Ukraine's Computer Emergency Response Team (CERT-UA) has issued an alert regarding a targeted cyber-espionage campaign against the Ukrainian Defense Forces. The campaign, attributed to the Kremlin-linked threat group Void Blizzard (also known as Laundry Bear and tracked by Ukraine as UAC-0190), was active between October and December 2025. The attackers have shifted tactics from mass phishing to highly personalized social engineering, directly contacting military personnel on encrypted messaging apps like Signal and WhatsApp. Posing as representatives of charitable foundations, the attackers lure targets into downloading a new malware backdoor named PluggyApe. This malware provides persistent remote access to the victim's machine, enabling data exfiltration and further command execution, directly supporting Russian intelligence-gathering efforts in the ongoing conflict.
The campaign demonstrates a significant evolution in social engineering tradecraft. Void Blizzard operators are no longer relying on impersonal, large-scale email campaigns. Instead, they are:
Once trust is established, the attacker directs the target to a fake charity website to download a document, which is actually the PluggyApe malware disguised with an icon like a .docx file (e.g., as a .docx.pif file), often delivered within a password-protected archive to evade initial security scans (T1566.001).
PluggyApe is a backdoor built using PyInstaller, which bundles a Python script into a standalone executable. Its primary functions include:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run path, ensuring it runs every time the user logs in (T1547.001).An updated version observed in December 2025 showed improved obfuscation and a more dynamic C2 mechanism, using services like Pastebin to fetch the C2 server address, making it harder for defenders to block.
This campaign poses a direct threat to Ukraine's national security. By compromising the devices of military personnel, Void Blizzard can:
The highly targeted and personal nature of the social engineering makes this campaign particularly dangerous and difficult to defend against with technology alone.
.pif files or executables with double extensions. Monitor for processes making modifications to the CurrentVersion\Run registry key. This aligns with D3-SFA: System File Analysis..pif. Use application control solutions to allowlist known-good applications, preventing unknown malware like PluggyApe from running. This is a direct application of D3-EAL: Executable Allowlisting.Training military personnel to be skeptical of unsolicited contact and verify identities is the primary defense against this social engineering-heavy campaign.
Using application allowlisting to prevent the execution of unknown executables like PluggyApe is a powerful technical control.
Mapped D3FEND Techniques:
While attackers use packers like PyInstaller to evade signatures, up-to-date AV/AM solutions may detect the malware based on heuristics or updated signatures.
Mapped D3FEND Techniques:
Given that the PluggyApe campaign relies on tricking a user into running a novel executable, Executable Allowlisting is a highly effective, albeit stringent, countermeasure. On endpoints used by high-risk personnel, such as those in the Ukrainian Defense Forces, system administrators should configure application control policies (like Windows Defender Application Control) to only permit the execution of known, signed, and approved software. This would prevent the PluggyApe.pif executable from running, regardless of how convincing the social engineering was. This shifts the security posture from trying to detect 'bad' to only allowing 'known good,' which is a powerful defense against new and unknown malware.
To counter the malware's C2 communication, especially the updated version's use of Pastebin, organizations should implement targeted outbound traffic filtering. On endpoint firewalls or network proxies, create a rule to block or generate a high-priority alert for any connection to pastebin.com or api.pastebin.com that does not originate from a standard web browser process (e.g., chrome.exe, firefox.exe). A script or a PyInstaller executable making this connection is highly anomalous and a strong indicator of malware like PluggyApe attempting to fetch its C2 instructions. This targeted filtering can break the attack chain post-infection, preventing the attacker from taking control of the compromised system.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats