Disruptive Attacks in Ukraine Likely Linked to Escalating Tensions
The threat actors attempted to misdirect attribution using inauthentic metadata and used publicly available crimeware services and code to minimize the amount of custom code involved in the attack.