Russian hackers deploy new malware in phishing campaign targeting Ukraine
嗯,用户让我总结一下这篇文章的内容,控制在100字以内。首先,我需要快速浏览文章,抓住主要信息。 文章讲的是研究人员发现了一个针对乌克兰的网络间谍活动,使用了两种新的恶意软件。攻击过程是通过钓鱼邮件,附件是一个ZIP文件,里面有一个看起来像乌克兰边境通行证的恶意文档。打开后会下载BadPaw加载器,然后安装MeowMeow后门程序。这个后门可以让攻击者访问系统和操作文件。这两种恶意软件都有逃避检测的机制。 研究人员将这次活动归咎于俄罗斯支持的威胁行为者,可能与APT28有关。钓鱼邮件使用了乌克兰常用的邮箱服务ukr.net,之前也用于类似的活动。文章还提到乌克兰CERT-UA报告了另一起针对政府机构的攻击。 现在我需要把这些信息浓缩到100字以内,不使用“文章内容总结”之类的开头。要包括间谍活动、目标国家、恶意软件名称、攻击方式、后门功能以及可能的幕后黑手。 可能会这样组织:研究人员发现一起针对乌克兰的网络间谍活动,使用两种新型恶意软件BadPaw和MeowMeow。通过钓鱼邮件传播,文档伪装成边境通行证。MeowMeow具备文件操作和检测规避功能。研究人员怀疑是俄罗斯支持的行为者所为。 </think> 研究人员发现一起针对乌克兰的网络间谍活动,使用两种新型恶意软件BadPaw和MeowMeow,通过伪装成边境通行证的钓鱼邮件传播,后者具备文件操作和检测规避功能,疑似俄罗斯支持的行为者所为。 2026-3-4 14:45:46 Author: therecord.media(查看原文) 阅读量:22 收藏

Researchers have identified a suspected Russian espionage campaign targeting Ukraine that uses two previously undocumented malware strains, according to a new report.

The operation begins with a phishing email with a link to a ZIP archive containing a malicious document written in Ukrainian that appears to grant a permit for crossing a Ukrainian border checkpoint, researchers at cybersecurity firm ClearSky said.

Opening the archive triggers the download of a malware loader dubbed BadPaw, which then installs a second tool called MeowMeow, a sophisticated backdoor that allows attackers to access infected systems and manipulate files stored locally.

According to ClearSky, the backdoor can check whether specific files exist on a device and can read, write or delete data on the compromised machine.

Both malware strains include mechanisms designed to evade detection. The MeowMeow backdoor scans infected systems for signs of virtual machines and common cybersecurity analysis tools, automatically terminating itself if it detects a research or sandbox environment.

ClearSky attributed the campaign with high confidence to a Russian state-aligned threat actor and with low confidence to the hacking group APT28, also referred to as Fancy Bear, BlueDelta or Forest Blizzard.

“The focus on Ukrainian entities, combined with the geopolitical nature of the lure, aligns with Russian strategic objectives,” the researchers said.

The phishing emails were sent from addresses hosted by ukr.net, a widely used Ukrainian email service that researchers said has been used in previous campaigns linked to APT28 to harvest credentials and collect intelligence.

The report did not identify the targets of the campaign or say whether the attacks were successful.

Widely believed to be linked to Russia’s military intelligence agency, APT28 has previously conducted cyber-espionage and credential-harvesting operations against government agencies, defense contractors, weapons suppliers and logistics firms.

Earlier this week, Ukraine’s computer emergency response team, CERT-UA, reported a separate hacking campaign targeting Ukrainian government institutions using ShadowSniff and SalatStealer information-stealing malware. The agency attributed the activity to a threat actor tracked as UAC-0252.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.


文章来源: https://therecord.media/russian-ukraine-hackers-malware
如有侵权请联系:admin#unsafe.sh