APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读全文,抓住主要信息。 文章讲的是俄罗斯黑客组织APT28发起的新网络间谍活动,目标是乌克兰。他们使用了两种新的恶意软件:BadPaw和MeowMeow。攻击链从钓鱼邮件开始,诱使受害者下载ZIP文件,里面包含HTA文件和诱饵文档。HTA文件会释放BadPaw加载器,进而下载MeowMeow后门程序。 此外,文章提到攻击中使用了乌克兰边境申请的诱饵文档,以增加可信度。恶意软件还包含俄语字符串,这可能表明开发者在编码时犯了错误或者疏忽。 总结的时候要包括:攻击者是谁(APT28)、目标(乌克兰)、使用的恶意软件(BadPaw和MeowMeow)、攻击手段(钓鱼邮件、诱饵文档)、以及俄语字符串的发现。 现在把这些信息浓缩到100字以内,确保不遗漏关键点。 </think> 俄罗斯网络间谍组织APT28通过钓鱼邮件向乌克兰目标发送ZIP文件,其中包含诱骗文档和恶意软件BadPaw及MeowMeow。BadPaw负责下载后门程序MeowMeow,后者可执行远程命令并操作文件系统。攻击利用乌克兰边境申请的诱饵增加可信度,并在代码中发现俄语字符串。 2026-3-5 10:10:0 Author: thehackernews.com(查看原文) 阅读量:10 收藏

Cyber Espionage / Threat Intelligence

Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow.

"The attack chain initiates with a phishing email containing a link to a ZIP archive. Once extracted, an initial HTA file displays a lure document written in Ukrainian concerning border crossing appeals to deceive the victim," ClearSky said in a report published this week.

In parallel, the attack chain leads to the deployment of a .NET-based loader called BadPaw, which then establishes communication with a remote server to fetch and deploy a sophisticated backdoor called MeowMeow.

The campaign has been attributed with moderate confidence to the Russian state-sponsored threat actor known as APT28, based on the targeting footprint, the geopolitical nature of the lures used, and overlaps with techniques observed in previous Russian cyber operations. 

The starting point of the attack sequence is a phishing email sent from ukr[.]net, likely in an attempt to establish credibility and secure the trust of targeted victims. Present in the message is a link to a purported ZIP file, causing the user to be redirected to a URL that loads an "exceptionally small image," effectively acting as a tracking pixel to signal the operators that the link was clicked.

Once this step is complete, the victim is redirected to a secondary URL from where the archive is downloaded. The ZIP file includes an HTML Application (HTA) that, once launched, drops a decoy document as a distraction mechanism, while it executes follow-on stages in the background.

"The dropped decoy document serves as a social engineering tactic, presenting a confirmation of receipt for a government appeal regarding a Ukrainian border crossing," ClearSky said. "This lure is intended to maintain the veneer of legitimacy."

The HTA file also carries out checks to avoid running within sandbox environments. It does this by querying the Windows Registry key "KLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\InstallDate" to estimate the "age" of the operating system. The malware is designed to abort execution if the system was installed less than ten days prior.

Should the system meet the environment criteria, the malware locates the downloaded ZIP archive and extracts two files from it – a Visual Basic Script (VBScript) and a PNG image – and saves them to disk under different names. It also creates a scheduled task to execute the VBScript as a way of ensuring persistence on the infected system.

The primary responsibility of the VBScript is to extract malicious code embedded within the PNG image, an obfuscated loader referred to as BadPaw that's capable of contacting a command-and-control (C2) server to download additional components, including an executable named MeowMeow.

"Consistent with the 'BadPaw' tradecraft, if this file is executed independently of the full attack chain, it initiates a dummy code sequence," the Israeli cybersecurity company explained. "This decoy execution displays a graphical user interface (GUI) featuring a picture of a cat, aligning with the visual theme of the initial image file from which the primary malware was extracted."

"When the 'MeowMeow' button within the decoy GUI is clicked, the application simply displays a 'Meow Meow Meow' message, performing no further malicious actions. This serves as a secondary functional decoy to mislead manual analysis."

The backdoor's malicious code is activated only when it's executed with a certain parameter ("-v") that's provided by the initial infection chain, and after checking that it's running on an actual endpoint as opposed to a sandbox, and no forensic and monitoring tools like Wireshark, Procmon, Ollydbg, and Fiddler are running in the background.

At its core, MeowMeow is equipped to remotely execute PowerShell commands on the compromised host and support file system operations, such as the ability to read, write, and delete data. ClearSky said it identified Russian language strings in the source code, reinforcing the assessment that the activity is the work of a Russian-speaking threat actor.

"The presence of these Russian-language strings suggests two possibilities: the threat actor committed an operational security (OPSEC) error by failing to localize the code for the Ukrainian target environment, or they inadvertently left Russian development artifacts within the code during the malware's production phase," it said.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/apt28-linked-campaign-deploys-badpaw.html
如有侵权请联系:admin#unsafe.sh