Ukraine's army targeted in new charity-themed malware campaign
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。好的,我先看看这篇文章讲了什么。 文章主要讲的是乌克兰国防部官员在2025年10月至12月期间被针对,参与了一个慈善主题的活动,结果下载了名为PluggyApe的恶意软件。乌克兰的CERT机构报告说,这些攻击很可能是由俄罗斯的威胁组织“Void Blizzard”和“Laundry Bear”发起的,虽然归属信心是中等。Laundry Bear之前还攻击过荷兰警察的内部系统。 攻击者主要针对北约成员国,窃取文件和电子邮件。攻击开始于通过Signal或WhatsApp发送即时消息,诱骗受害者访问一个假慈善网站下载密码保护的存档,里面包含恶意PIF文件和PluggyApe后门。这个恶意软件会收集信息并等待执行命令。 PluggyApe还从外部来源获取C2地址,并且这次攻击转向了PIF和版本2,增加了混淆和反分析措施。CERT-UA警告说移动设备成为主要目标,因为它们通常保护不足,并且攻击者使用合法账户和乌克兰电话号码,使得攻击更具说服力。 好的,现在要总结这些内容到100字以内。需要涵盖攻击目标、时间、恶意软件、攻击者、攻击方式以及移动设备的风险。 可能的结构:乌克兰国防部官员在2025年被针对,下载恶意软件PluggyApe;由俄罗斯威胁组织发起;通过即时消息诱骗访问假慈善网站;恶意软件收集信息并等待命令;移动设备成为主要目标。 这样大概控制在100字左右。 </think> 乌克兰国防部官员于2025年10月至12月期间被针对,在慈善主题活动中下载了名为PluggyApe的恶意软件。该活动由俄罗斯威胁组织"Void Blizzard"和"Laundry Bear"发起,通过即时消息诱骗受害者访问假慈善网站并下载恶意档案。PluggyApe作为后门程序收集信息并等待执行命令。移动设备因保护不足成为主要目标。 2026-1-13 23:15:16 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

Ukraine's army targeted in new charity-themed malware campaign

Officials of Ukraine's Defense Forces were targeted in a charity-themed campaign between October and December 2025 that delivered backdoor malware called PluggyApe.

Ukraine's CERT says in a report that the attacks were likely launched by the Russian threat group known as 'Void Blizzard' and 'Laundry Bear', although there is medium confidence in attribution.

Laundry Bear is the same threat group responsible for breaching the Dutch police's internal systems in 2024 and stealing sensitive information about officers.

Wiz

The hackers are known for focusing on NATO member states in attacks aligned with Russian interests that steal files and emails.

The attacks observed by CERT-UA begin with instant messages over Signal or WhatsApp telling recipients to visit a website allegedly operated by a charitable foundation, and download a password-protected archive supposedly containing documents of interest.

Malicious message lures
Malicious message lures
Source: CERT-UA

Instead, the archives contain executable PIF files (.docx.pif) and the PluggyApe payloads, which are sometimes sent directly through the messaging app.

However, the malicious PIF file is an executable created using the PyInstaller open-source tool for bundling Python applications into a single package that contains all required dependencies.

Fake charity website
Fake charity website
Source: CERT-UA

PluggyApe is a backdoor that profiles the host, sends information to the attackers, including a unique victim identifier, and then waits for code execution commands. It achieves persistence via Windows Registry modification.

In earlier attacks with PluggyApe, the threat actors used the ".pdf.exe" extension for the loader. Starting in December 2025, they switched to PIF and PluggyApe version 2, which features better obfuscation, MQTT-based communication, and more anti-analysis checks.

The Ukrainian agency also reports that PluggyApe fetches its command-and-control (C2) addresses from external sources such as rentry.co and pastebin.com, where they are published in base64-encoded form, rather than using less-flexible hardcoded entries.

Malware's code
Malware's code
Source: CERT-UA

CERT-UA warns that mobile devices have become prime targets in attacks of this kind, as they are generally poorly protected and monitored.

When this is combined with good attack preparation, like using compromised accounts or phone numbers of Ukrainian telecommunication operators, the attacks can get very convincing.

"Initial interaction with the target of a cyberattack is increasingly carried out using legitimate accounts, phone numbers of Ukrainian mobile operators, and the Ukrainian language, including audio and video communication," explains CERT-UA.

"The attacker may demonstrate detailed and relevant knowledge about the individual, the organization, and the specifics of its operations."

A complete list with the indicators of compromise (IoCs), including deceptive websites posing as charity portals, is provided at the bottom of CERT-UA's report.

Wiz

The 2026 CISO Budget Benchmark

It's budget season! Over 300 CISOs and security leaders have shared how they're planning, spending, and prioritizing for the year ahead. This report compiles their insights, allowing readers to benchmark strategies, identify emerging trends, and compare their priorities as they head into 2026.

Learn how top leaders are turning investment into measurable impact.


文章来源: https://www.bleepingcomputer.com/news/security/ukraines-army-targeted-in-new-charity-themed-malware-campaign/
如有侵权请联系:admin#unsafe.sh