Between October and December 2025, Ukraine’s Defense Forces were hit by a malware campaign disguised as charity outreach, delivering a backdoor called PluggyApe.
Key Findings
- Threat actors: Likely linked to Russian group Void Blizzard (aka Laundry Bear), though attribution confidence is medium.
- Past activity: Laundry Bear previously breached Dutch police systems in 2024, stealing sensitive officer data.
- Target focus: NATO member states, with operations aligned to Russian strategic interests.
Attack Chain
- Initial lure:
- Messages sent via Signal or WhatsApp.
- Claimed to be from charitable foundations, urging recipients to download password-protected archives.
- Payload delivery:
- Archives contained malicious PIF files (
.docx.pif) created with PyInstaller. - Sometimes payloads were sent directly through messaging apps.
- Archives contained malicious PIF files (
- PluggyApe backdoor:
- Profiles host system and sends victim identifier to attackers.
- Waits for remote code execution commands.
- Achieves persistence via Windows Registry modification.
Evolution of PluggyApe
- Earlier versions: Used
.pdf.exeloaders. - December 2025 update (PluggyApe v2):
- Better obfuscation.
- MQTT-based communication for stealthy C2.
- Enhanced anti-analysis checks.
- C2 infrastructure: Fetches addresses dynamically from rentry.co and pastebin.com (base64-encoded), avoiding hardcoded entries.
Mobile Device Targeting
- CERT-UA warns mobile devices are increasingly targeted:
- Poorly protected and monitored compared to desktops.
- Attackers use compromised accounts and Ukrainian telecom numbers to appear legitimate.
- Messages often delivered in Ukrainian language, audio, or video, with detailed knowledge of targets to boost credibility.
Defensive Recommendations
- Awareness training: Educate personnel about charity-themed lures and suspicious file extensions (
.pif,.exe). - Endpoint monitoring: Detect PyInstaller-based executables and registry persistence attempts.
- Mobile security: Strengthen monitoring and endpoint protection for smartphones.
- Threat intel sharing: Leverage IoCs provided by CERT-UA to block malicious domains and infrastructure.
Takeaway
This campaign highlights the weaponization of humanitarian themes to deliver malware against Ukraine’s military. PluggyApe’s evolution—dynamic C2 fetching, MQTT communication, and anti-analysis features—shows a sophisticated, persistent threat designed to evade defenses and exploit trust in charitable causes.
Leave a Reply