Skip to main content
Mallory

Void Blizzard (Laundry Bear) Charity-Themed Lures Deliver PluggyApe Backdoor to Ukraine’s Defense Forces

government-diplomatic-threatstate-sponsored-espionagephishing-campaign-intelligenceremote-access-implantcommand-and-control-method
Updated March 21, 2026 at 02:53 PM7 sources
Share:
Void Blizzard (Laundry Bear) Charity-Themed Lures Deliver PluggyApe Backdoor to Ukraine’s Defense Forces

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Ukraine’s CERT (CERT-UA) reported a cyber-espionage campaign targeting representatives of Ukraine’s Defense Forces between October and December 2025, using social-engineering lures themed around charitable foundations. Victims were contacted via Signal and WhatsApp and directed to charity-impersonation websites or sent password-protected archives that purported to contain documents but instead delivered executable payloads (including *.docx.pif), sometimes sent directly through the messaging apps.

The activity was attributed with medium confidence to the Russia-aligned threat actor Void Blizzard (also tracked as Laundry Bear and UAC-0190). The campaign deployed a previously undocumented backdoor dubbed PluggyApe, built as a Python executable packaged with PyInstaller, which profiles infected hosts, establishes persistence via Windows Registry modification, and enables remote command execution. CERT-UA noted an evolution in late 2025 from earlier loader naming patterns (e.g., *.pdf.exe) to PIF-based delivery and an updated PluggyApe v2 featuring stronger obfuscation, MQTT-based command-and-control, and additional anti-analysis checks.

Timeline

  1. Jan 13, 2026

    CERT-UA discloses PluggyApe campaign and attributes it to Void Blizzard

    In January 2026, CERT-UA publicly reported the campaign targeting Ukraine's Defense Forces and attributed it with medium confidence to the Russian-linked group Void Blizzard, also known as Laundry Bear or UAC-0190. The agency described the use of trusted messaging platforms, Ukrainian-language social engineering, and fake charity themes as part of a broader shift away from mass phishing.

  2. Dec 1, 2025

    PluggyApe campaign evolves with new PIF lures and v2 malware

    By December 2025, the operators shifted to PIF-based payload delivery and deployed PluggyApe v2 with stronger obfuscation, anti-analysis or virtual-machine checks, and MQTT support. The malware also moved toward retrieving encoded command-and-control addresses from public paste services such as Pastebin and Rentry.

  3. Oct 1, 2025

    Attackers use early PluggyApe loader and Pastebin-based delivery

    In October 2025, CERT-UA observed earlier activity using a '.pdf.exe' loader that fetched a Python interpreter and an early PluggyApe script from Pastebin. This reflects the campaign's initial delivery and command infrastructure approach before later refinements.

  4. Oct 1, 2025

    Void Blizzard begins charity-themed targeting of Ukraine's Defense Forces

    Between October and December 2025, personnel in Ukraine's Defense Forces were targeted in a cyber-espionage campaign using Signal and WhatsApp messages that impersonated charitable organizations. Victims were lured to fake charity sites or sent password-protected archives containing disguised executables that installed the PluggyApe backdoor.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Sources

January 16, 2026 at 05:29 PM
January 14, 2026 at 12:00 AM

2 more from sources like bleeping computer and the record media

Related Stories

Russian Phishing Campaign Targets Ukraine With BadPaw Loader and MeowMeow Backdoor

Russian Phishing Campaign Targets Ukraine With BadPaw Loader and MeowMeow Backdoor

A **Russia-linked phishing campaign** has targeted Ukrainian entities using emails that lure recipients into downloading a ZIP archive, leading to installation of two newly identified malware families: the **BadPaw** loader and the **MeowMeow** backdoor. Reporting based on ClearSky’s analysis describes messages sent from addresses hosted on Ukrainian service **ukr[.]net**, with a redirect to a ZIP containing a Ukraine-themed border checkpoint/permit lure; opening the archive triggers execution that downloads **BadPaw**, which then establishes C2 and deploys **MeowMeow**. The malware chain is designed to complicate analysis and evade detection. ClearSky reported **BadPaw** as a **.NET-based loader** and noted use of the **.NET Reactor** packer/obfuscator, while **MeowMeow** provides backdoor functionality including file enumeration and data read/write/delete operations. Additional defensive measures include conditional execution (components remaining inert unless launched with specific parameters) and environment checks by MeowMeow to detect sandboxes or analysis tooling (e.g., *Wireshark*, *ProcMon*, *Fiddler*). Based on infrastructure and tradecraft indicators (including ukr[.]net-hosted sender addresses), researchers attributed the activity with **low confidence** to **APT28** (aka **Fancy Bear/Forest Blizzard/Blue Delta**).

1 months ago
APT28-Linked Phishing Campaign Deploys BadPaw Loader and MeowMeow Backdoor Against Ukraine

APT28-Linked Phishing Campaign Deploys BadPaw Loader and MeowMeow Backdoor Against Ukraine

ClearSky reported a suspected Russian espionage campaign targeting Ukrainian entities using phishing emails that deliver two previously undocumented malware families: the **BadPaw** loader and the **MeowMeow** backdoor. The infection chain begins with a lure email (sent from `ukr[.]net` to appear credible) containing a link that first loads an unusually small image functioning as a tracking pixel to confirm user interaction, then redirects victims to download a ZIP archive. When opened, the archive launches an HTA that displays a Ukrainian-language decoy document about border-crossing appeals while executing background stages that deploy the .NET-based BadPaw loader, which then retrieves and installs the MeowMeow backdoor from a remote server; the HTA also performs sandbox/analysis-evasion checks. The activity was attributed with **moderate confidence** to **APT28** based on targeting, geopolitical lures, and technique overlaps with prior Russian operations. Separate reporting also noted CERT-UA warnings about other phishing-driven malware activity against Ukrainian government institutions (including **SHADOWSNIFF**, **SALATSTEALER**, and a Go backdoor **DEAFTICKK** attributed to **UAC-0252**), but that campaign is distinct from the BadPaw/MeowMeow intrusion chain and should not be conflated with the APT28-linked activity.

1 months ago
DRILLAPP Espionage Campaign Targeting Ukrainian Organizations

DRILLAPP Espionage Campaign Targeting Ukrainian Organizations

A **Russia-linked cyber-espionage campaign** targeted Ukrainian entities with a JavaScript-based backdoor called **DRILLAPP**, using lures themed around **Starlink terminal verification** and the **Come Back Alive Foundation** charity. Researchers linked the activity to **Laundry Bear**—also tracked as **Void Blizzard** and **UAC-0190**—and said the operation shared tradecraft with earlier campaigns against Ukrainian defense-related targets. The malware was observed in February 2026 and was designed for surveillance and remote access, including file upload and download, microphone recording, and webcam image capture. The intrusion chain used malicious **LNK** files to create an **HTA** file in a temporary directory, fetch obfuscated scripts from **Pastefy**, and establish persistence by copying shortcuts into the Windows Startup folder. The payload then executed through **Microsoft Edge** in headless mode with permissive flags such as `--no-sandbox`, `--disable-web-security`, `--allow-file-access-from-files`, `--use-fake-ui-for-media-stream`, and `--disable-user-media-security`, enabling access to the local file system, camera, microphone, and potentially screen capture without normal user prompts. Researchers said the browser-based approach likely helps the attackers blend malicious activity with legitimate browser access to sensitive device features.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.