Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Deploy Modular RAT for Credential Theft With Screenshot
May 8, 2026
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Home/Threats/Threat Actors Target Ukraine Defense with Charity Malware Campaign
Threats

Threat Actors Target Ukraine Defense with Charity Malware Campaign

Under the guise of charity operations, threat actors have deployed a sophisticated malware campaign targeting members of Ukraine’s Defense Forces. Operating between October and December 2025, the...

Sarah simpson
Sarah simpson
January 14, 2026 2 Min Read
2 0

Under the guise of charity operations, threat actors have deployed a sophisticated malware campaign targeting members of Ukraine’s Defense Forces.

Operating between October and December 2025, the attackers distributed PLUGGYAPE, a Python-based backdoor designed to compromise military personnel.

The campaign demonstrates how cybercriminals increasingly leverage social engineering combined with legitimate-sounding charitable narratives to penetrate highly secured defense networks.

The initial infection chain relies on convincing targets to visit fake charity foundation websites through messages sent via instant messengers.

Once victims land on these fraudulent pages, they are prompted to download what appear to be legitimate documents.

However, these files are actually executable programs, often disguised with double extensions such as .docx.pif or .pdf.exe and placed within password-protected archives to bypass detection systems.

This approach proves effective because the visual presentation mimics authentic documents that military personnel would routinely handle.

CERT-UA analysts identified the malware after careful investigation of the campaign’s technical characteristics.

Researchers noted that the threat group, tracked as UAC-0190 and known by the alias Void Blizzard, maintains medium confidence attribution.

The attackers demonstrate sophisticated understanding of their targets, using legitimate Ukrainian mobile operator accounts and phone numbers while communicating in Ukrainian through popular messaging applications.

Infection Mechanism and Command Infrastructure

The malware operates through a well-engineered persistence mechanism that ensures long-term access to compromised systems.

When executed, PLUGGYAPE generates a unique device identifier by collecting basic computer information including MAC address, BIOS serial number, disk ID, and processor ID.

This data is processed through SHA-256 encryption, with only the first sixteen bytes used as the device fingerprint. The backdoor then creates a registry entry in the Windows Run branch, guaranteeing automatic execution whenever the infected system restarts.

This persistence technique represents a fundamental aspect of the malware’s design, as targets may be offline for extended periods and manual reactivation would prove impractical.

Communication with command servers occurs through web sockets or MQTT protocols, with all data transmitted in JSON format.

Early variants connected directly to hardcoded IP addresses embedded in the malware code, but operators later evolved their infrastructure to hide addresses on public paste services like Pastebin and Rentry, encoded in Base64 format.

By December 2025, an improved version designated PLUGGYAPE.V2 emerged, incorporating enhanced obfuscation layers and additional checks designed to detect virtual machine environments.

This upgrade demonstrates the attackers’ commitment to maintaining operational effectiveness against increasingly sophisticated defensive measures employed by Ukrainian cyber units.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Betterment Confirms Hackers Accessed Internal Systems

Next Post

Microsoft Warns: Secure Boot Bypassed by Expired Windows UEFI

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Use Hugging Face & ClawHub to Deploy Malware
May 8, 2026
Fake Moustache Bypasses Age Verification, Raises Online Safety
May 8, 2026
Infostealer Uses GitHub Releases for Payload Hosting & Evasion
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us