<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cobalt Strike — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/cobalt-strike/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 07:00:16 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/cobalt-strike/feed.xml" rel="self" type="application/rss+xml"/><item><title>FrostyNeighbor Targets Ukraine with Updated PicassoLoader Chain</title><link>https://feed.craftedsignal.io/briefs/2026-05-frostyneighbor-ukraine/</link><pubDate>Fri, 15 May 2026 07:00:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-frostyneighbor-ukraine/</guid><description>The FrostyNeighbor threat actor is targeting Ukrainian governmental organizations with spearphishing emails containing malicious PDFs that deliver a JavaScript dropper (PicassoLoader) and ultimately a Cobalt Strike beacon.</description><content:encoded><![CDATA[<p>ESET researchers have identified new activity from FrostyNeighbor (aka Ghostwriter, UNC1151, UAC-0057, TA445, PUSHCHA, Storm-0257) targeting governmental organizations in Ukraine starting in March 2026. FrostyNeighbor, believed to be aligned with Belarus&rsquo; interests, has been active since at least 2016, primarily targeting countries neighboring Belarus. The group employs spearphishing, disinformation campaigns, and credential harvesting to compromise various entities. This recent campaign utilizes malicious PDFs delivered via spearphishing emails, exploiting server-side validation to deliver a malicious payload only to victims with Ukrainian IP addresses. The group continually updates its toolset and compromise chains to evade detection, with a focus on Ukraine, Poland, and Lithuania. The attack culminates in the deployment of a Cobalt Strike beacon for persistent access and control.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A spearphishing email delivers a malicious PDF file (e.g., 53_7.03.2026_R.pdf) impersonating Ukrtelecom, a Ukrainian telecommunications company.</li>
<li>If the victim&rsquo;s IP address is from Ukraine, the server delivers a RAR archive (e.g., 53_7.03.2026_R.rar) containing a JavaScript dropper (53_7.03.2026_R.js). Otherwise, a benign PDF is served.</li>
<li>The JavaScript dropper (53_7.03.2026_R.js) executes and drops a decoy PDF file to the victim, simultaneously executing a second-stage JavaScript downloader (PicassoLoader) named Update.js, which is embedded in base64 within the first-stage script.</li>
<li>The PicassoLoader script (Update.js) downloads a scheduled task template (config.xml) from a C&amp;C server (book-happy.needbinding[.]icu) disguised as a JPG image (1GreenAM.jpg), but the server responds with text-based content, advertising an XML attachment.</li>
<li>The script creates a scheduled task to achieve persistence. The scheduled task is configured to execute PicassoLoader (Update.js) periodically.</li>
<li>The PicassoLoader script fingerprints the victim&rsquo;s computer, sending data to a C&amp;C server using a URL like <a href="https://book-happy.needbinding">https://book-happy.needbinding</a>[.]icu/employment/documents-and-resources.</li>
<li>Based on the fingerprint, the C&amp;C server may deliver a Cobalt Strike beacon.</li>
<li>The Cobalt Strike beacon establishes persistence by copying rundll32.exe, writing a DLL to disk, and creating a registry entry to execute the copied rundll32.exe with the DLL.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>FrostyNeighbor&rsquo;s campaigns primarily target governmental, military, and key sectors in Eastern Europe, with a focus on Ukraine, Poland, and Lithuania. A successful compromise allows the attacker to gain persistent access to the victim&rsquo;s systems, enabling them to conduct cyberespionage activities, including data theft, surveillance, and potential disruption of critical infrastructure. While Ukrainian targeting focuses on military, defense, and governmental entities, victimology in Poland and Lithuania includes sectors like industrial and manufacturing, healthcare and pharmaceuticals, logistics, and governmental organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to the C&amp;C server domains listed in the IOC table, specifically <code>book-happy.needbinding[.]icu</code> and <code>nama-belakang.nebao[.]icu</code> to identify potential Cobalt Strike beacon activity.</li>
<li>Implement the provided Sigma rule to detect the execution of JavaScript files dropping other JavaScript files, indicative of PicassoLoader activity.</li>
<li>Inspect scheduled tasks for suspicious configurations that execute JavaScript files from the %AppData% directory to identify potentially compromised systems.</li>
<li>Block the malicious URLs listed in the IOC table at the network level, particularly <code>https://book-happy.needbinding[.]icu/wp-content/uploads/2023/10/1GreenAM.jpg</code>, to prevent the download of malicious scheduled task templates.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>frostyneighbor</category><category>cyberespionage</category><category>cobaltstrike</category><category>picassoloader</category><category>ukraine</category></item></channel></rss>