Nation-State Threats

Ghostwriter Hits Ukraine Gov with Prometheus Phishing Malwar

Belarusian threat actor Ghostwriter is leveraging Ukraine's own Prometheus learning platform as a fresh vector for phishing attacks against the nation's government entities. The sophisticated operation employs a multi-stage JavaScript payload designed for deep system reconnaissance and Cobalt Strike deployment.

Abstract digital network graphic with glowing nodes and lines, representing cyber intrusion.

Key Takeaways

  • Ghostwriter, a Belarus-linked threat actor, is targeting Ukrainian government entities with a new phishing campaign.
  • The campaign uses the Prometheus online learning platform as a lure, delivering a multi-stage JavaScript malware payload named OYSTERFRESH.
  • The malware deploys OYSTERBLUES and OYSTERSHUCK, which gather system information and ultimately deploy Cobalt Strike for post-exploitation.
  • The attacks align with broader trends of nation-state actors using AI for malware development and intelligence gathering.
  • CERT-UA recommends restricting `wscript.exe` execution for standard user accounts to mitigate such threats.

The flickering cursor on a Ukrainian government IT admin’s screen, usually a symbol of vigilant defense, was about to become the entry point for a new digital insurgency. Belarus-aligned threat actor Ghostwriter — a group also known by handlers as UAC-0057 and UNC1151 — has been actively deploying a novel phishing campaign, using lures crafted from Prometheus, a legitimate Ukrainian online learning platform, to ensnare vital government organizations within the country.

This isn’t some smash-and-grab operation. According to reports from the Computer Emergency Response Team of Ukraine (CERT-UA), the activity has been meticulously planned and executed, beginning as far back as the spring of 2026. The modus operandi? Phishing emails, sent via compromised accounts, expertly disguised to appear as routine communications.

Here’s where it gets interesting, architecturally speaking. The initial email typically contains a PDF attachment. Click on that, and you’re not greeted with educational material, but a link. This link, in turn, doesn’t just download a file; it initiates the fetching of a ZIP archive. Inside this archive lies the real workhorse: a JavaScript file, ominously codenamed OYSTERFRESH.

OYSTERFRESH serves a dual purpose. First, it presents a decoy document, a classic misdirection tactic designed to placate the user while the real malware gets to work. Simultaneously, it silently writes an obfuscated and encrypted payload, known as OYSTERBLUES, directly into the Windows Registry. This isn’t just dropping a file; it’s embedding itself deep within the operating system’s core. But that’s not all. OYSTERFRESH also downloads and launches OYSTERSHUCK, a separate component tasked with the crucial job of decoding OYSTERBLUES.

Once decoded, OYSTERBLUES unfurls its capabilities. It’s designed for comprehensive system reconnaissance, capable of harvesting an extensive array of information. Think computer name, user account details, OS version, the precise time of the last system boot, and even a live list of currently running processes. This treasure trove of data is then exfiltrated to a command-and-control (C2) server via an HTTP POST request. The malware doesn’t stop there; it patiently awaits further instructions, specifically next-stage JavaScript code, which it executes with unnerving ease using the eval() function. The ultimate objective? The deployment of Cobalt Strike, a powerful post-exploitation framework that has become a staple for persistent, deep-ranging cyber intrusions.

The Deeper Motivations Behind the Code

The Ukrainian National Security and Defense Council has been sounding the alarm bells, revealing Russia’s increasing reliance on AI tools like OpenAI’s ChatGPT and Google Gemini. These aren’t just for research; they’re being integrated into malware to generate malicious commands on the fly. Kremlin-backed groups, the Council notes, are focusing on intelligence gathering and establishing long-term footholds within compromised networks for future exploitation, including supporting influence operations. It’s a disturbing evolution from simple data theft to sustained strategic cyber warfare.

“The main vectors of initial penetration in 2025 were social engineering, exploitation of vulnerabilities, use of compromised RDP and VPN accounts, attacks on supply chains, and the use of unlicensed software that already contains built-in backdoors at the installation stage. Attackers focused on stealing sensitive information, intercepting communications, and tracking the location of targets.”

This Ghostwriter campaign, with its Prometheus lure and multi-stage OYSTER payload, fits precisely into this evolving, AI-enhanced threat landscape. The use of the registry for staging payloads is a clever evasion technique, making it harder for traditional endpoint detection to spot the initial infection. It speaks to a growing sophistication in how these actors move and operate, aiming to minimize their digital footprint while maximizing their intel yield.

Is This a Sign of Future Attacks?

The broader context is critical here. This isn’t an isolated incident. In a parallel development, details have emerged about a pro-Kremlin propaganda campaign that hijacked real Bluesky user accounts, including those belonging to journalists and professors, to spread disinformation since 2024. This activity has been attributed to the Social Design Agency, a Moscow-based entity linked to the Matryoshka campaign. Bluesky has had to resort to suspending accounts in response. The convergence of sophisticated malware deployment, AI-assisted attack generation, and coordinated influence operations paints a chilling picture of the current geopolitical cyber battlefield.

To bolster defenses against such threats, CERT-UA advises applying fundamental security practices: restricting the ability to run wscript.exe for standard user accounts is a concrete, albeit basic, step to reduce the attack surface. It’s a reminder that even as the attackers push the envelope with novel techniques, basic cyber hygiene remains a vital first line of defense.

The architects of these campaigns aren’t just after immediate gains; they’re building persistent avenues for future operations. The Prometheus lure, the OYSTER payloads, the Cobalt Strike finale—it’s all part of a coordinated, evolving strategy designed for long-term strategic advantage. And as AI becomes more integrated into their toolkits, expect these attacks to become even more adaptive and harder to detect.


🧬 Related Insights

Maya Thompson
Written by

Threat intelligence reporter. Tracks CVEs, ransomware groups, and major breach investigations.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by The Hacker News

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.