ESET Research has identified a new cyber-espionage campaign conducted by FrostyNeighbor, a sophisticated advanced persistent threat (APT) group aligned with Belarus. The group, also widely known as Ghostwriter or UNC1151, is targeting governmental and military entities in Poland and Ukraine. This latest campaign, active since at least March 2026, demonstrates a significant evolution in the group's tactics. They have shifted from macro-based attacks to using spear-phishing emails with PDF lures that link to malicious infrastructure. A key innovation is the deployment of a new JavaScript version of their PicassoLoader downloader, which is ultimately used to install the Cobalt Strike beacon for long-term intelligence gathering.
Threat Actor: FrostyNeighbor, a state-sponsored group attributed to Belarus. This group is well-known and tracked under multiple aliases, including Ghostwriter, UNC1151, Storm-0257, and TA445. Their primary objective is cyber-espionage and information operations, historically targeting NATO countries and nations critical of the Belarusian and Russian regimes.
Targets: The current campaign specifically targets government and military organizations in Poland and Ukraine, continuing the group's focus on entities relevant to the geopolitical conflict in Eastern Europe.
Attack Vector: The campaign begins with spear-phishing emails (T1566.002 - Spearphishing Link). The emails contain blurry PDF attachments that act as lures, impersonating legitimate organizations like the Ukrainian telecommunications provider Ukrtelecom. These PDFs contain links that direct the victim to attacker-controlled infrastructure.
This campaign showcases FrostyNeighbor's continuous adaptation to bypass security defenses.
Initial Lure: Instead of traditional macro-enabled documents, the attackers use simple PDF files with embedded links. This approach is designed to circumvent security solutions that are highly focused on blocking malicious macros.
Server-Side Validation: A notable TTP is the use of server-side victim validation. When a victim clicks the link, the attacker's server performs fingerprinting on the connecting system. If the system does not match the profile of a desired target (e.g., it appears to be a sandbox or a security researcher's machine), the final payload is not delivered. This selective delivery (T1608.004 - Stage Capabilities) makes the campaign harder to analyze and increases its operational security.
Evolved Payload: For validated targets, the server delivers a new JavaScript-based version of PicassoLoader. This marks a shift from previous versions and is likely intended to evade signature-based detection. PicassoLoader acts as a downloader, responsible for fetching and executing the next stage of the attack.
Final Payload: The ultimate goal is to deploy the Cobalt Strike beacon. This powerful post-exploitation framework provides the attackers with a wide range of capabilities for lateral movement, credential theft, and data exfiltration, enabling long-term espionage within the compromised network (T1059.001 - PowerShell, T1027 - Obfuscated Files or Information).
The primary goal of the FrostyNeighbor campaign is espionage. A successful breach of a government or military network in Poland or Ukraine could lead to:
No specific Indicators of Compromise (IPs, domains, hashes) were mentioned in the source articles.
Security teams may want to hunt for activity related to the FrostyNeighbor group. The following patterns could indicate related activity:
.js) by wscript.exe or cscript.exe, especially if they are downloaded from the internet or initiated from a browser process. Monitor for PowerShell execution patterns associated with Cobalt Strike loaders.Outlook.exe -> Acrobat.exe -> chrome.exe -> wscript.exe). D3FEND's Process Spawn Analysis is relevant here.M1017) Educate users about the risks of clicking links in unsolicited emails and attachments, even if they appear to be simple PDF documents.M1038) Where possible, use application control solutions to restrict the execution of scripting engines like wscript.exe and cscript.exe for most users.M1030) Segment networks to limit an attacker's ability to move laterally if an initial compromise occurs.Train users to recognize and report phishing attempts, especially those using lures relevant to their work or region.
Use web proxies and DNS filtering to block access to newly registered or known malicious domains used for payload delivery.
Use application allowlisting to prevent the execution of unauthorized scripts and executables, including scripting engines like wscript.exe.
Ensure endpoint security solutions are up-to-date and configured to detect and block known loaders like PicassoLoader and post-exploitation frameworks like Cobalt Strike.
The latest wave of attacks by FrostyNeighbor against Poland and Ukraine begins.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.