{"id":19125,"date":"2022-02-21T04:37:48","date_gmt":"2022-02-21T04:37:48","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=19125"},"modified":"2026-04-17T18:07:45","modified_gmt":"2026-04-17T18:07:45","slug":"apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\/","title":{"rendered":"APT Lorec53 group launched a series of cyber attacks against Ukraine"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p>Recently, NSFOCUS Security Labs captured a large number of phishing files against Ukraine in format of pdf, doc, cpl, lnk and other types. After analysis, we confirmed that the series of phishing activities came from the APT group Lorec53. During the period from the end of 2021 to February 2022, this group used multiple attack methods to deliver a variety of phishing documents to key state sectors such as the Ministry of Defense, Ministry of Finance, embassies, state-owned enterprises, and public medical facilities of Ukraine to collect personnel information of these organizations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About Lorec53 Group<\/h2>\n\n\n\n<p>Lorec53, active in Eastern Europe, is a new type of APT group first identified and named by NSFOCUS Security Labs. The Ukrainian Computer Emergency Response Center identified this group as UAC-0056 in a recent report (https:\/\/cert.gov.ua\/article\/18419). NSFOCUS Security Labs found that the group&#8217;s captureable spy Trojans first appeared in 2020, and began to wage large-scale cyber espionage attacks against Ukraine and Georgia in early 2021.<\/p>\n\n\n\n<p>Lorec53 group exposed lots of Russian-linked characteristics in attack tools, registration information of domain names, asset location, etc., and its attack targets were also closely related to national interests of Russia. The study on Lorec53&#8217;s shows there is a likelihood that this group was hired by other high-level espionage organizations to gain revenue by undertaking state-level espionage attacks or selling confidential government documents.<\/p>\n\n\n\n<p>Lorec53 has strong infiltration ability and flexible attack methods, capable of organizing large-scale and frequent phishing attacks and good at harnessing social engineering technologies and network resource management methods learned from other threat actors.<\/p>\n\n\n\n<p>At present, the victims affected by attacks launched by the Lorec53 group include users of the National Bank of Iran, Georgia&#8217;s Ministry of Epidemic Prevention and Health, Ukraine&#8217;s Ministry of Defense, the Presidential Office, the Ministry of the Interior, and the Border Service.<\/p>\n\n\n\n<p>For more reports related to the group, see <a href=\"http:\/\/(https:\/\/nsfocusglobal.com\/company-overview\/resources\/analysis-report-on-lorec53-group\/\">Analysis Report on Lorec 53 Group<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Event overview<\/h2>\n\n\n\n<p>This time Lorec53 launched a long wave of attacks aiming at a wide range of targets. similarity of attack methods allowed us to connect these attacks with this group.<\/p>\n\n\n\n<p>The same as previous methods, Lorec53 used baits such as Ukrainian government documents masked some information, shortcut files with Ukrainian titles and disguised extensions, and cpl files with Ukrainian file names, and masqueraded as a member of a credible organization to send these baits.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221f.png\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"388\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221f-1024x388.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19145\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221f-1024x388.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221f-300x114.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221f-768x291.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221f-200x76.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221f.png 1272w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption>Some names of phishing files<\/figcaption><\/figure>\n\n\n\n<p>In this series of phishing attacks, the attack actors mainly used three domain names, namely 3237.site, stun.site , and eumr.site , as download servers for phishing files. The site domain is one of the commonly used domains of Lorec53 group. As of February 11 , some URLs are still accessible and can deliver payload files, indicating that this round of attacks is still ongoing .<\/p>\n\n\n\n<p>The Lorec53 group directly wrote the collected mailboxes of key Ukrainian facilities into the decoy text in this series of attacks, which was likely to increase the credibility of the bait. Such actions also helped researchers to estimate the attack coverage.<\/p>\n\n\n\n<p>The Lorec53 group still employed known Trojan programs, including LorecDocStealer (also known as OutSteel ), LorecCPL , SaintBot , and packaged these Trojan programs as much as possible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Event analysis<\/h2>\n\n\n\n<p><strong>Attack event<\/strong> <strong>(1)<\/strong><\/p>\n\n\n\n<p>The first phishing attack in this wave was spotted at the end of 2021. The Lorec53 group constructed a large number of phishing documents with &#8221; &ETH;&acute;&ETH;&frac34; &Ntilde;&euro;&Ntilde;&ndash;&Ntilde;&circ;&ETH;&micro;&ETH;&frac12;&ETH;&frac12;&Ntilde; &ETH;&nbsp;&ETH;&deg;&ETH;&acute;&ETH;&cedil; &ETH;&frac12;&ETH;&deg;&Ntilde;&dagger;&Ntilde;&ndash;&ETH;&frac34;&ETH;&frac12;&ETH;&deg;&ETH;&raquo;&Ntilde;&OElig;&ETH;&frac12;&ETH;&frac34;&Ntilde;&mdash; &ETH;&plusmn;&ETH;&micro;&ETH;&middot;&ETH;&iquest;&ETH;&micro;&ETH;&ordm;&ETH;&cedil; &Ntilde;&ndash; &ETH;&frac34;&ETH;&plusmn;&ETH;&frac34;&Ntilde;&euro;&ETH;&frac34;&ETH;&frac12;&ETH;&cedil; &ETH;&pound;&ETH;&ordm;&Ntilde;&euro;&ETH;&deg;&Ntilde;&mdash;&ETH;&frac12;&ETH;&cedil; &ETH;&sup2;&Ntilde;&ndash;&ETH;&acute; 7 &ETH;&sup2;&ETH;&micro;&Ntilde;&euro;&ETH;&micro;&Ntilde;&ETH;&frac12;&Ntilde; 2021 &Ntilde;&euro;&ETH;&frac34;&ETH;&ordm;&Ntilde;&fnof; &#8221; &ETH;&Yuml;&Ntilde;&euro;&ETH;&frac34; &ETH;&sup2;&ETH;&frac12;&ETH;&micro;&Ntilde;&ETH;&micro;&ETH;&frac12;&ETH;&frac12;&Ntilde; &ETH;&middot;&ETH;&frac14;&Ntilde;&ndash;&ETH;&frac12;&ETH;&cedil; &ETH;&acute;&ETH;&frac34; &ETH;&iquest;&ETH;&micro;&Ntilde;&euro;&Ntilde;&ETH;&frac34;&ETH;&frac12;&ETH;&deg;&ETH;&raquo;&Ntilde;&OElig;&ETH;&frac12;&ETH;&cedil;&Ntilde;&hellip; &Ntilde;&ETH;&iquest;&ETH;&micro;&Ntilde;&dagger;&Ntilde;&ndash;&ETH;&deg;&ETH;&raquo;&Ntilde;&OElig;&ETH;&frac12;&ETH;&cedil;&Ntilde;&hellip; &ETH;&micro;&ETH;&ordm;&ETH;&frac34;&ETH;&frac12;&ETH;&frac34;&ETH;&frac14;&Ntilde;&ndash;&Ntilde;&Dagger;&ETH;&frac12;&ETH;&cedil;&Ntilde;&hellip; &Ntilde;&sbquo;&ETH;&deg; &Ntilde;&ndash;&ETH;&frac12;&Ntilde;&circ;&ETH;&cedil;&Ntilde;&hellip; &ETH;&frac34;&ETH;&plusmn;&ETH;&frac14;&ETH;&micro;&ETH;&para;&Ntilde;&fnof;&ETH;&sup2;&ETH;&deg;&ETH;&raquo;&Ntilde;&OElig;&ETH;&frac12;&ETH;&cedil;&Ntilde;&hellip; &ETH;&middot;&ETH;&deg;&Ntilde;&hellip;&ETH;&frac34;&ETH;&acute;&Ntilde;&ndash;&ETH;&sup2; (&Ntilde;&ETH;&deg;&ETH;&frac12;&ETH;&ordm;&Ntilde;&dagger;&Ntilde;&ndash;&ETH;&sup1;)&#8221; &#8220;. The content of these phishing documents refers to a presidential decree adopted by the National Security and Defense Council of Ukraine on September 7, 2021, claiming that special asset restrictions and sanctions will be imposed on specific individuals.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221a.jpg\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221a-1024x671.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19127\" width=\"768\" height=\"503\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221a-1024x671.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221a-300x196.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221a-768x503.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221a-200x131.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221a.jpg 1113w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/a><figcaption>Example of the phishing documents<\/figcaption><\/figure><\/div>\n\n\n\n<p>According to the Ukrainian decree, some State departments such as Security Service of Ukraine and Cabinet&nbsp;of Ministers of&nbsp;Ukraine have the rights to revise this document to add or delete the individuals for economic sanctions. In the amendment on September 7, an economic sanctions object numbered 85 was added.<\/p>\n\n\n\n<p>The phishing file is roughly the same as the content of the attachment in the presidential decree published by the Ukrainian government (https:\/\/zakon.rada.gov.ua\/laws\/show\/n0062525-21#Text), but the Lorec53 group made the following changes to the text:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Obfuscated specific citizen information using asterisks;<\/li><\/ul>\n\n\n\n<p>This is Lorec53&#8217;s usual behavior when building phishing documents. It attracts readers to enable the editing function of the document, and then run macros in the document;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Added email addresses that did not exist in the original text;<\/li><\/ul>\n\n\n\n<p>The Lorec53 attacker added government email addresses to the original citizen information without fuzzing. After query, the &#8220;dmytrotsan@ukr.net &#8221; address in the sample fishing email had nothing to do with the sanctions, but pointed to the the state treasure service of Ukraine in Volyn region. (&ETH;&ldquo;&ETH;&#382;&ETH;&rsaquo;&ETH;&#382;&ETH;&rsquo;&ETH;&ETH;&bull; &ETH;&pound;&ETH;&Yuml;&ETH;&nbsp;&ETH;&ETH;&rsquo;&ETH;&rsaquo;&ETH;&dagger;&ETH;&ETH;&ETH;&macr; &ETH;&rdquo;&ETH;&bull;&ETH;&nbsp;&ETH;&ndash;&ETH;&ETH;&rsquo;&ETH;&ETH;&#382;&ETH;&Dagger; &ETH;&scaron;&ETH;&ETH;&mdash;&ETH;&ETH;&ETH;&sect;&ETH;&bull;&ETH;&trade;&ETH;&iexcl;&ETH;&not;&ETH;&scaron;&ETH;&#382;&ETH;&Dagger; &ETH;&iexcl;&ETH;&rsaquo;&ETH;&pound;&ETH;&ndash;&ETH;&lsquo;&ETH;&tilde; &ETH;&pound;&ETH;&scaron;&ETH;&nbsp;&ETH;&ETH;&Dagger;&ETH;&ETH;&tilde; &ETH;&pound; &ETH;&rsquo;&ETH;&#382;&ETH;&rsaquo;&ETH;&tilde;&ETH;&ETH;&iexcl;&ETH;&not;&ETH;&scaron;&ETH;&dagger;&ETH;&trade; &ETH;&#382;&ETH;&lsquo;&ETH;&rsaquo;&ETH;&ETH;&iexcl;&ETH;&cent;&ETH;&dagger;).<\/p>\n\n\n\n<p>The above two changes indicate that the target of this phishing attack is the Ukrainian government, and the email addresses in the phishing email is likely to be the same as the victim&#8217;s email addresses. NSFOCUS Security Labs listed these addresses in all captured phishing emails to assess the impact of this Lorec53 phishing attack.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><th>Mail<\/th><th>Corresponding organization<\/th><\/tr><\/thead><tbody><tr><td>dmytrotsan@ukr.net<\/td><td>The State Treasury Service of Ukraine in Volyn region<\/td><\/tr><tr><td>emb_sm@mfa.gov.ua<\/td><td>Embassy Of Ukraine In Belgrade, Serbia<\/td><\/tr><tr><td>kev_dnipro@post.mil.gov.ua<\/td><td>Apartment-operational Department of Dnipro<\/td><\/tr><tr><td>zorkz@mil.gov.ua<\/td><td>Joint Operational Headquarters of the Armed Forces of Ukraine<\/td><\/tr><tr><td>office.skdvs@ks.treasury.gov.ua<\/td><td>Department of the State Treasury Service of Ukraine in Skadovsk district of Kherson region<\/td><\/tr><tr><td>sadovska-ii@utg.ua<\/td><td>Ukrtransgaz Joint Stock Company<\/td><\/tr><tr><td>ufg.csc@ufg@.com.ua<\/td><td>Ukrainian Financial Group<\/td><\/tr><tr><td>pokrovske_tckspdp@post.mil.gov.ua<\/td><td>Third Sector Staffing and Social Support Centre, Sinernikivsky District, Dnipropetrovsk Oblast, Ukraine<\/td><\/tr><tr><td>zmievkazna@ukr.net<\/td><td>The State Treasury Service of Ukraine from the Zm&Ntilde;&ndash;&Ntilde;&mdash;vsky district of the Kharkiv region&nbsp;<\/td><\/tr><tr><td>kuzmych@naftogaz.com<\/td><td>The Joint Stock Company &nbsp;Naftogaz of Ukraine<\/td><\/tr><tr><td>zvernmou@ukr.net<\/td><td>Section for Public Appeals Handling and Public Access to&nbsp;Information of&nbsp;the Ministry of&nbsp;Defense of&nbsp;Ukraine<\/td><\/tr><tr><td>perevod@pivdenny.ua<\/td><td>Pivdennyi bank<\/td><\/tr><tr><td>kevzp@post.mil.gov.ua<\/td><td>Press and Information Office of the Ukraine&acirc;&euro;&trade;s MoD<\/td><\/tr><tr><td>i.kozarovska@ukrburgas.com.ua<\/td><td>JSC &#8220;Ukrgazvydobuvannya&#8221; represented by the branch of the Drilling Department &#8220;Ukrburgaz&#8221;<\/td><\/tr><tr><td>kanivkamvo@ukr.net<\/td><td>Department of education of The executive committee of the KANIV city council of cherkasy&nbsp; region<\/td><\/tr><tr><td>t.litovko@direkcy.atom.gov.ua<\/td><td>VP KB ATOMPRILAD DP NAEK ENERGOATOM<\/td><\/tr><tr><td>timm93@ukr.net<\/td><td>Department of the State Treasury Service of Ukraine in Vasylivka district of Zaporizhia region&nbsp;<\/td><\/tr><tr><td>office.cherv@lv.treasury.gov.ua<\/td><td>Department of the State Treasury Service of Ukraine in Chervonohrad, Lviv Region&nbsp;<\/td><\/tr><tr><td>kevplt_kes@post.mil.gov.ua<\/td><td>&nbsp;<\/td><\/tr><tr><td>babich-ka@utg.ua<\/td><td>UKRTRANSGAZ Co., LTD<\/td><\/tr><tr><td>kevplt_zhytlo@post.mil.gov.ua<\/td><td>&nbsp;<\/td><\/tr><tr><td>corruption@direkcy.atom.gov.ua<\/td><td>State-owned enterprises of Ukraine &#8220;NNEGC&#8221; Energoatom&#8221;<\/td><\/tr><tr><td>emb_jp@mfa.gov.ua<\/td><td>Embassy of Ukraine in Japan<\/td><\/tr><tr><td>genotdel@odessa.gov.ua<\/td><td>Odessa Regional State Administration&nbsp;<\/td><\/tr><tr><td>zoya_skl@ukr.net<\/td><td>The State Treasury Service of Ukraine in the Oleksandrivsky district of the Kirovohrad region&nbsp;<\/td><\/tr><tr><td>ruslan.marunia@bank.gov.ua<\/td><td>National Bank of Ukraine currency Circulation Department<\/td><\/tr><tr><td>malyshev.tender@ukroboronprom.com<\/td><td>Malyshev factory<\/td><\/tr><tr><td>emb_pl@mfa.gov.ua<\/td><td>Embassy of Ukraine in Poland<\/td><\/tr><tr><td>irudksu@i.ua<\/td><td>The Department of the State Treasury Service of Ukraine in Irshava district of Zakarpattia region&nbsp;<\/td><\/tr><tr><td>emb_lt@mfa.gov.ua<\/td><td>Embassy of Ukraine in Lithuania<\/td><\/tr><tr><td>emb_fi@mfa.gov.ua<\/td><td>Embassy of Ukraine in Finland<\/td><\/tr><tr><td>abashinao@kv.treasury.gov.ua<\/td><td>Main Department of the State Treasury Service of Ukraine in Kyiv&nbsp;<\/td><\/tr><tr><td>1545@ukc.gov.ua<\/td><td>Government Contact Center Government Hotline 1545<\/td><\/tr><tr><td>tetiana.rupcheva@bank.gov.ua<\/td><td>Department of Monetary Policy and Market Transactions, National Bank of Ukraine&nbsp;<\/td><\/tr><tr><td>pr@atom.gov.ua<\/td><td>State-owned enterprises of Ukraine &#8220;NNEGC&#8221; Energoatom&#8221;<\/td><\/tr><tr><td>1201_buhg@dmsu.gov.ua<\/td><td>ICE of Ukraine in the Dnepropetrovsk region&nbsp;&nbsp;<\/td><\/tr><tr><td>kherson_kev@post.mil.gov.ua<\/td><td>Housing and Maintenance Department of Kherson<\/td><\/tr><tr><td>sholyak27@ukr.net<\/td><td>The Statetreasury Service Of Ukraine In Thetranscarpathian Region<\/td><\/tr><tr><td>office@novator-tm.com<\/td><td>State-owned enterprises of Ukraine &#8220;Novator&#8221;<\/td><\/tr><tr><td>mps@industrialbank.ua<\/td><td>AKB Industrialbank PAT<\/td><\/tr><tr><td>v.harchenko@mil.gov.ua<\/td><td>&nbsp;<\/td><\/tr><\/tbody><\/table><figcaption>Email addresses and corresponding organizations in phishing emails<\/figcaption><\/figure>\n\n\n\n<p>The associated information of these email addresses shows that the purpose of Lorec53 in this phishing attack is to explore and collect information, which is the same as the organization&#8217;s previous activities.<\/p>\n\n\n\n<p>The malicious macros in these phishing documents will download and run the Trojan at http [ : ] \/\/3237 [ . ] site\/test01.exe. Also associated with this domain name are &#8221; &ETH;&#382;&Ntilde;&ETH;&frac34;&ETH;&plusmn;&ETH;&raquo;&ETH;&cedil;&ETH;&sup2;&Ntilde;&ndash; &ETH;&acute;&ETH;&frac34;&ETH;&ordm;&Ntilde;&fnof;&ETH;&frac14;&ETH;&micro;&ETH;&frac12;&Ntilde;&sbquo;&ETH;&cedil; &ETH;&iexcl;&ETH;&lsquo;&ETH;&pound; .lnk&acirc;&euro; (a special. lnk file of Security Service of Ukraine), and Lorec53&acirc;&euro;&trade;s known Trojan program LorecCPL (named &acirc;&euro;&oelig;08-2021.cpl&acirc;&euro;), a direct correlation to the Lorec53 group.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221b-1.jpg\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221b-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19133\" width=\"582\" height=\"506\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221b-1.jpg 776w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221b-1-300x261.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221b-1-768x668.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221b-1-200x174.jpg 200w\" sizes=\"(max-width: 582px) 100vw, 582px\" \/><\/a><figcaption>Main logic part of the LorecCPL Trojan<\/figcaption><\/figure><\/div>\n\n\n\n<p>The malicious shortcut file named &acirc;&euro;&oelig;&ETH;&#382;&Ntilde;&ETH;&frac34;&ETH;&plusmn;&ETH;&raquo;&ETH;&cedil;&ETH;&sup2;&Ntilde;&ndash; &ETH;&acute;&ETH;&frac34;&ETH;&ordm;&Ntilde;&fnof;&ETH;&frac14;&ETH;&micro;&ETH;&frac12;&Ntilde;&sbquo;&ETH;&cedil; &ETH;&iexcl;&ETH;&lsquo;&ETH;&pound;.lnk&acirc;&euro; was also used by the Lorec53 group in several attacks. Lorec53 put the malicious shortcut file together with other clear files into crafted many compressed files with names including &acirc;&euro;&oelig;sadovska-iiutg.ua.zip&acirc;&euro;, &acirc;&euro;&oelig;feukslpost.mil.gov.ua.zip&acirc;&euro;, &acirc;&euro;&oelig;n. lashevychdirekcy.atom.gov.ua.zip&#8221; and &#8220;feukslpost.mil.gov.ua.zip&#8221;, expecting victims run the malicious file while browsing file by file. This decoy method also fits with Lorec53&#8217;s historical tactics.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221c.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221c.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19136\" width=\"454\" height=\"327\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221c.jpg 605w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221c-300x216.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221c-200x144.jpg 200w\" sizes=\"(max-width: 454px) 100vw, 454px\" \/><\/a><figcaption>File directory of a crafted compressed package<\/figcaption><\/figure><\/div>\n\n\n\n<p>From the name of the compressed package, it can be seen that the target of this attack is similar to and partially overlapped with the aforementioned phishing document on economic sanctions, which can be speculated to be the same series of attacks.&nbsp;<\/p>\n\n\n\n<p><strong>Attack event (2)<\/strong><\/p>\n\n\n\n<p>This is a phishing attack occured between Decemeber 2021 and February 2022.<\/p>\n\n\n\n<p>In early February, Lorec53 produced a series of phishing documents titled &#8221; &ETH;&Yuml;&ETH;&frac34;&ETH;&sup2;&Ntilde;&ndash;&ETH;&acute;&ETH;&frac34;&ETH;&frac14;&ETH;&raquo;&ETH;&micro;&ETH;&frac12;&ETH;&frac12;&Ntilde; &ETH;&iquest;&Ntilde;&euro;&ETH;&frac34; &ETH;&sup2;&Ntilde;&Dagger;&ETH;&cedil;&ETH;&frac12;&ETH;&micro;&ETH;&frac12;&ETH;&frac12;&Ntilde; &ETH;&middot;&ETH;&raquo;&ETH;&frac34;&Ntilde;&Dagger;&ETH;&cedil;&ETH;&frac12;&Ntilde;&fnof;&acirc;&euro; (Report of Crime), delivered in PDF embedded with vulnerability and DOCX file with malicious macros. The former file displayed &#8220;please update&#8221; when opened.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221d.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221d-1024x512.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19138\" width=\"512\" height=\"256\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221d-1024x512.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221d-300x150.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221d-768x384.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221d-200x100.jpg 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221d.jpg 1180w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/a><figcaption>Phishing document titled &acirc;&euro;&oelig;&ETH;&Yuml;&ETH;&frac34;&ETH;&sup2;&Ntilde;&ndash;&ETH;&acute;&ETH;&frac34;&ETH;&frac14;&ETH;&raquo;&ETH;&micro;&ETH;&frac12;&ETH;&frac12;&Ntilde; &ETH;&iquest;&Ntilde;&euro;&ETH;&frac34; &ETH;&sup2;&Ntilde;&Dagger;&ETH;&cedil;&ETH;&frac12;&ETH;&micro;&ETH;&frac12;&ETH;&frac12;&Ntilde; &ETH;&middot;&ETH;&raquo;&ETH;&frac34;&Ntilde;&Dagger;&ETH;&cedil;&ETH;&frac12;&Ntilde;&fnof;&#8221;<\/figcaption><\/figure><\/div>\n\n\n\n<p>Crafting PDF phishing documents is a commonly-used method by the Lorec53 group. It is used to download the Trojan programs https[:]\/\/get.adobe.com.uk.reader.updateadobeacrobatreaderdc.stun[.]site\/get.adobe.com.uk.reader\/get.adobe.com.uk.reader\/get.adobe.com.uk.reader\/AdobeAcrobatUpdate.exe. This Trojan is another form the Trojan LorecDocStealer (also known as OutSteel ) and used to steal documents from compromised hosts. The shell wrapping technique used by the Lorec53 group on this Trojan is commonly seen in AgentTesla spyware.<\/p>\n\n\n\n<p>The latter DOCX file &nbsp;&#8221; &ETH;&Yuml;&ETH;&frac34;&ETH;&sup2;&Ntilde;&ndash;&ETH;&acute;&ETH;&frac34;&ETH;&frac14;&ETH;&raquo;&ETH;&micro;&ETH;&frac12;&ETH;&frac12;&Ntilde; &ETH;&iquest;&Ntilde;&euro;&ETH;&frac34; &ETH;&sup2;&Ntilde;&Dagger;&ETH;&cedil;&ETH;&frac12;&ETH;&micro;&ETH;&frac12;&ETH;&frac12;&Ntilde; &ETH;&middot;&ETH;&raquo;&ETH;&frac34;&Ntilde;&Dagger;&ETH;&cedil;&ETH;&frac12;&Ntilde;&fnof; ( &ETH;&lsquo;&Ntilde;&ndash;&ETH;&raquo;&ETH;&frac34;&Ntilde;&fnof;&Ntilde; &ETH;&#382;&ETH;&raquo;&ETH;&micro;&ETH;&ordm;&Ntilde;&Ntilde;&ndash;&ETH;&sup1; &ETH;&iexcl;&ETH;&micro;&Ntilde;&euro;&ETH;&sup3;&Ntilde;&ndash;&ETH;&sup1;&ETH;&frac34;&ETH;&sup2;&ETH;&cedil;&Ntilde;&Dagger;) .docx&#8221; presented images and textual information with distinct decoy characteristics used the by Lorec53 group when it was opened.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221e.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221e.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-19140\" width=\"410\" height=\"473\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221e.jpg 819w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221e-260x300.jpg 260w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221e-768x887.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/0221e-200x231.jpg 200w\" sizes=\"(max-width: 410px) 100vw, 410px\" \/><\/a><figcaption>DOCX phishing document titled &#8221; &ETH;&Yuml;&ETH;&frac34;&ETH;&sup2;&Ntilde;&ndash;&ETH;&acute;&ETH;&frac34;&ETH;&frac14;&ETH;&raquo;&ETH;&micro;&ETH;&frac12;&ETH;&frac12;&Ntilde; &ETH;&iquest;&Ntilde;&euro;&ETH;&frac34; &ETH;&sup2;&Ntilde;&Dagger;&ETH;&cedil;&ETH;&frac12;&ETH;&micro;&ETH;&frac12;&ETH;&frac12;&Ntilde; &ETH;&middot;&ETH;&raquo;&ETH;&frac34;&Ntilde;&Dagger;&ETH;&cedil;&ETH;&frac12;&Ntilde;&fnof;&acirc;&euro;<\/figcaption><\/figure><\/div>\n\n\n\n<p>The document is disguised as a document from the investigation department of the Ukrainian National Police, and through a piece of red prompt information and masking images, tricked readers to click the icon ole object in the document and then execute JavaScript to download and run the Trojan horse in the link https[:]\/\/cdn.discordapp[.]com The Trojan in \/attachments\/932413459872747544\/938291977735266344\/putty.exe. The Trojan is also a new look of Trojan LorecDocStealer (or OutSteel).<\/p>\n\n\n\n<p>With reference to the aforementioned attack, the unobfuscated email address o.bilous@ukrtransnafta.com in this document is very likely to belong to one of victims. The affiliated company of this mailbox is UkrTransNafta in Ukraine .<\/p>\n\n\n\n<p>In addition, this DOCX phishing document was also spotted and published by the Ukrainian Computer Emergency Response Center (CERT-UA), where CERT-UA referred to the Lorec53 group as the UAC-0056 (<a href=\"https:\/\/cert.gov.ua\/article\/18419\">https:\/\/cert.gov.ua\/article\/18419<\/a>).<\/p>\n\n\n\n<p>Association analysis to the domain name stun.site appeared in this attack shows NSFOCUS security researchers that a variety of decoy files released by the Lorec53 group from December 2021. These files include .lnk, .cpl , .rar and other formats, all of which are known decoy forms of the Lorec53 group. The main purpose of such attacks is to obtain the &nbsp;LorecDocStealer (OutSteel) Trojan from stun.site for further attack activities .&nbsp;<\/p>\n\n\n\n<p><strong>Attack event (3)<\/strong><\/p>\n\n\n\n<p>The is an attack linked to the domain name eumr[.]site.<\/p>\n\n\n\n<p>In the early of February, the Lorec53 group constructed a phishing document named &#8221; &ETH;&nbsp;&ETH;&frac34;&ETH;&middot;&#8217;&Ntilde;&Ntilde;&ETH;&frac12;&ETH;&micro;&ETH;&frac12;&ETH;&frac12;&Ntilde; &#8221; &Ntilde;&permil;&ETH;&frac34;&ETH;&acute;&ETH;&frac34; &ETH;&ordm;&ETH;&frac34;&Ntilde;&euro;&ETH;&micro;&ETH;&ordm;&Ntilde;&sbquo;&ETH;&frac12;&ETH;&frac34;&Ntilde;&Ntilde;&sbquo;&Ntilde;&ndash; &ETH;&sup2;&ETH;&micro;&ETH;&acute;&ETH;&micro;&ETH;&frac12;&ETH;&frac12;&Ntilde; &ETH;&micro;&ETH;&raquo;&ETH;&micro;&ETH;&ordm;&Ntilde;&sbquo;&Ntilde;&euro;&ETH;&frac34;&ETH;&frac12;&ETH;&frac12;&ETH;&cedil;&Ntilde;&hellip; &ETH;&frac14;&ETH;&micro;&ETH;&acute;&ETH;&cedil;&Ntilde;&Dagger;&ETH;&frac12;&ETH;&cedil;&Ntilde;&hellip; &ETH;&middot;&ETH;&deg;&ETH;&iquest;&ETH;&cedil;&Ntilde;&Ntilde;&ndash;&ETH;&sup2; &ETH;&sup2; &ETH;&micro;&ETH;&raquo;&ETH;&micro;&ETH;&ordm;&Ntilde;&sbquo;&Ntilde;&euro;&ETH;&frac34;&ETH;&frac12;&ETH;&frac12;&Ntilde;&ndash;&ETH;&sup1; &Ntilde;&ETH;&cedil;&Ntilde;&Ntilde;&sbquo;&ETH;&micro;&ETH;&frac14;&Ntilde;&ndash; &ETH;&frac34;&Ntilde;&hellip;&ETH;&frac34;&Ntilde;&euro;&ETH;&frac34;&ETH;&frac12;&ETH;&cedil; &ETH;&middot;&ETH;&acute;&ETH;&frac34;&Ntilde;&euro;&ETH;&frac34;&ETH;&sup2;&#8217;&Ntilde;, &ETH;&deg; &Ntilde;&sbquo;&ETH;&deg;&ETH;&ordm;&ETH;&frac34;&ETH;&para; &ETH;&sup2;&ETH;&iquest;&ETH;&raquo;&ETH;&cedil;&ETH;&sup2;&Ntilde;&fnof; &ETH;&iquest;&Ntilde;&euro;&ETH;&deg;&ETH;&sup2;&ETH;&cedil;&acirc;&euro; (Clarification on the correctness of electronic medical records in the electronic health care system, as well as the impact of law) and sent out in .zip format. As indicated by the name, it&acirc;&euro;&trade;s targeted the Ukrainian medical system, the same target in Lorec53 previous attacks.<\/p>\n\n\n\n<p>The malicious shortcut file in the compressed package is a typical Lorec53 phishing lure, used to download and run the Trojan program located at http[:]\/\/ eumr [.]site\/up74987340.exe, which is the LorecDocStealer (OutSteel) Trojan.<\/p>\n\n\n\n<p>The latest modified date of this decoy shows on January 31, 2022.<\/p>\n\n\n\n<p>Domain names and C2 server addresses appeared in this attack can be associated with a large number of other malicious programs, all of which are different forms of packages of the LorecDocStealer (OutSteel) Trojan.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>The attacks spotted this time are all part of a large-scale cyberattack campaign carried out by the Lorec53 group between the end of 2021 and February 2022 against Ukrainian government departments, the military, and state-owned enterprises. The main purpose of these attacks are still probing and collecting information, with distinctive TTPs of the Lorec53 groups at each stage.<\/p>\n\n\n\n<p>The phishing lures captured this time show that the Lorec53 group has indeed inherited the group&#8217;s mercenary hacking characteristics when operating a national-level cyber attack campaign. The Lorec53 group will batch-produce and regularly adjust the content of the phishing bait, with flexible download server addresses and C2 addresses, to indiscriminately harass and attack the exposed mailboxes of critical facilities of Ukraine. This large-scale attack idea is similar to Lorec53&#8217;s early operation idea as an email botnet operator. As the situation in Eastern Europe has changed, the activities of cyber espionage against Ukraine have increased significantly recently. NSFOCUS Security Labs will continue to pay attention to the Lorec53 group and its attack activities.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Overview Recently, NSFOCUS Security Labs captured a large number of phishing files against Ukraine in format of pdf, doc, cpl, lnk and other types. After analysis, we confirmed that the series of phishing activities came from the APT group Lorec53. During the period from the end of 2021 to February 2022, this group used multiple [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":19142,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,15],"tags":[93,500],"class_list":["post-19125","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-research-reports","tag-apt","tag-lorec53"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>APT Lorec53 group launched a series of cyber attacks against Ukraine - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"APT Lorec53 group launched a series of cyber attacks against Ukraine - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview Recently, NSFOCUS Security Labs captured a large number of phishing files against Ukraine in format of pdf, doc, cpl, lnk and other types. After\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-21T04:37:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/lorec53-logo-e1645418243289.png\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"APT Lorec53 group launched a series of cyber attacks against Ukraine - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview Recently, NSFOCUS Security Labs captured a large number of phishing files against Ukraine in format of pdf, doc, cpl, lnk and other types. After\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/lorec53-logo-e1645418243289.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"APT Lorec53 group launched a series of cyber attacks against Ukraine\",\"datePublished\":\"2022-02-21T04:37:48+00:00\",\"dateModified\":\"2026-04-17T18:07:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\\\/\"},\"wordCount\":3286,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/lorec53-logo-e1645418243289.png\",\"keywords\":[\"APT\",\"lorec53\"],\"articleSection\":[\"Blog\",\"Research &amp; Reports\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\\\/\",\"name\":\"APT Lorec53 group launched a series of cyber attacks against Ukraine - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/lorec53-logo-e1645418243289.png\",\"datePublished\":\"2022-02-21T04:37:48+00:00\",\"dateModified\":\"2026-04-17T18:07:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/lorec53-logo-e1645418243289.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/lorec53-logo-e1645418243289.png\",\"width\":375,\"height\":160,\"caption\":\"Text \\\"LOREC53\\\" on geometric dark background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"APT Lorec53 group launched a series of cyber attacks against Ukraine\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"APT Lorec53 group launched a series of cyber attacks against Ukraine - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"APT Lorec53 group launched a series of cyber attacks against Ukraine - NSFOCUS","og_description":"Overview Recently, NSFOCUS Security Labs captured a large number of phishing files against Ukraine in format of pdf, doc, cpl, lnk and other types. After","og_url":"https:\/\/nsfocusglobal.com\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\/","og_site_name":"NSFOCUS","article_published_time":"2022-02-21T04:37:48+00:00","article_modified_time":"2026-04-17T18:07:45+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/lorec53-logo-e1645418243289.png","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"APT Lorec53 group launched a series of cyber attacks against Ukraine - NSFOCUS","twitter_description":"Overview Recently, NSFOCUS Security Labs captured a large number of phishing files against Ukraine in format of pdf, doc, cpl, lnk and other types. After","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/lorec53-logo-e1645418243289.png","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"11 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"APT Lorec53 group launched a series of cyber attacks against Ukraine","datePublished":"2022-02-21T04:37:48+00:00","dateModified":"2026-04-17T18:07:45+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\/"},"wordCount":3286,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/lorec53-logo-e1645418243289.png","keywords":["APT","lorec53"],"articleSection":["Blog","Research &amp; Reports"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\/","url":"https:\/\/nsfocusglobal.com\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\/","name":"APT Lorec53 group launched a series of cyber attacks against Ukraine - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/lorec53-logo-e1645418243289.png","datePublished":"2022-02-21T04:37:48+00:00","dateModified":"2026-04-17T18:07:45+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/lorec53-logo-e1645418243289.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2022\/02\/lorec53-logo-e1645418243289.png","width":375,"height":160,"caption":"Text \"LOREC53\" on geometric dark background."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/apt-lorec53-group-launched-a-series-of-cyber-attacks-against-ukraine\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"APT Lorec53 group launched a series of cyber attacks against Ukraine"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/19125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=19125"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/19125\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/19142"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=19125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=19125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=19125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}