Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Dust Specter targets Iraqi officials with new SPLITDROP and GHOSTFORM malware

Large-scale language model for Estonia’s sovereign AI infrastructure

Tracking Saharan dust plumes across Europe

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » APT28-related campaign deploys BadPaw Loader and MeowMeow backdoor in Ukraine
Identity

APT28-related campaign deploys BadPaw Loader and MeowMeow backdoor in Ukraine

userBy userMarch 5, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 5, 2026Cyber ​​espionage/threat intelligence

Cybersecurity researchers have revealed details of a new Russian cyber campaign targeting organizations in Ukraine using two previously undocumented malware families, BadPaw and MeowMeow.

“The attack chain begins with a phishing email containing a link to a ZIP archive. Once extracted, the first HTA file displays a decoy document written in Ukrainian with a border-crossing complaint to deceive the victim,” ClearSky said in a report released this week.

In parallel, the attack chain leads to the deployment of a .NET-based loader called BadPaw, which then establishes communication with a remote server to fetch and deploy an advanced backdoor called MeowMeow.

This campaign is believed with moderate confidence to be the work of a Russian state-sponsored threat actor known as APT28, based on the targeted footprint, the geopolitical nature of the decoys used, and overlap with techniques observed in previous Russian cyber operations.

The starting point of the attack sequence is a phishing email sent from ukr[.]This is likely an attempt to establish credibility and secure the trust of the targeted victim. The message contains a link purporting to be a ZIP file that redirects the user to a URL that loads a “very small image,” effectively acting as a tracking pixel to notify the operator that the link has been clicked.

Once this step is completed, the victim will be redirected to a secondary URL where the archive will be downloaded. The ZIP file contains an HTML application (HTA) that, when launched, drops a decoy document as a distraction mechanism while running subsequent stages in the background.

“The dropped decoy document acts as a social engineering tactic, offering confirmation of receipt of government appeals regarding border crossings in Ukraine,” ClearSky said. “This lure is meant to maintain some ostensible legitimacy.”

HTA files also run checks to prevent them from running in a sandbox environment. This is done by querying the Windows registry key “KLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\InstallDate” to estimate the “age” of the operating system. This malware is designed to stop running within 10 days of being installed on the system.

If the system meets environmental standards, the malware finds the downloaded ZIP archive, extracts two files from it (Visual Basic Script (VBScript) and a PNG image) and saves them to disk with different names. It also creates a scheduled task that runs VBScript as a way to ensure persistence on infected systems.

The main role of VBScript is to extract malicious code embedded in PNG images. An obfuscated loader called BadPaw can connect to a command and control (C2) server and download additional components, including an executable named MeowMeow.

“Consistent with the ‘BadPaw’ tradecraft, when this file is executed independently of the entire attack chain, a dummy code sequence is initiated,” the Israeli cybersecurity firm explained. “This decoy run displays a graphical user interface (GUI) featuring a photo of a cat, matching the visual theme of the initial image file from which the primary malware was extracted.”

“When you click on the ‘meow meow’ button within the decoy GUI, the application simply displays a ‘meow meow meow’ message and takes no further malicious action. This acts as a secondary functional decoy to mislead manual analysis.”

The backdoor’s malicious code only becomes active when executed with a specific parameter (‘-v’) provided by the initial infection chain and after ensuring that it is running on a real endpoint rather than a sandbox, and that no forensic or monitoring tools such as Wireshark, Procmon, Ollydbg, or Fiddler are running in the background.

At the core of MeowMeow is the ability to remotely execute PowerShell commands on compromised hosts and support file system operations such as reading, writing, and deleting data. ClearSky said it had identified Russian strings in the source code, supporting its assessment that the activity was the work of Russian-speaking attackers.

“The presence of these Russian strings suggests two possibilities: either the attackers committed an operational security (OPSEC) error by failing to localize the code for the Ukrainian target environment, or they inadvertently left Russian artifacts in the code during the malware’s production.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleLivermore Computing: Accelerating excellence in HPC
Next Article Tracking Saharan dust plumes across Europe
user
  • Website

Related Posts

Dust Specter targets Iraqi officials with new SPLITDROP and GHOSTFORM malware

March 5, 2026

Europol-led operation destroys Tycoon 2FA Phishing-as-a-Service, linked to 64,000 attacks

March 5, 2026

FBI and Europol seize LeakBase forum used to trade stolen credentials

March 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Dust Specter targets Iraqi officials with new SPLITDROP and GHOSTFORM malware

Large-scale language model for Estonia’s sovereign AI infrastructure

Tracking Saharan dust plumes across Europe

APT28-related campaign deploys BadPaw Loader and MeowMeow backdoor in Ukraine

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.