DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户已经提供了文章的英文内容,看起来是关于乌克兰实体成为网络攻击目标的报告。 首先,我需要通读整篇文章,抓住主要信息。文章提到S2 Grupo的LAB52团队报告了一个新的网络攻击活动,针对乌克兰实体,可能由与俄罗斯有关的威胁行为者策划。攻击活动发生在2026年2月,使用了名为DRILLAPP的恶意软件,通过Edge浏览器传播。 攻击手法方面,使用了司法和慈善主题作为诱饵,利用JavaScript后门。有两个版本,第一个版本使用LNK文件创建HTA文件,第二个版本则使用Windows Control Panel模块。恶意软件能够上传下载文件、利用麦克风和摄像头,并通过Canvas指纹技术收集设备信息。 此外,文章还提到攻击者利用Chromium浏览器的调试协议来绕过JavaScript限制,下载文件。这表明攻击者正在探索新的方法来规避检测。 现在我需要将这些信息浓缩到100字以内。重点包括:乌克兰实体被攻击、恶意软件DRILLAPP、通过Edge浏览器传播、利用诱饵和调试协议、收集设备信息等。 可能的结构是:乌克兰实体遭受网络攻击,恶意软件通过Edge浏览器传播,利用诱饵和调试协议下载文件并收集设备信息。 检查一下是否超过字数限制,并确保涵盖主要点:目标、恶意软件名称、传播方式、技术手段、功能等。 </think> 乌克兰实体成为网络攻击目标,恶意软件DRILLAPP通过微软Edge浏览器传播,利用司法和慈善主题作为诱饵,在系统中建立持久性,并通过调试协议下载文件及收集设备指纹信息。 2026-3-16 09:7:0 Author: thehackernews.com(查看原文) 阅读量:8 收藏

Ukrainian entities have emerged as the target of a new campaign likely orchestrated by threat actors linked to Russia, according to a report from S2 Grupo's LAB52 threat intelligence team.

The campaign, observed in February 2026, has been assessed to share overlaps with a prior campaign mounted by Laundry Bear (aka UAC-0190 or Void Blizzard) aimed at Ukrainian defense forces with a malware family known as PLUGGYAPE.

The attack activity "employs various judicial and charity themed lures to deploy a JavaScript‑based backdoor that runs through the Edge browser," the cybersecurity company said. Codenamed DRILLAPP, the malware is capable of uploading and downloading files, leveraging the microphone, and capturing images through the webcam by taking advantage of the web browser's features.

Two different versions of the campaign have been identified, with the first iteration detected in early February by making use of a Windows shortcut (LNK) file to create an HTML Application (HTA) in the temporary folder, which then loads a remote remote script hosted on Pastefy, a legitimate paste service.

To establish persistence, the LNK files are copied to the Windows Startup folder so that they are automatically launched following a system reboot. The attack chain then displays a URL containing lures related to installing Starlink or a Ukrainian charity named Come Back Alive Foundation.

The HTML file is eventually executed via the Microsoft Edge browser in headless mode, which then loads the remote obfuscated script hosted on Pastefy.

The browser is executed with additional parameters like –no-sandbox, –disable-web-security, –allow-file-access-from-files, –use-fake-ui-for-media-stream, –auto-select-screen-capture-source=true, and –disable-user-media-security, granting it access to the local file system, as well as camera, microphone, and screen capture without requiring any user interaction.

The artifact essentially functions as a lightweight backdoor to facilitate file system access and capture audio from the microphone, video from the camera, and images of the device's screen all through the browser. It also generates a device fingerprint using a technique called canvas fingerprinting when run for the first time and uses Pastefy as a dead drop resolver to fetch a WebSocket URL used for command‑and‑control (C2) communications.

The malware transmits the device fingerprint data along with the victim's country, which is determined from the machine's time zone. It specifically checks if the time zones correspond to the U.K., Russia, Germany, France, China, Japan, the U.S., Brazil, India, Ukraine, Canada, Australia, Italy, Spain, and Poland. If that's not the case, it defaults to the U.S.

The second version of the campaign, spotted in late February 2026, eschews LNK files for Windows Control Panel modules, while keeping the infection sequence largely intact. Another notable change involves the backdoor itself, which has now been upgraded to allow recursive file enumeration, batch file uploads, and arbitrary file download.

"For security reasons, JavaScript does not allow the remote downloading of files," LAB52 said. "This is why the attackers use the Chrome DevTools Protocol (CDP), an internal protocol of Chromium‑based browsers that can only be used when the –remote-debugging-port parameter is enabled."

It's believed that the backdoor is still in the initial stages of development. An early variant of the malware detected in the wild on January 28, 2026, has been observed just communicating with the domain "gnome[.]com" instead of downloading the primary payload from Pastefy.

"One of the most notable aspects is the use of the browser to deploy a backdoor, which suggests that the attackers are exploring new ways to evade detection," the Spanish security vendor said.

"The browser is advantageous for this type of activity because it is a common and generally non‑suspicious process, it offers extended capabilities accessible through debugging parameters that enable unsafe actions such as downloading remote files, and it provides legitimate access to sensitive resources such as the microphone, camera, or screen recording without triggering immediate alerts."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/drillapp-backdoor-targets-ukraine.html
如有侵权请联系:admin#unsafe.sh