On March 6, 2026, the cybersecurity community observed the emergence of two separate, yet significant, threats. The first is a targeted campaign, believed to be Russian-led, against organizations in Ukraine. This campaign utilizes two new malware families, dubbed BadPaw and MeowMeow, delivered via a phishing email with a decoy document. The malware's goal is to establish a persistent backdoor for remote control. The second threat is the appearance of Starkiller, a sophisticated new phishing tool designed to systematically bypass multi-factor authentication (MFA). Starkiller employs advanced adversary-in-the-middle (AiTM) techniques to steal session tokens, allowing attackers to hijack authenticated sessions and gain full access to protected accounts. While the two threats are not directly linked, they represent the continuous evolution of both nation-state attack tools and the broader cybercrime-as-a-service market.
This campaign is a classic example of targeted espionage. The use of a decoy document relevant to the target (a Ukrainian border crossing document) increases the likelihood of success. The malware itself employs anti-analysis techniques to evade detection in automated sandbox environments, indicating a degree of sophistication.
The immediate goal is to establish a foothold within Ukrainian organizations for espionage, data theft, or potential future disruptive operations. The compromise of government or critical infrastructure networks could provide valuable intelligence to the Russian state.
Starkiller represents the ongoing commoditization of advanced attack tools. Like the recently disrupted Tycoon 2FA platform, Starkiller allows low-skilled attackers to defeat MFA, which is a cornerstone of modern security. It does this by acting as a proxy between the victim and the real login page.
Starkiller's methodology is a textbook AiTM attack:
T1539 - Steal Web Session Cookie).Starkiller reportedly uses headless browsers to automate parts of this process, making it highly efficient and scalable.
The proliferation of tools like Starkiller democratizes advanced cybercrime. It means that any organization, regardless of size, can be targeted with attacks that bypass MFA. This dramatically increases the risk of Business Email Compromise (BEC), data breaches, and subsequent ransomware attacks, as account takeovers become easier to achieve.
User Geolocation Logon Pattern Analysis is key.To defend against tools like Starkiller, organizations must upgrade to phishing-resistant MFA (FIDO2/WebAuthn).
Deploy EDR solutions to detect and block the execution of new malware families like BadPaw and MeowMeow.
Train users in targeted regions like Ukraine to be extra vigilant about documents related to border crossings or official matters.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats