the malicious execution flow from the user clicking the LNK file to the final RAT execution, providing a high-fidelity alert for SOC analysts.

Hardening the configuration of the Windows operating system itself can disrupt the UAC-0184 attack chain. This can be achieved through Group Policy Objects (GPOs) or EDR Attack Surface Reduction (ASR) rules. A key hardening step is to change the default file handler for .js, .vbs, and other scripting files from wscript.exe to notepad.exe. This prevents the scripts from executing if a user is tricked into opening them. Additionally, implementing the ASR rule 'Block execution of potentially obfuscated scripts' can prevent PowerShell-based downloaders from running. Another crucial hardening step is configuring Windows to always show file extensions, making it harder for attackers to disguise an .lnk file as a document. These configuration changes act as preventative controls, breaking the infection chain before the malicious payload can be delivered.

Sources & References

Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government
The Hacker News (thehackernews.com) January 5, 2026
5th January – Threat Intelligence Report
Check Point Research (research.checkpoint.com) January 5, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

UAC-0184Threat ActorEspionageUkraineRemcos RATViber

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading