Categories: Cyber Security News

Threat Actors Targeting Ukraine’s Defense Forces with Charity-Themed Malware Campaign

Threat actors have launched a sophisticated malware campaign against members of Ukraine’s Defense Forces, exploiting charity operations as a cover for their attacks.

Operating between October and December 2025, the attackers distributed PLUGGYAPE, a Python-based backdoor designed to compromise military personnel.

The campaign demonstrates how cybercriminals increasingly leverage social engineering combined with legitimate-sounding charitable narratives to penetrate highly secured defense networks.

The initial infection chain relies on convincing targets to visit fake charity foundation websites through messages sent via instant messengers.

Once victims land on these fraudulent pages, they are prompted to download what appear to be legitimate documents.

However, these files are actually executable programs, often disguised with double extensions such as .docx.pif or .pdf.exe and placed within password-protected archives to bypass detection systems.

This approach proves effective because the visual presentation mimics authentic documents that military personnel would routinely handle.

CERT-UA analysts identified the malware after careful investigation of the campaign’s technical characteristics.

Researchers noted that the threat group, tracked as UAC-0190 and known by the alias Void Blizzard, maintains medium confidence attribution.

The attackers demonstrate sophisticated understanding of their targets, using legitimate Ukrainian mobile operator accounts and phone numbers while communicating in Ukrainian through popular messaging applications.

Infection Mechanism and Command Infrastructure

The malware operates through a well-engineered persistence mechanism that ensures long-term access to compromised systems.

When executed, PLUGGYAPE generates a unique device identifier by collecting basic computer information including MAC address, BIOS serial number, disk ID, and processor ID.

This data is processed through SHA-256 encryption, with only the first sixteen bytes used as the device fingerprint. The backdoor then creates a registry entry in the Windows Run branch, guaranteeing automatic execution whenever the infected system restarts.

This persistence technique represents a fundamental aspect of the malware’s design, as targets may be offline for extended periods and manual reactivation would prove impractical.

Communication with command servers occurs through web sockets or MQTT protocols, with all data transmitted in JSON format.

Early variants connected directly to hardcoded IP addresses embedded in the malware code, but operators later evolved their infrastructure to hide addresses on public paste services like Pastebin and Rentry, encoded in Base64 format.

By December 2025, an improved version designated PLUGGYAPE.V2 emerged, incorporating enhanced obfuscation layers and additional checks designed to detect virtual machine environments.

This upgrade demonstrates the attackers’ commitment to maintaining operational effectiveness against increasingly sophisticated defensive measures employed by Ukrainian cyber units.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post Threat Actors Targeting Ukraine’s Defense Forces with Charity-Themed Malware Campaign appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Planned Parenthood Forced to Slash Vital Reproductive Health Care to Pennsylvania Medicaid Patients

Nine months into the rollout of President Trump’s Big Beautiful Bill, Planned Parenthood Keystone says…

13 seconds ago

Planned Parenthood Forced to Slash Vital Reproductive Health Care to Pennsylvania Medicaid Patients

Nine months into the rollout of President Trump’s Big Beautiful Bill, Planned Parenthood Keystone says…

13 seconds ago

Xbox Game Pass April 2026 Wave 2 Lineup Announced

Microsoft has announced the games coming to Xbox Game Pass during the rest of April…

50 minutes ago

Elden Ring Movie Release Date and Full Cast Announced

The Elden Ring movie finally got an official update today, with the full cast announced…

50 minutes ago

ID@Xbox Presented by IGN April 2026 Showcase Announced: Here’s How to Watch and What to Expect

IGN is proud to partner once again with ID@Xbox for another exciting showcase on April…

51 minutes ago

A Look Back, April 20

50 Years Ago Since late February at least 38 dogs and two cats have been…

1 hour ago

This website uses cookies.