Suspected Russian hackers deploy CANFAIL malware against Ukraine
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。 文章标题提到俄罗斯黑客使用CANFAIL恶意软件攻击乌克兰。接着,作者Pierluigi Paganini在2026年2月14日发布。内容讲的是一个与俄罗斯有关的APT组织,针对乌克兰的国防、政府和能源部门使用CANFAIL恶意软件。 Google Threat Intelligence Group发现了这个威胁行为者,他们通过钓鱼活动传播恶意软件。攻击目标包括国防、军事、政府和能源机构,甚至扩展到罗马尼亚和摩尔多瓦。虽然这个组织的技术不如其他俄罗斯团体先进,但他们开始使用LLM(大语言模型)来生成钓鱼邮件和进行侦察。 恶意软件通过Google Drive链接分发,伪装成.pdf.js文件。运行后会显示假错误弹窗,并下载第二阶段的payload。此外,文章还提到了其他APT组织的活动,但用户可能只需要主要信息。 现在我需要把这些要点浓缩到100字以内。重点包括:俄罗斯黑客、CANFAIL恶意软件、针对乌克兰的关键部门、钓鱼攻击、使用LLM生成邮件、伪装文件和弹窗机制。 最后,确保语言简洁明了,不使用任何开头词如“这篇文章”或“内容总结”。 </think> 俄罗斯黑客涉嫌利用CANFAIL恶意软件针对乌克兰的国防、政府和能源部门发起网络攻击。Google Threat Intelligence Group发现该威胁行为者可能与俄罗斯情报机构有关,并通过钓鱼活动传播恶意软件。尽管技术相对落后,该组织开始利用大语言模型生成钓鱼邮件并进行侦察活动。 2026-2-14 11:5:33 Author: securityaffairs.com(查看原文) 阅读量:0 收藏

Suspected Russian hackers deploy CANFAIL malware against Ukraine

Pierluigi Paganini February 14, 2026

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL malware.

Google Threat Intelligence Group identified a previously undocumented threat actor behind attacks on Ukrainian organizations using CANFAIL malware. The group is possibly linked to Russian intelligence services and has targeted defense, military, government, and energy entities at both regional and national levels in Ukraine.

GTIG researchers observed the Russian intelligence conducting phishing campaigns to deliver CANFAIL malware. The actor is also interested in aerospace, drone-linked manufacturers, nuclear research, and humanitarian groups tied to Ukraine. Google reported that the APT group has also probed Romanian and Moldovan entities.

“GTIG has recently discovered a threat group suspected to be linked to Russian intelligence services which conducts phishing operations to deliver CANFAIL malware primarily against Ukrainian organizations.” reads the report published by Google. “Despite being less sophisticated and resourced than other Russian threat groups, this actor recently began to overcome some technical limitations using LLMs. Through prompting, they conduct reconnaissance, create lures for social engineering, and seek answers to basic technical questions for post-compromise activity and C2 infrastructure setup.  “

Though less advanced than other Russian groups, it uses LLMs to craft lures, perform reconnaissance, and solve technical tasks. The threat actors wrote the phishing emails with LLM.

Messages include Google Drive links hosting a RAR archive with CANFAIL malware, often disguised with a double extension like .pdf.js. CANFAIL is obfuscated JavaScript that runs a PowerShell script to download and execute a second-stage payload, typically a memory-only dropper, while showing a fake error popup to the victim.

“Phishing emails sent by the actor contain a lure that based on analysis appears to be LLM-generated, uses formal language and a specific official template, and Google Drive links which host a RAR archive containing CANFAIL malware, often disguised with a .pdf.js double extension.” continues the report. “CANFAIL is obfuscated JavaScript which executes a PowerShell script to download and execute an additional stage, most commonly a memory-only PowerShell dropper. It additionally displays a fake “error” popup to the victim.”

SentinelLABS and the Digital Security Lab of Ukraine documented related activity in the October 2025 “PhantomCaptcha” campaign, which briefly used ClickFix tactics.

Russian espionage groups continue targeting Ukrainian and Western defense-related organizations using military- and drone-themed lures. Below are some groups observed by Google Threat Intelligence Group:

  • APT44 (Sandworm/FROZENBARENTS), linked to GRU Unit 74455, has sought to extract data from Signal and Telegram, using tools like WAVESIGN and INFAMOUSCHISEL to steal information from Windows and Android devices.
  • TEMP.Vermin, tied to LPR-linked actors, deployed malware such as VERMONSTER and SPECTRUM using aerospace and drone-themed domains.
  • UNC5125 targeted frontline drone units with Google Forms lures and malware like MESSYFORK and GREYBATTLE.
  • UNC5792 and UNC4221 abused Signal and WhatsApp features with fake group invites and phishing pages to hijack accounts and deploy malware including STALECOOKIE and TINYWHALE.
  • UNC5976 ran phishing campaigns with malicious RDP files and drone-themed decoys spoofing global defense firms.
  • UNC6096 used WhatsApp to deliver Windows and Android malware, including GALLGRAB.
  • UNC5114 spread CraxsRAT disguised as a Kropyva app update.

“Russia’s use of cyber operations in support of military objectives in the war against Ukraine and beyond is multifaceted. On a tactical level, targeting has broadened to include individuals in addition to organizations in order to support frontline operations and beyond, likely due at least in part to the reliance on public and off-the-shelf technology rather than custom products.” concludes the report. “Russian threat actors have targeted secure messaging applications used by the Ukrainian military to communicate and orchestrate military operations, including via attempts to exfiltrate locally stored databases of these apps, such as from mobile devices captured during Russia’s ongoing invasion of Ukraine. “

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, CANFAIL malware)




文章来源: https://securityaffairs.com/187976/hacking/suspected-russian-hackers-deploy-canfail-malware-against-ukraine.html
如有侵权请联系:admin#unsafe.sh