/plushcap/analysis/cloudflare/disrupting-flyingyeti-campaign-targeting-ukraine

Disrupting FlyingYeti's campaign targeting Ukraine

What's this blog post about?

Cloudforce One has published the results of its investigation into a phishing campaign by Russia-aligned threat actor FlyingYeti targeting Ukraine. The campaign capitalized on anxiety over potential loss of access to housing and utilities due to significant debt liability for Ukrainian citizens. FlyingYeti's malware, COOKBOX, was designed to infect targets and allow the actor to control their systems. Cloudforce One took measures to prevent FlyingYeti from launching its campaign, including detections and code takedowns, as well as external collaboration with third parties to remove the actor's cloud-hosted malware. The phishing theme used by FlyingYeti is likely one of many themes leveraged in a larger operation targeting Ukrainian entities, particularly their defense forces.

Company
Cloudflare

Date published
May 30, 2024

Author(s)
Cloudforce One

Word count
3040

Language
English

Hacker News points
None found.


By Matt Makai. 2021-2024.