Kremlin-linked hackers pose as charities to spy on Ukraine’s military

Hackers linked to the Kremlin have launched a new cyber-espionage campaign targeting Ukraine’s military personnel by posing as charitable organizations, researchers said.

In a report released on Monday, Ukraine’s computer emergency response team, CERT-UA, said the attacks took place between October and December 2025 and targeted representatives of Ukraine’s Defense Forces. The operations were carried out using a previously undocumented malware strain known as PluggyApe.

The activity was attributed to Void Blizzard, also tracked as Laundry Bear and internally designated by Ukrainian authorities as UAC-0190. The relatively new state-backed espionage group operates in support of Russian government interests, targeting government, defense, transportation, media, non-governmental organizations and healthcare sectors in Europe and North America.

According to CERT-UA, attackers contacted their targets via messaging applications, urging them to visit websites impersonating charitable foundations. Victims were then prompted to download what appeared to be documents but were, in fact, executable files, often packaged in password-protected archives. In some cases, the malicious files were sent directly through messaging apps.

CERT-UA shared screenshots showing attackers using Signal and WhatsApp to communicate with victims. Ukrainian officials have previously warned that Russian state-backed hackers are increasingly abusing Signal to deliver malware targeting government and military personnel.

The group first deployed an early version of the PluggyApe backdoor in October. By December, the malware had been upgraded with additional features designed to evade detection and complicate analysis. Once installed, PluggyApe allows attackers to establish persistent remote access to infected systems and execute additional commands.

Ukrainian officials said the campaign reflects a broader shift in Russia-linked cyber operations, with attackers increasingly relying on trusted communication channels and highly tailored lures rather than mass phishing emails. 

Initial contact is now often made through legitimate accounts and Ukrainian phone numbers, with attackers speaking Ukrainian, placing audio or video calls and demonstrating detailed knowledge of their targets and their organizations.

“Widely used messaging applications installed on mobile devices and personal computers are de facto becoming the most common delivery channel for malware,” CERT-UA said.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

[Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl

Next Post

Suspected ransomware attack threatens one of South Korea’s largest companies

Related Posts

Google Adds Layered Defenses to Chrome to Block Indirect Prompt Injection Threats

Google on Monday announced a set of new security features in Chrome, following the company's addition of agentic artificial intelligence (AI) capabilities to the web browser. To that end, the tech giant said it has implemented layered defenses to make it harder for bad actors to exploit indirect prompt injections that arise as a result of exposure to untrusted web content and inflict harm. Chief
Read More

LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem

Three prominent ransomware groups DragonForce, LockBit, and Qilin have announced a new strategic ransomware alliance, once underscoring continued shifts in the cyber threat landscape. The coalition is seen as an attempt on the part of the financially motivated threat actors to conduct more effective ransomware attacks, ReliaQuest said in a report shared with The Hacker News. "Announced shortly
Read More