{ "@context": "https://schema.org", "@graph": [ { "@type": "BreadcrumbList", "itemListElement": [ { "@type": "ListItem", "position": 1, "name": "laptop data recovery", "item": "https://www.1300nerdcore.com.au/laptop-data-recovery" }, { "@type": "ListItem", "position": 2, "name": "nerdcore pc systems - New custom gaming computers", "item": "https://www.1300nerdcore.com.au/custom-pcs-build" }, { "@type": "ListItem", "position": 3, "name": "seagate data recovery prices ", "item": "https://www.1300nerdcore.com.au/data-recovery-prices" }, { "@type": "ListItem", "position": 4, "name": "western digital data recovery prices", "item": "https://www.1300nerdcore.com.au/new-computers-for-sale" }, { "@type": "ListItem", "position": 5, "name": "amd ryzen gaming computer repairs", "item": "https://www.1300nerdcore.com.au/microsoftserver" }, { "@type": "ListItem", "position": 6, "name": "computer virus removal", "item": "https://www.1300nerdcore.com.au/virus-spyware-removal" } ] } ] }
top of page

Ukraine's military targeted in a new charity-themed malware campaign

  • 2 days ago
  • 2 min read

Ukraine's military targeted in a new charity-themed malware campaign

Ukraine's army targeted in new charity-themed malware campaign
Ukraine's army targeted in new charity-themed malware campaign



Between October and December 2025, a charity-themed campaign targeted officials of Ukraine's Defense Forces, deploying backdoor malware known as PluggyApe.

According to a report by Ukraine's CERT, these attacks were probably initiated by the Russian threat group referred to as 'Void Blizzard' and 'Laundry Bear,' although the attribution is made with medium confidence.


Laundry Bear is the same group that breached the Dutch police's internal systems in 2024, stealing sensitive officer information.


This group is recognized for targeting NATO member states in attacks that align with Russian interests, aiming to steal files and emails.



CERT-UA observed that the attacks begin with instant messages sent via Signal or WhatsApp, instructing recipients to visit a website purportedly run by a charitable foundation and download a password-protected archive supposedly containing documents of interest.

Ukraine's military targeted in a new charity-themed malware campaign

Malicious message lures
Source: CERT-UA
Malicious message luresSource: CERT-UA

Rather, the archives include executable PIF files (.docx.pif) and PluggyApe payloads, which are occasionally sent directly via the messaging app.


PluggyApe is a backdoor that profiles the host, sends information to the attackers, including a unique victim identifier, and then waits for code execution commands. It achieves persistence via Windows Registry modification.
PluggyApe is a backdoor that profiles the host, sends information to the attackers, including a unique victim identifier, and then waits for code execution commands. It achieves persistence via Windows Registry modification.

Nonetheless, the harmful PIF file is an executable crafted using the PyInstaller open-source tool, which packages Python applications into a single bundle containing all necessary dependencies.


In previous PluggyApe attacks, the attackers utilized the ".pdf.exe" extension for the loader. However, beginning in December 2025, they transitioned to using PIF and PluggyApe version 2, which includes improved obfuscation, MQTT-based communication, and additional anti-analysis measures.

The Ukrainian agency also notes that PluggyApe retrieves its command-and-control (C2) addresses from external sources like rentry.co and pastebin.com, where they are shared in base64-encoded form, instead of relying on less-flexible hardcoded entries.


Malware's code
Source: CERT-UA
Malware's codeSource: CERT-UA

CERT-UA cautions that mobile devices have become key targets in such attacks, as they are typically poorly secured and monitored.



When combined with thorough attack planning, such as utilizing compromised accounts or phone numbers from Ukrainian telecom operators, the attacks can appear highly convincing.

"The initial interaction with a cyberattack target is increasingly conducted using legitimate accounts, phone numbers of Ukrainian mobile operators, and the Ukrainian language, including audio and video communication," explains CERT-UA.



"The attacker might display detailed and relevant knowledge about the individual, the organization, and the specifics of its operations."



A comprehensive list of indicators of compromise (IoCs), including fraudulent websites masquerading as charity portals, is available at the end of CERT-UA's report.



Ask your question

  • Write an answer

  • Write an answer

Nebula Series Gaming PC 78003d Win 11 32gb mem -2tb ssd
A$3,300.00
Buy Now

 
 
 

Comments


bottom of page