Russian Hackers Target Ukrainian Military with "PluggyApe" Malware

Void Blizzard (UAC-0190) Targets Ukrainian Defense Forces with PluggyApe Malware via Charity-Themed Lures

HIGH
January 14, 2026
4m read
Threat ActorMalwareCyberattack

Related Entities

Threat Actors

Void BlizzardLaundry BearUAC-0190

Organizations

CERT-UAUkrainian Defense Forces

Products & Tech

SignalWhatsAppPyInstallerPastebin

Full Report

Executive Summary

Ukraine's Computer Emergency Response Team (CERT-UA) has issued an alert regarding a targeted cyber-espionage campaign against the Ukrainian Defense Forces. The campaign, attributed to the Kremlin-linked threat group Void Blizzard (also known as Laundry Bear and tracked by Ukraine as UAC-0190), was active between October and December 2025. The attackers have shifted tactics from mass phishing to highly personalized social engineering, directly contacting military personnel on encrypted messaging apps like Signal and WhatsApp. Posing as representatives of charitable foundations, the attackers lure targets into downloading a new malware backdoor named PluggyApe. This malware provides persistent remote access to the victim's machine, enabling data exfiltration and further command execution, directly supporting Russian intelligence-gathering efforts in the ongoing conflict.

Threat Overview

The campaign demonstrates a significant evolution in social engineering tradecraft. Void Blizzard operators are no longer relying on impersonal, large-scale email campaigns. Instead, they are:

  • Making Direct Contact: Using secure messaging apps like Signal and WhatsApp to initiate conversations.
  • Building Trust: Leveraging compromised accounts, Ukrainian phone numbers, and speaking fluent Ukrainian. They engage in detailed conversations, sometimes including audio or video calls, to establish credibility.
  • Using Themed Lures: Impersonating legitimate charitable foundations supporting the Ukrainian military, a theme designed to resonate strongly with their targets.

Once trust is established, the attacker directs the target to a fake charity website to download a document, which is actually the PluggyApe malware disguised with an icon like a .docx file (e.g., as a .docx.pif file), often delivered within a password-protected archive to evade initial security scans (T1566.001).

Technical Analysis

PluggyApe is a backdoor built using PyInstaller, which bundles a Python script into a standalone executable. Its primary functions include:

  • Persistence: It establishes persistence on the infected system by creating or modifying Windows Registry keys, typically in the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run path, ensuring it runs every time the user logs in (T1547.001).
  • Data Exfiltration: Upon execution, it gathers system information (e.g., hostname, username, OS version) and exfiltrates it to a command-and-control (C2) server.
  • Remote Access: It acts as a backdoor, allowing the attacker to send further commands to the compromised machine, such as downloading additional payloads or searching for and exfiltrating specific files.

An updated version observed in December 2025 showed improved obfuscation and a more dynamic C2 mechanism, using services like Pastebin to fetch the C2 server address, making it harder for defenders to block.

Impact Assessment

This campaign poses a direct threat to Ukraine's national security. By compromising the devices of military personnel, Void Blizzard can:

  • Steal sensitive military intelligence, such as troop movements, operational plans, and personnel information.
  • Gain insight into military communications and strategies.
  • Use the compromised devices as a pivot point to attack broader military networks.
  • Conduct psychological operations by spreading disinformation through compromised accounts.

The highly targeted and personal nature of the social engineering makes this campaign particularly dangerous and difficult to defend against with technology alone.

Detection & Response

  • Endpoint Detection: EDR solutions should be configured to alert on the creation of .pif files or executables with double extensions. Monitor for processes making modifications to the CurrentVersion\Run registry key. This aligns with D3-SFA: System File Analysis.
  • Network Monitoring: Block or alert on outbound connections to text-sharing sites like Pastebin from processes other than web browsers. This could indicate a malware variant like PluggyApe attempting to fetch its C2 address.
  • User Training: This is the most critical defense. Military personnel must be trained to be extremely skeptical of unsolicited contact, even on secure messaging apps and from apparently friendly sources. All requests to download files or visit websites from unknown contacts should be treated as suspicious.

Mitigation

  1. Execution Prevention: Configure systems to block the execution of files from untrusted sources or with suspicious extensions like .pif. Use application control solutions to allowlist known-good applications, preventing unknown malware like PluggyApe from running. This is a direct application of D3-EAL: Executable Allowlisting.
  2. Verify, Then Trust: Instruct personnel to never download files or click links from unsolicited contacts without independent verification of the sender's identity through an official channel.
  3. Disable Scripting: Where possible, disable scripting environments like PowerShell for standard users to prevent the execution of malicious scripts downloaded by a first-stage payload.
  4. Limit Local Admin Rights: Ensure that military personnel do not use accounts with local administrator privileges for daily tasks. This can limit a malware's ability to establish persistence and access sensitive system files.

Timeline of Events

1
October 1, 2025
The start of the observed PluggyApe campaign against the Ukrainian Defense Forces.
2
December 31, 2025
The end of the observed campaign period, with an updated version of PluggyApe noted in December.
3
January 13, 2026
CERT-UA and security media report on the Void Blizzard campaign.
4
January 14, 2026
This article was published

MITRE ATT&CK Mitigations

Training military personnel to be skeptical of unsolicited contact and verify identities is the primary defense against this social engineering-heavy campaign.

Using application allowlisting to prevent the execution of unknown executables like PluggyApe is a powerful technical control.

Mapped D3FEND Techniques:

While attackers use packers like PyInstaller to evade signatures, up-to-date AV/AM solutions may detect the malware based on heuristics or updated signatures.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

Given that the PluggyApe campaign relies on tricking a user into running a novel executable, Executable Allowlisting is a highly effective, albeit stringent, countermeasure. On endpoints used by high-risk personnel, such as those in the Ukrainian Defense Forces, system administrators should configure application control policies (like Windows Defender Application Control) to only permit the execution of known, signed, and approved software. This would prevent the PluggyApe.pif executable from running, regardless of how convincing the social engineering was. This shifts the security posture from trying to detect 'bad' to only allowing 'known good,' which is a powerful defense against new and unknown malware.

To counter the malware's C2 communication, especially the updated version's use of Pastebin, organizations should implement targeted outbound traffic filtering. On endpoint firewalls or network proxies, create a rule to block or generate a high-priority alert for any connection to pastebin.com or api.pastebin.com that does not originate from a standard web browser process (e.g., chrome.exe, firefox.exe). A script or a PyInstaller executable making this connection is highly anomalous and a strong indicator of malware like PluggyApe attempting to fetch its C2 instructions. This targeted filtering can break the attack chain post-infection, preventing the attacker from taking control of the compromised system.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Void BlizzardPluggyApeUkraineRussiaCyber EspionageMalwareCERT-UA

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading