Russia-linked espionage campaign targeting Ukraine using Starlink and charity lures
嗯,用户让我帮忙总结一篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我需要仔细阅读这篇文章,理解其主要内容。 文章讲的是一个与俄罗斯有关的黑客组织Laundry Bear发起了一次网络间谍活动,目标是乌克兰的组织。他们使用伪装成文件的间谍软件,内容涉及Starlink卫星互联网终端和乌克兰的一个知名慈善机构。间谍软件名为DrillApp,可以上传下载文件、录音、录屏等。这次活动发生在二月份,研究人员指出该组织自2024年以来活跃,并且之前攻击过北约成员国和乌克兰机构。此外,他们还利用慈善主题的诱饵和公共文本共享服务来传播恶意软件。 接下来,我需要将这些信息浓缩到一百字以内。要抓住关键点:黑客组织、目标国家、使用的工具、攻击手段和目的。确保信息准确且简洁。 可能的结构是:俄罗斯相关黑客组织利用伪装文件攻击乌克兰机构,窃取信息并进行间谍活动。这样既涵盖了主要行动者、手段和目的。 最后检查字数是否符合要求,并确保没有遗漏重要细节。 </think> 俄罗斯相关黑客组织利用伪装成慈善请求和Starlink卫星终端文件的间谍软件攻击乌克兰机构,窃取敏感信息并进行网络间谍活动。 2026-3-16 13:30:50 Author: therecord.media(查看原文) 阅读量:7 收藏

A relatively new Russia-linked hacker group has launched a cyber-espionage campaign targeting Ukrainian organizations using spyware disguised within documents about Starlink satellite internet terminals and a well-known Ukrainian charity, researchers have found.

The campaign, observed in February, deployed a backdoor dubbed DrillApp that allows attackers to upload and download files from infected computers, record audio through a microphone and capture images from a webcam, according to a report by cybersecurity firm Lab52.

Researchers attributed the campaign to the Russian-linked hacker group Laundry Bear, also tracked as Void Blizzard, which has been active since at least 2024 and has previously targeted NATO member states and Ukrainian institutions.

Ukraine’s computer emergency response team, CERT-UA, previously reported a separate operation by the group targeting the country’s armed forces earlier this year. Researchers said the campaigns relied on similar techniques, including charity-themed lures and hosting malicious components on public text-sharing services.

In the latest operation, attackers used documents impersonating requests from Come Back Alive, a Ukrainian charity that supports the armed forces, as well as images related to the verification of Starlink satellite internet terminals. Ukraine introduced a verification system for Starlink terminals earlier in February after authorities confirmed that Russian forces had begun installing the technology on attack drones.

Once opened, the malicious file executes through the Microsoft Edge browser, allowing attackers to access the victim’s file system and capture audio from the microphone, video from the camera and recordings of the device’s screen.

Researchers say attackers may be using web browsers to deliver malware because browsers often have legitimate access to sensitive device features such as cameras, microphones, and screen recording, which can make malicious activity harder to detect. Browsers are also rarely flagged as suspicious by security tools.

Lab52 said the spyware appears to still be in an early stage of development, suggesting the attackers may be experimenting with new methods to evade defenses. Researchers identified two versions of the malware used in the campaign, which differed primarily in the lures used to trick victims.

Laundry Bear was previously described as using “relatively simple techniques that can be difficult to detect.” The group is primarily focused on cyber-espionage. Microsoft has previously reported that it has successfully compromised organizations across several sectors in Ukraine, including education, transportation, and defense.

Security researchers have also noted overlaps between Laundry Bear’s tactics and those used by the Russian military intelligence threat actor APT28, also known as Fancy Bear, though analysts generally consider them to be distinct actors.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/russia-ukraine-cyber-espionage-group
如有侵权请联系:admin#unsafe.sh