ctipilot.ch

FrostyNeighbor/Ghostwriter/UNC1151 March-May 2026 campaign: Poland, Lithuania, Ukraine

campaign · frostyneighbor-2026-05-campaign

Coverage timeline
1
first 2026-05-15 → last 2026-05-15
Briefs
1
1 distinct
Sources cited
7
3 hosts
Sections touched
1
active_threats
Co-occurring entities
1
see Related entities below

Story timeline

  1. 2026-05-15CTI Daily Brief — 2026-05-15
    active_threatsFirst coverage. ESET WeLiveSecurity report. Spear-phishing PDFs → PicassoLoader JS downloader → victim vetting → Cobalt Strike. Server-side geofencing.

Where this entity is cited

  • active_threats1

Source distribution

  • attack.mitre.org5 (71%)
  • thehackernews.com1 (14%)
  • welivesecurity.com1 (14%)

Related entities

Items in briefs about FrostyNeighbor/Ghostwriter/UNC1151 March-May 2026 campaign: Poland, Lithuania, Ukraine (1)

FrostyNeighbor / Ghostwriter (UNC1151, Belarus state-aligned): ESET documents March–May 2026 campaign targeting Polish, Lithuanian, and Ukrainian government and industrial sectors

From CTI Daily Brief — 2026-05-15 · published 2026-05-15 · view item permalink →

ESET published a new technical report on 2026-05-14 documenting fresh operational activity from FrostyNeighbor — a cluster ESET and Mandiant track as Ghostwriter / UNC1151 / UAC-0057, assessed as apparently Belarus state-aligned — against Polish, Lithuanian, and Ukrainian government and industrial organisations across a March–May 2026 wave (ESET WeLiveSecurity, 2026-05-14). The Ukraine strand distributes RAR archives via spear-phishing PDFs impersonating Ukrtelecom; the archives drop a JavaScript downloader (a PicassoLoader variant) that fingerprints the victim environment (username, process list, OS version) and beacons every 10 minutes to operator infrastructure. A server-side geofencing check delivers a benign decoy to IPs outside Ukraine, making emulation from a non-Ukrainian network appear clean. Polish and Lithuanian targeting covers industrial/manufacturing, healthcare and pharmaceuticals, logistics, and government organisations — ESET documents victimology spanning both NATO member states in the same campaign wave. Once operators manually approve a victim, a Cobalt Strike Beacon payload is staged, indicating deliberate victim-vetting prior to full post-compromise operations. MITRE ATT&CK: T1566.001 (Spearphishing Attachment), T1027 (Obfuscated Files), T1059.007 (JavaScript), T1082 (System Information Discovery — victim-vetting step), T1105 (Ingress Tool Transfer — Cobalt Strike staging). Detection: alert on JavaScript execution from browser/document-viewer parent-process trees, followed by 10-minute periodic outbound HTTP(S) beacons to a new destination; test detections with Ukrainian-egress routing to bypass the geofencing blind spot.