Threat IntelHIGH

Threat Intel - DRILLAPP Backdoor Targets Ukraine for Espionage

THThe Hacker News
📰 2 sources·Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Updated:
🎯

Basically, a new malware is spying on Ukraine using a web browser.

Quick Summary

A new malware named DRILLAPP is targeting Ukrainian entities for espionage. Linked to Russian threat actors, it exploits Microsoft Edge for stealthy operations. This poses significant risks to national security.

The Threat

In February 2026, Ukrainian entities became the focus of a new cyber espionage campaign. This attack is believed to be orchestrated by threat actors connected to Russia, specifically the group known as Laundry Bear (also referred to as UAC-0190 or Void Blizzard). The malware, codenamed DRILLAPP, uses a unique method by leveraging the Microsoft Edge browser for its operations, making it a stealthy threat.

DRILLAPP is designed to function as a backdoor, allowing attackers to upload and download files, access the microphone, and capture images through the webcam. This capability is particularly alarming as it can operate without raising immediate suspicion, thanks to the browser's inherent legitimacy.

Who's Behind It

The campaign is linked to Laundry Bear, a group known for targeting Ukrainian defense forces in previous attacks. The malware was first detected in early February 2026, utilizing a Windows shortcut (LNK) file to execute an HTML Application (HTA) that loads a remote script from a legitimate service called Pastefy. This method of delivery is a hallmark of the group's tactics, showcasing their adaptability and technical prowess.

The attackers employ various lures, including themes related to judicial and charitable organizations, to entice users into executing the malware. This psychological manipulation is a common tactic in cyber espionage, aiming to lower defenses and facilitate the attack.

Tactics & Techniques

The DRILLAPP malware operates by executing a series of commands that allow it to run in headless mode through Microsoft Edge. This means it can perform its malicious activities without a visible user interface, further obscuring its presence. The malware utilizes several parameters to gain extensive access to the system, including the ability to bypass security protocols that would typically prevent unauthorized access to sensitive resources.

One of the most notable techniques is canvas fingerprinting, which generates a unique identifier for the device, helping the attackers track their targets. The malware checks the time zone of the infected machine to determine the victim's location, focusing on countries such as Ukraine, the U.S., and several European nations. This targeting indicates a strategic approach to espionage, allowing attackers to tailor their efforts based on geographic relevance.

Defensive Measures

To protect against threats like DRILLAPP, users and organizations should prioritize robust cybersecurity practices. This includes regularly updating software to patch vulnerabilities, employing advanced threat detection systems, and training staff to recognize phishing attempts and suspicious activity.

Additionally, utilizing endpoint protection solutions that can detect unusual behaviors—such as unauthorized access to the microphone or camera—can help mitigate risks. As cyber threats evolve, staying informed about the latest tactics and maintaining a proactive security posture is essential for safeguarding sensitive information.

🔒 Pro insight: The use of browser-based backdoors highlights a shift in tactics, making traditional detection methods less effective against evolving threats.

Original article from

THThe Hacker News
Read Full Article

Also covered by

SESecurity Affairs

Russia-linked APT uses DRILLAPP backdoor to spy on Ukrainian targets

Read Article
THThe Record

Russia-linked espionage campaign targeting Ukraine using Starlink and charity lures

Read Article

Related Pings

MEDIUMThreat Intel

Researchers Roast Cybercriminals to Diminish Their Glamour

Researchers are roasting cybercriminals to diminish their glamor. This humorous approach aims to expose their failures and fracture trust within criminal networks. It's a fresh take on cybersecurity, focusing on education and awareness.

The Register Security·
HIGHThreat Intel

Node.js Maintainers Targeted - Sophisticated Social Engineering Scheme

A coordinated social engineering scheme is targeting Node.js developers, risking the integrity of widely used software packages. This alarming trend highlights the need for vigilance in the open-source community.

Cyber Security News·
HIGHThreat Intel

Transparent Tribe Targets India's Startup Ecosystem - New Threat

Acronis reveals that Transparent Tribe is now targeting India's startup sector, especially cybersecurity firms. This shift raises concerns about espionage and data security risks. Startups must bolster their defenses against these sophisticated attacks.

CyberWire Daily·
HIGHThreat Intel

Gaming Industry - High-Stakes Cybersecurity Threats Explained

Cybercriminals are increasingly targeting the gaming industry, driven by financial transactions and sensitive data. As casinos go digital, understanding these threats is vital for operators to safeguard their assets.

Cyber Security News·
HIGHThreat Intel

China-Linked TA416 Targets European Governments with Phishing

TA416, a China-aligned threat actor, is targeting European governments with sophisticated phishing campaigns using PlugX malware. This poses significant risks to diplomatic security. Stay informed to safeguard your organization.

The Hacker News·
HIGHThreat Intel

Spear-Phishing Campaign Neutralizes MFA for Executives

A new spear-phishing campaign is targeting senior executives, neutralizing MFA protections. This poses serious risks to corporate security. Organizations must enhance their defenses against such sophisticated threats.

SC Media·