Executive Summary
Between October and December 2025, Ukrainian defense forces were targeted by cyber espionage campaigns conducted by the Russian-linked group known as Void Blizzard (aka Laundry Bear or UAC-0190). Using popular messaging platforms Signal and WhatsApp, attackers posed as charity organizations and tricked victims into downloading password-protected archives containing a Python-based backdoor, PLUGGYAPE. The malware, distributed through well-crafted social engineering and employing techniques such as obfuscated payloads and anti-analysis, enabled remote command execution and data theft. Attackers further enhanced operational security using external paste services for command-and-control server updates, rendering infrastructure takedowns less effective while maintaining persistent access on compromised hosts.
This breach underscores the growing sophistication of social engineering and the exploitation of widely trusted communication platforms for initial access. The incident highlights not only ongoing threat activity against critical state functions but also the evolving nature of cyber threats adapting to countermeasures, necessitating enhanced vigilance and reformulated defense postures across the public and private sectors.
Why This Matters Now
This incident demonstrates the urgent threat posed by highly targeted social engineering campaigns leveraging trusted messaging apps, which are now common entry points for military and critical infrastructure attacks. With threat actors rapidly evolving techniques and enhancing operational security, organizations must accelerate detection capabilities and reevaluate incident response strategies to address such stealthy and persistent threats.
Attack Path Analysis
The PLUGGYAPE campaign began with spear-phishing via Signal and WhatsApp to socially engineer Ukrainian Defense Forces into downloading malicious archives, leading to initial host compromise. Upon execution, the malware potentially abused local user privileges to persist and evade detection. Once established, the attackers could move laterally to other systems by leveraging the compromised host’s access or credentials. The malware established robust command and control through encrypted WebSocket and MQTT channels, retrieving up-to-date server addresses from paste services for operational resilience. Sensitive files and credentials were likely exfiltrated, potentially using techniques like encoded HTTP or covert channels. The final impact enabled adversaries to maintain persistence and provide ongoing access for espionage or destructive activity.
Kill Chain Progression
Initial Compromise
Description
Adversaries sent tailored phishing messages via Signal/WhatsApp impersonating charities to deliver password-protected malware archives which, when executed, infected the target system.
Related CVEs
CVE-2025-27920
CVSS 8.8A vulnerability in the Evilginx framework allows attackers to intercept authentication credentials and session cookies, enabling unauthorized access to user accounts.
Affected Products:
Evilginx Evilginx – < 2.4.0
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Phishing: Spearphishing Attachment
User Execution: Malicious File
Obfuscated Files or Information
Subvert Trust Controls: Mark-of-the-Web Bypass
Web Service: Dead Drop Resolver
Application Layer Protocol: Web Protocols
Command and Scripting Interpreter: Windows Command Shell
Automated Exfiltration
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Implement automated audit trails for all system components
Control ID: 10.2.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy Required
Control ID: 500.03
DORA (EU Digital Operational Resilience Act) – ICT risk management framework
Control ID: Article 10
CISA ZTMM 2.0 – Continuous Authentication and Access Monitoring
Control ID: Identity Pillar – User Behavior Analytics
NIS2 Directive – Incident handling and reporting
Control ID: Article 21(2)(d)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Defense/Space
Primary target of PLUGGYAPE malware campaign via Signal/WhatsApp, requiring enhanced encrypted traffic monitoring and zero trust segmentation for military communications.
Government Administration
Ukrainian local governments targeted by UAC-0239 phishing campaigns, necessitating improved egress security and threat detection capabilities for official communications systems.
Higher Education/Acadamia
Educational institutions compromised by UAC-0241 spear-phishing using LaZagne password recovery tools, requiring multicloud visibility and anomaly detection for campus networks.
Telecommunications
Communication infrastructure exploited through legitimate messaging platforms and mobile operators, demanding inline IPS protection and east-west traffic security measures.
Sources
- PLUGGYAPE Malware Uses Signal and WhatsApp to Target Ukrainian Defense Forceshttps://thehackernews.com/2026/01/pluggyape-malware-uses-signal-and.htmlVerified
- New Russia-affiliated actor Void Blizzard targets critical sectors for espionagehttps://www.microsoft.com/en-us/security/blog/2025/05/27/new-russia-affiliated-actor-void-blizzard-targets-critical-sectors-for-espionage/Verified
- Microsoft Issues on Void Blizzard Hackers Targeting Telecommunications and IT Sectorshttps://cyberpress.org/microsoft-issues-on-void-blizzard-hackers/Verified
- Void Blizzard Cyberespionage: Targeting Critical Sectors and Systems in Europe and North Americahttps://www.rescana.com/post/void-blizzard-cyberespionage-targeting-critical-sectors-and-systems-in-europe-and-north-americaVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Zero Trust segmentation, east-west traffic security, advanced egress policy enforcement, and real-time threat detection would have constrained PLUGGYAPE at multiple points—from initial access to C2 and exfiltration—limiting the blast radius and providing actionable visibility and response opportunities.
Control: Multicloud Visibility & Control
Mitigation: Early detection of anomalous inbound or shadow communication flows.
Control: Threat Detection & Anomaly Response
Mitigation: Detection of privilege abuse and suspicious process execution.
Control: Zero Trust Segmentation
Mitigation: Lateral movement blocked by granular identity-based segmentation.
Control: Egress Security & Policy Enforcement
Mitigation: Outbound C2 attempts containing unknown protocols or destinations are detected and blocked.
Control: Inline IPS (Suricata)
Mitigation: Malicious data flows and known exfiltration signatures are detected and terminated in real time.
Automated enforcement and incident response reduce dwell time and contain potential damage.
Impact at a Glance
Affected Business Functions
- Communications
- Defense Operations
- Government Services
- Healthcare Services
- Transportation
Estimated downtime: 7 days
Estimated loss: $5,000,000
Potential exposure of sensitive communications, defense strategies, government documents, patient records, and transportation logistics.
Recommended Actions
Key Takeaways & Next Steps
- • Implement zero trust segmentation and granular east-west traffic controls to contain malware spread post-compromise.
- • Deploy robust egress filtering and protocol restrictions to prevent C2 establishment and data exfiltration via covert or dynamic channels.
- • Enhance real-time threat detection and anomaly response capabilities to identify privilege abuse and suspicious lateral movement.
- • Centralize observability across multicloud and hybrid networks to rapidly detect and respond to abnormal behaviors and shadow communications.
- • Regularly validate and update policy enforcement to ensure operational resilience against advanced phishing and evolving malware TTPs.



