
Belarusian GhostWriter Expands Hybrid Warfare with Certificate Phishing Against Ukrainian Officials
State-linked Belarusian hackers refine phishing via fake certificates to spy on Ukrainian officials, exposing advanced hybrid tactics in the ongoing war.
The GhostWriter campaign, attributed to Belarusian intelligence and tracked as UNC1151, marks a tactical evolution in state-sponsored espionage by exploiting Ukraine's trusted Prometheus learning platform to deliver OysterFresh malware. This goes beyond simple credential theft seen in prior operations against Polish institutions and Ukrainian military personnel; the use of fake course certificates for public administration and drone engineering courses reveals a deliberate effort to infiltrate officials handling sensitive defense and governance data. Original coverage underplays how this aligns with documented patterns from 2022-2025, where Belarusian actors combined cyber intrusions with influence operations to sow distrust in Ukrainian systems. Synthesizing CERT-UA alerts with Mandiant's analysis of UNC1151 infrastructure and Recorded Future reports on Cobalt Strike abuse, the campaign's Cloudflare-hidden C2 and potential follow-on payloads suggest preparation for deeper network persistence amid stalled conventional fronts. What was missed is the strategic timing—targeting battlefield management users via Delta just days later indicates coordinated hybrid pressure to erode Ukraine's situational awareness edge, potentially foreshadowing escalation toward critical infrastructure nodes if Minsk seeks leverage in any frozen conflict scenario.
SENTINEL: Belarusian operations using civilian platforms like Prometheus will intensify to probe Ukrainian command networks, blending espionage with disruption to test NATO response thresholds in 2026.
Sources (3)
- [1]Primary Source(https://therecord.media/oysterfresh-belarus-linked-campaign-targets-ukraine)
- [2]Related Source(https://www.mandiant.com/resources/insights/unc1151-ghostwriter-belarus)
- [3]Related Source(https://www.recordedfuture.com/blog/ghostwriter-ukraine-targeting)