CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 15, 2026

Hackers Abuse Scheduled Tasks to Maintain Persistence in FrostyNeighbor Attacks

Cybersecurity News Archived May 15, 2026 ✓ Full text saved

A state-aligned hacking group known as FrostyNeighbor has resurfaced with a fresh wave of cyberattacks targeting government organizations in Ukraine, using a carefully designed infection chain that is harder than ever to detect. The group, active since at least 2016, has a long history of targeting countries neighboring Belarus, and its latest campaign shows just […] The post Hackers Abuse Scheduled Tasks to Maintain Persistence in FrostyNeighbor Attacks appeared first on Cyber Security News .

Full text archived locally
✦ AI Summary · Claude Sonnet


    HomeCyber Security News Hackers Abuse Scheduled Tasks to Maintain Persistence in FrostyNeighbor Attacks By Tushar Subhra Dutta May 15, 2026 A state-aligned hacking group known as FrostyNeighbor has resurfaced with a fresh wave of cyberattacks targeting government organizations in Ukraine, using a carefully designed infection chain that is harder than ever to detect. The group, active since at least 2016, has a long history of targeting countries neighboring Belarus, and its latest campaign shows just how far it has evolved. The new activity, detected starting in March 2026, blends deceptive documents, layered malware scripts, and server-side victim filtering into a single coordinated operation. The attacks begin with spearphishing emails carrying malicious PDF files designed to look like legitimate government communications. One lure document impersonated Ukrtelecom, a Ukrainian telecommunications company, and appeared to offer assurances about customer data protection. When a recipient clicks the download button inside the PDF, they are directed to a server fully controlled by the attackers. What they receive next depends entirely on where they are connecting from. ESET’s official threat research blog, WeLiveSecurity’s analysts identified and said in a report shared with Cyber Security News (CSN) that FrostyNeighbor, also tracked as Ghostwriter, UNC1151, TA445, PUSHCHA, and Storm-0257, is a long-running cyber espionage actor apparently aligned with the interests of Belarus. ESET researchers noted that the group regularly updates its tools and methods specifically to avoid triggering security alerts. FrostyNeighbor’s campaigns have historically focused on Ukraine, Poland, and Lithuania, with victims ranging from government and military bodies to industrial firms and healthcare organizations. Compromise chain overview (Source – Welivesecurity) In its newest campaign, the group demonstrates both patience and precision, delivering the final payload only after manually confirming that a target is worth pursuing. This selective approach makes the operation especially difficult to detect or replicate in a controlled environment. The group has been under active surveillance for years, with past reports from CERT-UA, SentinelOne, HarfangLab, and StrikeReady all documenting its evolving tactics. The latest findings reveal a newer delivery mechanism using JavaScript to stage the attack across multiple steps, pulling in tools cleverly disguised as ordinary image or web files. Hackers Abuse Scheduled Tasks Once a victim from Ukraine clicks the embedded link in the lure document, the attacker’s server delivers a RAR archive named 53_7.03.2026_R.rar. Inside is a JavaScript file that drops a decoy PDF to keep the target occupied while quietly launching the next stage in the background. This second-stage script, called PicassoLoader, is a downloader the group has used across multiple campaigns and in several different programming languages. To lock in its presence on the victim’s machine, PicassoLoader downloads a scheduled task template from the command-and-control server, disguised as a JPEG image file. The server actually delivers an XML configuration file, and the script fills in real execution parameters before registering the scheduled task on the system. Scheduled task template downloaded from the C&C server (Source – Welivesecurity) This ensures PicassoLoader runs automatically at every Windows startup, which is exactly how FrostyNeighbor maintains persistent access on compromised machines. Cobalt Strike Deployed After Victim Validation What makes this attack chain particularly sharp is the server-side validation step that occurs before any serious payload is delivered. Every ten minutes, PicassoLoader sends a system fingerprint, including the username, computer name, operating system version, and list of running processes, to the command-and-control server. A human operator then reviews this information and decides whether the target is worth the next move. If the victim qualifies, the server responds with a third-stage JavaScript dropper. This script copies the legitimate Windows file rundll32.exe under a different name, likely to bypass security tools that flag unfamiliar executables. A Cobalt Strike beacon is then written to disk, and a registry entry ensures it launches automatically on every startup, giving the attackers full and persistent remote control over the compromised machine. Security researchers recommend continuous and close monitoring of the group’s infrastructure, toolset changes, and operational patterns as the most effective defense against future campaigns. Organizations across Eastern Europe, especially those in government, defense, and critical sectors, should treat any unsolicited PDF attachment as a potential threat and remain on high alert. Indicators of Compromise (IoCs):- Type Indicator Description SHA-1 776A43E46C36A539C916ED426745EE96E2392B39 53_7.03.2026_R.rar — JS/TrojanDropper.FrostyNeighbor SHA-1 8D1F2A6DF51C7783F2EAF1A0FC0FF8D032E5B57F 53_7.03.2026_R.js — JS/TrojanDropper.FrostyNeighbor SHA-1 B65551D339AECE718EA1465BF3542C794C445EFC Update.js — JS/TrojanDownloader.FrostyNeighbor SHA-1 E15ABEE1CFDE8BE7D87C7C0B510450BAD6BC0906 Update.js — JS/TrojanDropper.FrostyNeighbor SHA-1 43E30BE82D82B24A6496F6943ECB6877E83F88AB ViberPC.dll — Win32/CobaltStrike.Beacon SHA-1 4F2C1856325372B9B7769D00141DBC1A23BDDD14 53_7.03.2026_R.pdf — PDF/TrojanDownloader.FrostyNeighbor SHA-1 D89E5524E49199B1C3B66C524E7A63C3F0A0C199 Certificate.pdf — PDF/TrojanDownloader.FrostyNeighbor SHA-1 7E537D8E91668580A482BD77A5A4CABA26D6BDAC certificate.js — JS/TrojanDownloader.FrostyNeighbor SHA-1 FA6882672AD3654800987613310D7C3FBADE027E certificate.js — JS/TrojanDownloader.FrostyNeighbor SHA-1 3FA7D1B13542F1A9EB054111F9B69C250AF68643 СетифікатCAF.rar — JS/TrojanDropper.FrostyNeighbor SHA-1 4E52C92709A918383E90534052AAA257ACE2780C СетифікатCAF.js — JS/TrojanDropper.FrostyNeighbor SHA-1 6FDED427A16D5314BA3E1EB9AFD120DC84449769 EdgeTaskMachine.js — JS/TrojanDropper.FrostyNeighbor SHA-1 27FA11F6A1D653779974B6FB54DE4AF47F211232 EdgeSystemConfig.dll — Win32/CobaltStrike.Beacon Domain attachment-storage-asset-static.needbinding[.]icu C&C server — PicassoLoader delivery Domain book-happy.needbinding[.]icu C&C server — scheduled task template and fingerprint collection Domain nama-belakang.nebao[.]icu C&C server — Cobalt Strike beacon C&C Domain easiestnewsfromourpointofview.algsat[.]icu C&C infrastructure Domain mickeymousegamesdealer.al[.]icu C&C infrastructure Domain exavegas[.]icu C&C infrastructure Domain hinesafar.sardk[.]icu C&C infrastructure Domain shinesafar.sardk[.]icu C&C infrastructure Domain best-seller.lavanille[.]buzz C&C infrastructure URL https://book-happy.needbinding[.]icu/wp-content/uploads/2023/10/1GreenAM.jpg Scheduled task template delivery URL URL https://book-happy.needbinding[.]icu/employment/documents-and-resources PicassoLoader fingerprint POST endpoint URL https://nama-belakang.nebao[.]icu/statistics/discover.txt Cobalt Strike beacon C&C endpoint Filename 53_7.03.2026_R.rar First-stage RAR archive lure Filename 53_7.03.2026_R.js First-stage JavaScript dropper Filename 53_7.03.2026_R.pdf Decoy PDF lure document Filename Update.js PicassoLoader second-stage downloader Filename WinUpdate.reg Registry file dropped by first-stage script Filename ViberPC.exe Renamed copy of rundll32.exe Filename ViberPC.dll Cobalt Strike beacon payload Filename ViberPC.reg Registry file for Cobalt Strike persistence Filename ViberPC.lnk Shortcut file for Cobalt Strike execution Filename EdgeTaskMachine.js Additional FrostyNeighbor dropper Filename EdgeSystemConfig.dll Additional Cobalt Strike beacon Note: IP addresses and domains are intentionally defanged (e.g., [.]) to prevent accidental resolution or hyperlinking. Re-fang only within controlled threat intelligence platforms such as MISP, VirusTotal, or your SIEM. Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google. Tags cyber security cyber security news Copy URL Linkedin Twitter ReddIt Telegram Tushar Subhra Dutta Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics. Trending News Magecart Hackers Abuse Google Tag Manager to Inject Credit Card Skimmers Open WebUI Vulnerability via File Upload Leads to 1-Click RCE Attack Threat Actors Leverage Vercel’s AI Tools to Mass‑Produce Realistic Phishing Sites Fragnesia Linux Vulnerability Let Attackers Gain Root Privileges – PoC Released New BitUnlocker Downgrade Attack on Windows 11 Allows Access to Encrypted Disks in 5 Minutes Latest News Cyber Security News Critical Microsoft Exchange Server Vulnerability Actively Exploited in Attacks Cyber Security News Critical Next.js Vulnerability Exposes Cloud Credentials, API keys, and Admin Panels Cyber Security News OpenAI Confirms Security Breach Via TanStack npm Supply Chain Attack Cyber Security Cisco Catalyst SD-WAN Controller 0-Day Actively Exploited to Gain Admin Access Cyber Security News Sandworm Hackers Pivot From Compromised IT Systems Toward Critical OT Assets
    💬 Team Notes
    Article Info
    Source
    Cybersecurity News
    Category
    ◇ Industry News & Leadership
    Published
    May 15, 2026
    Archived
    May 15, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗