Ransomware Attack Disrupts Operations at Lucknow Advertising Firm

The GIFTEDCROOK malware has undergone significant upgrades, transforming from a basic browser data stealer into a sophisticated intelligence-gathering tool. Recent campaigns in June 2025 have showcased its enhanced ability to exfiltrate sensitive documents, including proprietary files and browser secrets, particularly targeting Ukrainian governmental and military entities, according to a report by Arctic Wolf Labs.


Initially documented by Ukraine's Computer Emergency Response Team (CERT-UA) in April 2025, GIFTEDCROOK is linked to the hacking group UAC-0226. The malware is deployed through phishing emails containing macro-laden Microsoft Excel documents, which act as a gateway for infection.
Originally an information stealer, GIFTEDCROOK now harvests documents and files under 7 MB, specifically targeting those created or modified within the last 45 days. It searches for various file types, including .doc, .pdf, .xls, and .zip, among others.
The phishing campaigns utilize military-themed PDF lures to entice users into clicking links that lead to a macro-enabled Excel workbook. Once macros are enabled, GIFTEDCROOK is downloaded. The stolen information is then compressed into ZIP archives and sent to an attacker-controlled Telegram channel, cleverly avoiding detection by breaking larger files into smaller parts.


This evolution of GIFTEDCROOK signifies a shift towards targeted cyber espionage, posing significant risks to individuals in public sector roles and the networks they operate within. Arctic Wolf notes that the malware's development aligns with geopolitical events, particularly the ongoing negotiations between Ukraine and Russia, highlighting its role in enhancing data collection from compromised systems.
- Other (43)
- Ransomware (154)
- Events and News (27)
- Features (45)
- Security (485)
- Tips (79)
- Google (28)
- Achievements (11)
- Products (35)
- Activation (7)
- Dealers (1)
- Bank Phishing (50)
- Malware Alerts (230)
- Cyber Attack (297)
- Data Backup (13)
- Data Breach (125)
- Phishing (165)
- Securty Tips (2)
- Browser Hijack (19)
- Adware (15)
- Email And Password (71)
- Android Security (77)
- Knoweldgebase (38)
- Botnet (17)
- Updates (4)
- Alert (71)
- Hacking (70)
- Social Media (8)
- vulnerability (72)
- Hacker (38)
- Spyware (12)
- Windows (8)
- Microsoft (25)
- Uber (1)
- YouTube (1)
- Trojan (4)
- Website hacks (10)
- Paytm (1)
- Credit card scam (2)
- Telegram (3)
- RAT (8)
- Bug (3)
- Twitter (2)
- Facebook (8)
- Banking Trojan (9)
- Mozilla (2)
- COVID-19 (5)
- Instagram (3)
- NPAV Announcement (9)
- IoT Security (2)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- WhatsApp (5)
- Amazon (2)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (3)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (39)
- Impersonation phishing (1)
- DDoS (7)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
- Fraud Protector (27)