Home Cybersecurity Ghostwriter Phishing Campaign Uses Prometheus Malware Against Ukraine Government
Cybersecurity

Ghostwriter Phishing Campaign Uses Prometheus Malware Against Ukraine Government

Ghostwriter Phishing Campaign Uses Prometheus Malware Against Ukraine Government

Campaign Targets Ukrainian Government Networks

Cybersecurity researchers have identified a new phishing campaign linked to the threat group known as Ghostwriter, which is targeting government entities in Ukraine with a malware strain called Prometheus. The campaign was first detected in early May 2026 and has compromised at least one ministry-level network as of May 22, according to a report published Friday by the Cyber Threat Intelligence team at Mandiant.

The attackers, also tracked as UNC1151, are sending emails that impersonate Ukrainian military officials. The messages contain password-protected archive files that, when opened, deploy Prometheusβ€”a remote access trojan that allows the attackers to steal credentials, map internal networks, and exfiltrate documents. Mandiant analysts state that the campaign appears focused on the Ministry of Defense and several regional administrative offices.

Prometheus Malware Details

Prometheus is a .NET-based backdoor that has been in active development since at least 2024. It communicates over encrypted channels to command-and-control servers and can execute arbitrary commands, log keystrokes, and capture screenshots. In this campaign, the malware is delivered as a DLL file hidden inside a ZIP archive that requires a password disclosed in the email bodyβ€”a tactic intended to bypass email security scanners.

Once inside a network, Prometheus attempts to spread to adjacent systems using stolen credentials. Mandiant researchers observed the malware querying Active Directory servers to identify high-value accounts. The ultimate goal, according to the report, is persistent access to classified communications and operational planning documents.

Ghostwriter’s History

Ghostwriter has been active since at least 2016 and has historically targeted military and political organizations in Eastern Europe. The group is widely attributed to Belarusian state interests, though it also operates in support of Russian strategic objectives. Previous campaigns involved defacing news websites, spreading disinformation about NATO exercises, and stealing credentials from Ukrainian energy companies.

This latest campaign aligns with a broader pattern of cyber espionage campaigns that quietly compromise critical infrastructure and government systems to steal sensitive operational data. The Prometheus toolset marks an escalation in technical capability for Ghostwriter, which previously relied heavily on publicly available phishing kits.

Response and Attribution

The Security Service of Ukraine (SBU) confirmed it is investigating the incidents and has advised all government agencies to rotate credentials and enable multi-factor authentication. Mandiant’s report includes technical indicators of compromise, including IP addresses and file hashes, which have been shared with Ukrainian CERT-UA.

No official attribution has been issued by the Ukrainian government, but Mandiant assesses with moderate confidence that Ghostwriter operates under the direction of the Belarusian Main Intelligence Directorate (GRU). The assessment is based on infrastructure overlaps and TTPs observed in previous operations. Researchers noted that the phishing emails used Ukrainian-language templates sourced from leaked government documents, suggesting detailed preparation.

Implications for Regional Security

This campaign comes amid heightened tensions in the region and follows a series of cyber attacks linked to the ongoing conflict. The targeting of government networks for espionage rather than disruption suggests the attackers are seeking intelligence advantage rather than simply causing chaos. Mandiant warned that the Prometheus backdoor could be retooled for attacks against neighboring countries, including Poland and the Baltic states.

Organizations in the defense and energy sectors across Europe are advised to review their email security policies and monitor for suspicious archive files. The full technical report is available on Mandiant’s website, and Ukrainian government agencies are expected to issue updated security directives in the coming weeks.

Frequently Asked Questions

How does the Ghostwriter phishing campaign deliver Prometheus malware?

The Ghostwriter campaign delivers Prometheus malware through spear-phishing emails that contain malicious attachments or links. When the target clicks, the malware is downloaded and executed, often disguised as legitimate government documents to evade security filters.

What is Prometheus malware used for in cyber attacks?

Prometheus malware is a remote access trojan (RAT) used for espionage, data theft, and system surveillance. In the Ghostwriter campaign targeting Ukraine government, it enables attackers to steal credentials, monitor communications, and deploy additional payloads.

Why is the Ghostwriter campaign targeting Ukraine government specifically?

Ghostwriter is a threat actor linked to Belarus, often conducting influence operations and cyber espionage against Ukraine. Targeting Ukraine government networks allows the campaign to gather sensitive intelligence and disrupt national security operations.

Which tools are used to detect Prometheus malware in phishing emails?

Endpoint detection and response (EDR) systems, email sandboxing, and threat intelligence feeds can detect Prometheus malware in phishing emails. Regular signature updates and user training on identifying suspicious attachments are also essential to block the Ghostwriter campaign.

How does Prometheus malware compare to other remote access trojans?

Prometheus malware is less widespread than RATs like Remcos or Agent Tesla but offers similar keylogging and screen capture capabilities. It stands out for its use in targeted government campaigns like Ghostwriter, often paired with sophisticated phishing lures tailored to Ukraine government targets.
Avatar Of Asad Ijaz

Asad Ijaz

NetworkUstad Contributor

πŸ“¬

Enjoyed this article?

Subscribe to get more networking & cybersecurity content delivered daily β€” curated by AI, written for IT professionals.

Related Articles