Kremlin-linked hackers pose as charities to spy on Ukraine’s military

Hackers linked to the Kremlin have launched a new cyber-espionage campaign targeting Ukraine’s military personnel by posing as charitable organizations, researchers said.

In a report released on Monday, Ukraine’s computer emergency response team, CERT-UA, said the attacks took place between October and December 2025 and targeted representatives of Ukraine’s Defense Forces. The operations were carried out using a previously undocumented malware strain known as PluggyApe.

The activity was attributed to Void Blizzard, also tracked as Laundry Bear and internally designated by Ukrainian authorities as UAC-0190. The relatively new state-backed espionage group operates in support of Russian government interests, targeting government, defense, transportation, media, non-governmental organizations and healthcare sectors in Europe and North America.

According to CERT-UA, attackers contacted their targets via messaging applications, urging them to visit websites impersonating charitable foundations. Victims were then prompted to download what appeared to be documents but were, in fact, executable files, often packaged in password-protected archives. In some cases, the malicious files were sent directly through messaging apps.

CERT-UA shared screenshots showing attackers using Signal and WhatsApp to communicate with victims. Ukrainian officials have previously warned that Russian state-backed hackers are increasingly abusing Signal to deliver malware targeting government and military personnel.

The group first deployed an early version of the PluggyApe backdoor in October. By December, the malware had been upgraded with additional features designed to evade detection and complicate analysis. Once installed, PluggyApe allows attackers to establish persistent remote access to infected systems and execute additional commands.

Ukrainian officials said the campaign reflects a broader shift in Russia-linked cyber operations, with attackers increasingly relying on trusted communication channels and highly tailored lures rather than mass phishing emails. 

Initial contact is now often made through legitimate accounts and Ukrainian phone numbers, with attackers speaking Ukrainian, placing audio or video calls and demonstrating detailed knowledge of their targets and their organizations.

“Widely used messaging applications installed on mobile devices and personal computers are de facto becoming the most common delivery channel for malware,” CERT-UA said.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

[Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl

Next Post

Suspected ransomware attack threatens one of South Korea’s largest companies

Related Posts

Anthropic Launches Claude Code Security for AI-Powered Vulnerability Scanning

Artificial intelligence (AI) company Anthropic has begun to roll out a new security feature for Claude Code that can scan a user's software codebase for vulnerabilities and suggest patches. The capability, called Claude Code Security, is currently available in a limited research preview to Enterprise and Team customers. "It scans codebases for security vulnerabilities and suggests targeted
Read More

Webinar: The “Agentic” Trojan Horse: Why the New AI Browsers War is a Nightmare for Security Teams

The AI browser wars are coming to a desktop near you, and you need to start worrying about their security challenges. For the last two decades, whether you used Chrome, Edge, or Firefox, the fundamental paradigm remained the same: a passive window through which a human user viewed and interacted with the internet. That era is over. We are currently witnessing a shift that renders the old
Read More

CISA Flags Four Security Flaws Under Active Exploitation in Latest KEV Update

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows - CVE-2026-2441 (CVSS score: 8.8) - A use-after-free vulnerability in Google Chrome that could allow a remote attacker to potentially exploit heap
Read More