In early March 2026, Israeli cybersecurity firm ClearSky published technical findings on a campaign that had been quietly targeting Ukrainian entities using tooling that had never been seen before. The two malware families at the center of the operation — a .NET-based loader called BadPaw and a backdoor called MeowMeow — represent the kind of purpose-built, layered attack architecture that defines state-sponsored espionage. The campaign was not loud. It was designed specifically to avoid detection, to blend into ordinary network behavior, and to self-terminate if it sensed it was being studied. That restraint, combined with the targeting profile and Russian-language artifacts found in the code, points researchers toward one of the most consequential threat actors in the world: APT28.
This briefing walks through the full technical infection chain from initial phishing email to backdoor deployment, examines what the malware actually does once inside a system, explores what the Russian-language strings in the source code reveal, and places this campaign in the context of APT28's long and well-documented history of targeting Ukraine and its allies.
Who Is APT28?
Before examining the malware itself, context matters. APT28 — also tracked as Fancy Bear, Sofacy, Sednit, STRONTIUM, Forest Blizzard, BlueDelta, and Pawn Storm — is not an ordinary criminal hacking group. It is an arm of the Russian state.
The group has been formally attributed to GRU Unit 26165, the 85th Main Special Service Center (GTsSS) of Russia's military intelligence directorate. Two separate U.S. Department of Justice indictments targeted GRU officers linked to APT28 activity: a July 2018 Mueller indictment named twelve GRU officers from Units 26165 and 74455 for election interference operations, and an October 2018 indictment charged seven additional Unit 26165 officers — including Aleksei Morenets, Evgenii Serebriakov, Ivan Yermakov, Artem Malyshev, and Dmitriy Badin — for hacking anti-doping agencies, the OPCW, and a U.S. nuclear fuel supplier. CrowdStrike, Mandiant, SecureWorks, ThreatConnect, and the UK's National Cyber Security Centre have all independently attributed the group to Russian military intelligence.
APT28 has been operationally active since at least 2004, with some researchers tracing precursor activity into the late 1990s. Its targeting is tightly aligned with Kremlin foreign policy objectives: election interference in the United States, France, and Germany; attacks on Olympic anti-doping bodies after Russia's doping scandal; credential theft from NATO member governments; and sustained, ongoing targeting of Ukrainian military, government, and infrastructure entities since at least 2014. Since Russia's full-scale invasion of Ukraine in February 2022, the group's operational tempo against Ukrainian targets has dramatically intensified.
Paul Chichester, NCSC Director of Operations, warned in May 2025 that the campaign posed serious risk to organizations coordinating aid to Ukraine — framing the threat as extending well beyond Ukrainian borders. — UK NCSC / 21-nation joint advisory, May 2025
That broader pattern — years of sustained, intelligence-driven cyber operations against Ukraine and its supporters — is the context in which BadPaw and MeowMeow must be understood. This is not an isolated campaign. It is one node in a persistent, state-directed espionage effort.
The Phishing Hook: Exploiting the War's Paper Trail
The campaign begins with a phishing email sent from an address hosted on ukr[.]net, one of Ukraine's largest and most widely used email providers. The use of a legitimate Ukrainian email service is deliberate: it provides immediate credibility and makes sender-based filtering significantly harder. ClearSky notes that ukr[.]net has been abused in prior Russian-linked campaigns, including previous APT28 operations targeting Ukrainian government entities for credential harvesting.
The email contains a link that appears to lead to a downloadable ZIP archive. But before any file ever reaches the victim's machine, the link first loads a small, invisible image — a tracking pixel. This pixel fires a notification back to the attackers the moment the victim clicks the link, confirming that a real human being has engaged with the email rather than an automated security scanner. Only after that confirmation does the victim get redirected to a shortened URL that actually delivers the ZIP archive.
The tracking pixel layer serves a dual purpose: it filters out automated security sandbox visits before malware delivery even begins, and it gives the operators real-time confirmation of victim engagement — improving both operational efficiency and stealth. This is standard advanced persistent threat practice, not commodity malware behavior.
Inside the ZIP archive is what appears to be an ordinary HTML file. It is not. It is an HTA (HTML Application) file — a Windows-native file type that executes as a program rather than rendering in a browser. The disguise as a standard HTML document is a classic living-off-the-land technique designed to slip past file-type-based inspection tools.
When the victim opens the HTA file, two things happen simultaneously. First, a Ukrainian-language document appears on screen, styled to look like an official government communication confirming receipt of a border crossing appeal. The geopolitical specificity of this lure is notable: border crossing procedures are a topic of genuine, immediate concern to many Ukrainians during the ongoing war, making the document highly plausible to its intended recipients. Second, and invisibly, the infection chain begins executing in the background.
ClearSky's analysis describes two simultaneous execution paths from the HTA file: a visible Ukrainian-language government document shown to the victim, and an invisible infection chain running in the background without any visible indication. — ClearSky Research Report, March 2026
Stage One: BadPaw and the Steganographic Payload
While the victim reads the decoy document, the HTA file triggers the download of a .NET-based malware loader that researchers named BadPaw. The loader does not arrive alone — it arrives alongside a Visual Basic Script (VBScript) and a PNG image file, both of which are extracted from the downloaded ZIP archive and saved to disk under names designed to blend with legitimate system files.
To establish persistence, the malware creates a scheduled task that will automatically re-execute the VBScript on a defined schedule. This means even if the user closes the visible window or restarts the machine, the infection chain will re-trigger without any further user interaction.
The VBScript's primary job is to extract the actual malicious payload from the PNG image using steganography — a technique that hides data inside an ordinary-looking image file in a way that is invisible to the naked eye and difficult to detect without knowing what to look for. The extracted payload is the BadPaw loader itself, a PE (Portable Executable) file that was concealed inside what appeared to be an innocuous image.
Standard antivirus tools that scan for malicious file types or known signatures will not flag a PNG image containing a steganographically hidden executable. This delivery method is specifically chosen to bypass file-based detection. Organizations relying on signature-based endpoint protection alone are poorly positioned to catch this technique.
BadPaw itself is protected by .NET Reactor, a legitimate commercial tool designed to obfuscate .NET assemblies and prevent reverse engineering. Using a commercial obfuscator rather than a custom one is a deliberate choice: it makes the malware harder to analyze in static analysis tools, and because .NET Reactor is a legitimate product, its presence on a system does not by itself raise red flags in most security products. At the time of ClearSky's initial analysis, only nine antivirus engines flagged the BadPaw sample as malicious — a detection rate low enough to confirm how effectively the obfuscation and delivery method suppressed endpoint visibility.
BadPaw also has its own decoy layer, a detail that has been underreported in secondary coverage. When executed outside the intended attack chain — that is, without the specific -renew parameter that activates its malicious logic — BadPaw does not crash or produce an error. Instead, it launches a functional-looking graphical interface for what appears to be a "Regex Finder" tool, allowing a user to upload files and search for regex patterns. The decoy is interactive enough to mislead a researcher who encounters the binary in isolation. Only when launched with the correct parameter does BadPaw begin its malicious sequence. This mirrors the same deception philosophy applied to MeowMeow: both components are independently defensible against casual analysis.
Once running, BadPaw performs several checks before proceeding. It queries the Windows registry key HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\InstallDate to determine how long ago the operating system was installed. If the system appears to have been installed less than ten days prior, the malware assumes it is running inside a freshly-provisioned analysis sandbox and immediately terminates. This is a clever and practical sandbox evasion method that requires no special tooling — it simply reads a standard registry value that malware researchers routinely overlook when configuring analysis environments.
If the environment passes that check, BadPaw contacts a remote command-and-control (C2) server through a multi-stage communication sequence to fetch and deploy its final payload: MeowMeow. According to Infosecurity Magazine's reporting on the ClearSky findings, this C2 sequence is notably structured: BadPaw first retrieves a numeric response from a /getcalendar endpoint, then accesses a landing page titled "Telemetry UP!" via a /eventmanager endpoint, and finally downloads ASCII-encoded payload data embedded within the HTML of that page. A third endpoint, /planneractivate, provides configuration data that is written to a separate file on disk alongside the raw ASCII data from /eventmanager. The decoded data from that ASCII payload becomes MeowMeow itself, dropped to disk as MeowMeowProgram[.]exe. This three-endpoint retrieval pattern — benign-looking names, configuration separated from payload, ASCII encoding inside HTML — is specifically designed to evade network-layer inspection tools that look for binary file transfers or suspicious URIs.
# MITRE ATT&CK techniques used in the BadPaw stage:
T1566.001 — Phishing: Spearphishing Link (initial delivery)
T1218.005 — System Binary Proxy Execution: Mshta (HTA execution)
T1053.005 — Scheduled Task/Job (persistence mechanism)
T1059.005 — Command and Scripting Interpreter: VBScript
T1140 — Deobfuscate/Decode Files or Information (steganography)
T1497 — Virtualization/Sandbox Evasion (registry install date check)
T1071.001 — Application Layer Protocol: Web Protocols (C2 via HTTP /getcalendar and /eventmanager endpoints)
T1132.001 — Data Encoding: Standard Encoding (ASCII-encoded payload embedded in HTML response)
Stage Two: The MeowMeow Backdoor
MeowMeow is the campaign's final payload and its primary intelligence-gathering instrument. Like BadPaw, it is protected with .NET Reactor to frustrate analysis. Unlike BadPaw, it is a full-featured backdoor capable of giving operators persistent, interactive remote access to compromised systems.
MeowMeow will only activate under specific conditions. It must be launched with a particular command-line parameter — -v — that is supplied by the BadPaw loader as part of the infection chain. If someone runs the MeowMeow executable independently, without that parameter, it does not throw an error or crash. Instead, it displays a benign graphical user interface featuring a picture of a cat — specifically, a cat image consistent with the same visual theme used in the PNG image from which BadPaw was extracted — and a button labeled "MeowMeow." When that button is clicked, the application produces only the message "Meow Meow Meow" and performs no further action. ClearSky notes this decoy interface is a secondary functional layer designed to mislead security researchers who encounter the file during incident response, making the malware appear harmless when executed outside its intended infection chain context.
Once running with the correct parameter, MeowMeow performs its own environmental checks before activating its backdoor functionality. It scans the running system for the presence of common security analysis and monitoring tools, including Wireshark, ProcMon, OllyDbg, and Fiddler. If any of these tools are detected, MeowMeow terminates execution immediately. It also checks for virtual machine indicators. Only once it has confirmed it is running on what appears to be a legitimate, unmonitored endpoint does it enable its full capabilities.
MeowMeow's active capability set includes remote PowerShell execution, file system read/write/delete operations, and the ability to check for the existence of specific files on the target machine. These capabilities give operators full remote control over a compromised host — sufficient to exfiltrate documents, execute additional payloads, manipulate data, or establish further persistence mechanisms.
The combination of conditional activation, decoy interfaces, and tool-detection logic makes MeowMeow significantly harder to analyze than commodity malware. ClearSky explicitly documents that MeowMeow incorporates four distinct layers of protection, mirroring the defensive philosophy embedded in BadPaw: (1) a unique runtime parameter requirement that keeps the malicious code completely dormant without it; (2) .NET Reactor obfuscation to frustrate static analysis; (3) sandbox and virtual machine detection that causes immediate self-termination; and (4) active scanning for forensic and monitoring tools including Wireshark, ProcMon, OllyDbg, and Fiddler. Researchers cannot simply run it in a standard sandbox and observe its behavior. They must reconstruct the full infection chain — correct parameters, specific environment conditions, absence of analysis tools — before the backdoor will reveal its true capabilities. This is deliberate by design and reflects a level of operational security sophistication consistent with nation-state development.
# MITRE ATT&CK techniques used in the MeowMeow stage:
T1059.001 — Command and Scripting Interpreter: PowerShell
T1083 — File and Directory Discovery
T1070.004 — File Deletion
T1497.001 — System Checks (VM and tool detection)
T1027 — Obfuscated Files or Information (.NET Reactor packer applied to binary)
T1036 — Masquerading (decoy cat GUI; MeowMeowProgram.exe executed as benign-appearing app)
The OPSEC Slip: Russian in the Code
One of the most analytically significant findings in ClearSky's report is the presence of Russian-language strings embedded in the malware source code. These are not external artifacts or borrowed libraries — they are developer-written strings present in the compiled binary, suggesting that whoever wrote BadPaw and MeowMeow works primarily in Russian.
One such string, when translated, reads: "Time to reach working/operational condition: [number] seconds." This is a developer's internal status message, the kind of diagnostic string a programmer writes during development to track how long their code takes to initialize. It was never removed before the malware was deployed against Ukrainian targets.
ClearSky offers two possible explanations. The first is that this represents a genuine operational security failure — a developer mistake in which Russian-language development artifacts were not scrubbed before the malware was finalized for deployment. This type of oversight happens, even in sophisticated operations, when development timelines are compressed or when localization procedures are not rigorously followed.
The second possibility is more nuanced: the strings could be intentional false flags left to mislead attribution. However, ClearSky assesses this as less likely given the context. The strings are diagnostic in nature rather than conspicuous, which reduces the probability that they were planted for attribution purposes. A false flag would more likely include something more obviously "Russian" — a known APT tool name, a recognizable phrase, or a deliberate reference. A developer's internal timer message is exactly the kind of thing that gets overlooked in a code cleanup, not deliberately inserted.
ClearSky's report characterizes the Russian-language strings as either an OPSEC failure or inadvertent development artifacts — diagnostic in nature, the kind of internal code a programmer writes during development and does not scrub before deployment. — ClearSky Cyber Security, March 2026
Earlier research by FireEye on APT28 noted a similar pattern going back years: the group's malware has historically been compiled in a Russian-language build environment and its development activity has correlated with Moscow business hours. The Russian strings in BadPaw and MeowMeow are consistent with that established pattern.
Attribution: How Confident Are Researchers?
ClearSky is careful about the language of attribution. The report states high confidence that the campaign is the work of a Russian state-aligned threat actor, and low confidence that the specific actor is APT28. That distinction matters — and it is a meaningful one that several early secondary reports blurred by characterizing the APT28 attribution as "moderate confidence."
The high-confidence assessment — Russian state origin — rests on three converging factors: the deliberate targeting of Ukrainian organizations using a geopolitically specific lure; the Russian-language artifacts in the malware code; and tactical, technical, and procedural overlaps with techniques previously observed in documented Russian cyber operations.
The low-confidence attribution to APT28 specifically (rather than another Russian state-aligned group such as Sandworm, Gamaredon, or UAC-0252) is based on targeting footprint and technique overlap rather than definitive technical fingerprints like shared infrastructure, reused code modules, or known APT28 C2 domains. The use of ukr[.]net as a phishing delivery platform, specifically, has appeared in prior APT28 campaigns. The overall infection chain architecture — phishing to HTA to loader to backdoor — is consistent with APT28 tradecraft. ClearSky's own published summary on their website explicitly states "low confidence" for the APT28 designation; readers should apply the same qualifier when evaluating any secondary coverage that characterizes this as a stronger attribution.
Low confidence in APT28-specific attribution is normal at the initial disclosure stage and does not diminish the high-confidence finding of Russian state involvement. Researchers publish what is verifiable. As threat intelligence sharing continues and infrastructure is correlated against known APT28 indicators, attribution confidence may increase over subsequent weeks and months. The current low-confidence APT28 assessment should be treated as a floor, not a ceiling — and should not be misread as a ceiling by reporting that elevates it to "moderate confidence."
It is also worth noting the broader concurrent activity. While ClearSky published the BadPaw/MeowMeow findings in early March 2026, Ukraine's Computer Emergency Response Team (CERT-UA) was simultaneously tracking a separate, ongoing campaign against Ukrainian government institutions that had been active since January 2026 — deploying three malware families including the SHADOWSNIFF infostealer, SALATSTEALER (a Go-based credential-harvesting tool operating under a Malware-as-a-Service model that targets browser credentials, active sessions, and cryptocurrency data), and DEAFTICK, a primitive Go-based backdoor for maintaining access on compromised hosts. CERT-UA attributed this separate campaign to UAC-0252. The concurrent activity from at least two distinct Russian-aligned actors targeting Ukrainian entities simultaneously underscores the sustained, multi-front operational tempo of Russian cyber operations against Ukraine.
Simultaneous with both those campaigns, ESET published findings in March 2026 documenting a third concurrent APT28 operation that had been running since April 2024: the BEARDSHELL and COVENANT toolkit. BEARDSHELL is a C++-developed backdoor that downloads, decrypts using ChaCha20-Poly1305, and executes PowerShell scripts — with results exfiltrated through the Icedrive cloud storage API. On each compromised host, BEARDSHELL creates a unique directory named using an FNV1a hash of the computer name and hardware profile GUID, giving operators a stable per-machine identifier without storing predictable artifacts. SLIMAGENT is a companion tool that captures screenshots using Windows APIs, encrypts them with AES and RSA, and stores them locally with timestamped filenames. Both BEARDSHELL and SLIMAGENT achieve persistence through COM hijacking — modifying Windows registry keys so that malware executes each time the system restarts or interacts with targeted Windows components. This persistence method survives routine log cleanup and makes simple file deletion insufficient for remediation; full reimaging is required.
COVENANT is a heavily modified version of an open-source .NET post-exploitation framework whose official development ended in 2021. ESET notes that since 2023, APT28 developers have made repeated modifications to establish COVENANT as their primary espionage implant, keeping BEARDSHELL mainly as a fallback in case COVENANT's cloud-based infrastructure is disrupted. The group has rotated cloud providers from pCloud to Koofr to Filen to maintain resilience against infrastructure takedowns. SLIMAGENT, assessed with high confidence to be a direct descendant of XAgent — APT28's decade-old keylogger — shares identical keylogging logic and HTML-format output, using the same color scheme (application name in blue, keystrokes in red, window name in green) as samples documented from 2018. ESET notes that BEARDSHELL uses a rare obfuscation technique called opaque predicate previously seen in XTunnel, the tool APT28 deployed during the 2016 Democratic National Committee hack. That code fingerprint is analytically significant: it ties 2026 operations to the same development team responsible for campaigns over a decade earlier.
The BEARDSHELL/COVENANT cluster also illuminated something important about delivery diversification. While the BadPaw campaign used phishing emails over ukr[.]net, a documented BEARDSHELL delivery variant used Signal, the encrypted messaging platform, to send malicious documents to Ukrainian government targets. CERT-UA confirmed that Signal messages carried a malicious document that, once opened, executed macros launching a COVENANT loader. This was not a vulnerability in Signal itself. Rather, APT28 exploited Signal's growing reputation for trustworthiness among government and military users to make the lure more credible. The implications deserve attention: as secure messaging tools become standard in government contexts, they become the next natural phishing surface.
A fourth, temporally earlier concurrent operation further fills in the picture. In late January 2026, Zscaler ThreatLabz identified a campaign they named Operation Neusploit, with Trellix and CERT-UA independently documenting overlapping APT28 activity against European military and government targets during the same period. The common thread: APT28 had weaponized CVE-2026-21509, a Microsoft Office security feature bypass, within days of its public disclosure. Microsoft released an emergency out-of-band patch on January 26, 2026; Zscaler observed confirmed in-the-wild exploitation on January 29 — three days later, with Trellix separately characterizing their observed timeline as approximately 24 hours. The "24 to 48 hours" framing that has been widely cited reflects the range across both research teams' observations, not a single verified timestamp. Regardless of the precise window, both figures underscore the same structural problem: enterprise patch cycles cannot keep pace.
Operation Neusploit deployed spear-phishing emails across nine countries — including Ukraine, Slovakia, Romania, Poland, Slovenia, Turkey, Greece, and the UAE — targeting defense ministries (approximately 40% of attacks), transportation and logistics operators (approximately 35%), and diplomatic entities (approximately 25%). Phishing messages were sent from compromised government email accounts in Romania, Bolivia, and Ukraine, and were crafted in both English and localized languages to increase plausibility. CERT-UA separately confirmed that over 60 Ukrainian government email addresses associated with central executive authorities were targeted. The infection chain deployed two attack paths: one delivering MiniDoor, a malicious Outlook VBA backdoor that quietly forwards victim emails to attacker-controlled addresses; the other deploying PixyNetLoader, which sets persistence via COM hijacking and scheduled tasks before loading a Covenant Grunt implant. Zscaler attributed the campaign to APT28 with high confidence based on TTP overlaps; Trellix independently reached the same attribution based on code overlaps, infrastructure reuse, and the NotDoor/BEARDSHELL toolchain. The 24-to-48-hour weaponization window was not anomalous: APT28 has a documented history of being among the first threat actors to weaponize newly disclosed Office vulnerabilities in real-world attacks.
What this concurrent operational picture tells us is that BadPaw and MeowMeow exist not in isolation but as one instrument within a much broader, layered Russian cyber offensive — different toolkits deployed by potentially different GRU teams, against overlapping Ukrainian targets, simultaneously, across multiple delivery channels. A small detail worth flagging: Zscaler and Trellix use different names for the same Outlook VBA backdoor component — Zscaler calls it MiniDoor, while Trellix calls it NotDoor. This naming divergence, both teams independently discovering and naming the same tool, is itself informative: it confirms that multiple research groups were observing overlapping infrastructure without coordinating disclosure, which means defenders may encounter both names in threat intelligence feeds for the same artifact. The question of whether BadPaw/MeowMeow is strictly APT28 (Unit 26165) or a related GRU unit matters less than the strategic reality: Russia maintains parallel offensive cyber programs that are independently active, independently capable, and collectively relentless. Ukraine is not facing one adversary with one toolkit. It is facing an institution with multiple development teams, diversified delivery channels (email, ZIP archives, Signal, weaponized Office documents), long institutional memory, and the resources to run simultaneous campaigns. The four concurrent operations documented in early 2026 alone — BadPaw/MeowMeow, the UAC-0252 SALATSTEALER campaign, the BEARDSHELL/COVENANT long-term surveillance operation, and Operation Neusploit — demonstrate that Russia does not wait for one campaign to complete before launching the next.
What Defenders Need to Know
The BadPaw/MeowMeow campaign is noteworthy not because it relies on novel zero-day vulnerabilities — it does not — but because of the operational discipline with which it chains together existing techniques to evade detection at every stage. Signature-based tools will not catch a malicious executable hidden inside a PNG. Sandbox analysis will not reveal a backdoor that only activates with a specific parameter and terminates when it detects analysis tools. Network monitoring may not flag C2 traffic from a legitimately signed .NET application. Every layer of the infection chain is designed to fail silently and invisibly.
Detection Engineering
Detection and response teams should focus on behavioral indicators rather than file-based signatures. Watching for mshta.exe spawning child processes — particularly wscript.exe or cscript.exe — is a high-value detection signal for this specific attack pattern. Monitoring for unexpected scheduled task creation involving VBScript or PNG files is similarly valuable. Querying SIEM environments for processes executing with the isolated -v parameter can help surface MeowMeow executions. Similarly, -renew as a standalone command-line parameter passed to an unsigned .NET executable is a detection candidate for the BadPaw stage.
At the network layer, defenders should consider alerting on outbound HTTP requests to endpoints with calendar or event management naming conventions (/getcalendar, /eventmanager, /planneractivate) made by processes that are not legitimate calendar applications. The C2 communication pattern is specifically designed to resemble telemetry traffic, but the process lineage — a .NET executable descended from an mshta.exe or wscript.exe parent — should not be making those requests. Behavioral EDR rules correlating process ancestry with outbound HTTP requests are more effective here than static signature matching.
Sandbox Configuration Hardening
The registry install-date evasion technique employed in this campaign exposes a specific and immediately addressable gap in analysis infrastructure. Any sandbox or automated analysis environment configured with a fresh OS image less than ten days old will silently fail to detonate BadPaw, producing a false negative that appears to confirm a file is benign. Analysis teams should audit sandbox configurations for this vector: ensure that OS install dates are set back at least thirty days for all analysis environments, and consider randomizing the install date as standard practice. This is a low-effort configuration change that closes a gap this campaign and others actively exploit. Additionally, analysis environments should ensure common forensic tools are not running as active processes during detonation — their presence will cause MeowMeow to self-terminate before revealing its backdoor capabilities.
Email and Delivery Controls
Email security controls that specifically flag or quarantine ZIP archives delivered via link (rather than as attachments) would disrupt the delivery mechanism before the HTA file ever reaches a user. This distinction — link-delivered archive versus attachment-delivered archive — is operationally significant: link delivery allows the attacker to insert the tracking pixel redirect layer that filters automated scanners before payload delivery. Security tools that follow redirected links and execute the full redirect chain before rendering a verdict will catch this; tools that only evaluate the initial URL will not.
HTA files specifically deserve attention in email and endpoint policy. Many organizations block known malware file types but have not specifically evaluated HTA as a high-risk extension. Given that HTA files execute with the privilege of the invoking process and have historically been abused across numerous APT campaigns, organizations that have not explicitly restricted HTA execution via AppLocker, WDAC, or equivalent policy controls should treat this as an immediate gap to address. Disabling Windows Script Host entirely on endpoints that do not require it eliminates the execution pathway for VBScript-based stages across this and many similar campaigns.
Harder Questions About Detection Philosophy
This campaign surfaces a question that the security industry has not fully answered: what happens when attackers understand our analysis infrastructure as well as we understand their malware? BadPaw checks installation age specifically because sandbox environments are overwhelmingly new. MeowMeow checks for Wireshark, ProcMon, OllyDbg, and Fiddler specifically because those are the tools researchers open by default. The malware was built with an accurate mental model of how it would be analyzed — and it was engineered to defeat that model.
The deeper solution is not to patch these specific checks one by one. That race is unwinnable: any technique an analyst uses can be detected and evaded by a sufficiently motivated developer. The more durable approach is to move detection upstream, before the malware's evasion logic can execute. That means investing in pre-execution controls: email gateways that execute link-delivered content in isolated environments before delivery, endpoint policies that prevent HTA execution entirely, and network controls that intercept ZIP downloads from clicked links. At the endpoint level, it means investing in memory-based detection that can observe process injection and code loading behaviors before any file hits disk — not scanning dropped files after the fact.
Deeper Solution Architecture
The security guidance that commonly accompanies campaign disclosures tends to cluster around IOC ingestion and signature updates. Those actions are necessary but structurally insufficient against an adversary that deploys new tooling specifically to defeat existing signatures. The BadPaw/MeowMeow campaign invites a harder question: what architectural investments would make the entire class of techniques used here — steganography, commercial obfuscation, parameter-gated activation, tool detection — substantially harder to execute against your environment?
Detection-as-code platforms offer one answer. Rather than relying on static signature databases, teams that maintain detection logic as versioned, testable code — with Sigma rules or equivalent — can translate the behavioral indicators from this campaign into persistent hunting logic that survives malware rebranding. The MITRE ATT&CK mappings published in this briefing are most valuable when they are immediately translated into automated queries running continuously against endpoint telemetry, not consumed as reference material and filed. SOC Prime and comparable platforms maintain community-sourced detection content keyed directly to MITRE technique IDs; organizations that have not integrated these into their SIEM pipelines are working from a structurally smaller detection surface than necessary.
Zero-trust architecture addresses a different but complementary layer. The core assumption underlying zero-trust — that no process, user, or network segment is trusted by default — directly constrains what a backdoor like MeowMeow can do once deployed. If outbound HTTP requests from arbitrary .NET processes require explicit policy authorization, a MeowMeow C2 beacon to /getcalendar fails before it carries any data. If lateral movement requires continuous re-authentication, a compromised host cannot become a pivot point. Zero-trust is frequently discussed as an identity and access management initiative; its value against post-exploitation C2 communication is underappreciated.
Memory forensics capability closes a gap that file-based detection cannot. BEARDSHELL and COVENANT both operate in ways that minimize on-disk artifacts. BEARDSHELL loads PowerShell within a .NET runtime environment; COVENANT operates largely in memory. Organizations that lack the capability to acquire and analyze memory dumps from suspected compromise events will miss a significant portion of these tools' behavioral footprint. Investing in endpoint detection and response (EDR) solutions with memory acquisition capability — and ensuring incident responders know how to use them — is not optional against this threat class. The MalwareTips remediation framework for the concurrent BEARDSHELL campaign explicitly notes that affected systems require full reimaging because COM hijacking-based persistence survives routine file-based remediation.
Threat intelligence sharing represents a structural gap that individual organizations cannot solve alone. ClearSky published the BadPaw/MeowMeow findings; ESET published the BEARDSHELL/COVENANT analysis; Zscaler and Trellix independently documented Operation Neusploit. Each of these reports contains IOCs, behavioral indicators, and MITRE mappings that, when shared through platforms like MISP, STIX/TAXII-connected threat intelligence platforms, or sector-specific ISACs, can benefit organizations that would never have encountered these campaigns in their own telemetry. The intelligence exists. The structural challenge is ingestion velocity — how quickly organizations move from published report to enforced detection rule. The answer at current industry practice is too slow: often measured in weeks, against adversaries that weaponize new vulnerabilities in days. Organizations in APT28's targeting footprint should treat each published IOC set as an operational task with a defined closure deadline — "IOC ingested and hunting rules deployed within 48 hours of public disclosure" — rather than as reference material for the next quarterly review.
Cloud egress control is underutilized as a post-compromise choke point. BEARDSHELL, COVENANT, and Operation Neusploit all rely on legitimate cloud storage services (Icedrive, Koofr, Filen, pCloud) for C2 communication. Organizations cannot simply block these services; they are legitimate platforms with legitimate business use. But they can enforce the principle that specific process types — particularly injected processes, processes spawned by Office applications, and processes with unexpected parent chains — should not be permitted outbound HTTPS access to cloud storage APIs without explicit policy authorization. Next-generation firewalls and proxy solutions with application-layer inspection can enforce this policy. The detection signal is not the destination; it is the process requesting access to that destination. Implementing application-aware egress filtering that enforces what categories of processes can reach what categories of cloud services is a meaningful architectural control against this entire class of cloud-abusing C2 infrastructure — not just this campaign but every future variant that uses the same evasion logic.
For organizations that handle Ukraine-related work, border or migration policy, defense logistics, or government communications, treating this campaign as directly relevant to the threat model is not optional. The IOCs from the ClearSky report should be ingested into threat intelligence platforms immediately. More importantly, the technique patterns — HTA disguised as HTML, steganography in PNG, commercial packers, registry install-date checks, tool scanning — should be translated into detection rules that will catch not just this campaign but future variants that share the same architecture.
Questions This Campaign Raises That Many Coverage Sources Miss
Reporting on campaigns like BadPaw/MeowMeow tends to focus on the technical chain and move on. Several important questions emerge from this campaign that deserve more attention than they typically receive.
Why border crossing appeals? The lure is geopolitically specific in a way that tells us something about the targeting. Border crossing procedures are not a topic a random Ukrainian citizen urgently needs to understand. They are a topic of immediate operational concern to specific categories of people: displaced civilians navigating checkpoint bureaucracy, government officials who administer border processes, humanitarian aid workers, logistics coordinators, journalists, and — critically — Ukrainian military personnel or their families. The decision to use this lure tells researchers something about who the operators believe is receiving these emails. The targeting is not mass phishing. It is curated.
What does the low AV detection rate actually mean? At the time of ClearSky's analysis, only nine antivirus engines flagged the BadPaw sample as malicious. That number should prompt a question that the security industry often avoids: if a state-sponsored actor can deploy new tooling that 90% of endpoint products miss, what is our actual detection posture against campaigns we haven't yet identified? BadPaw was caught because ClearSky was hunting in the right environment. The campaigns we haven't caught may be using the same nine-out-of-54 detection rate as cover for sustained access that has existed for months or years.
What is the likely objective of MeowMeow's access? The technical description of MeowMeow's capabilities — remote PowerShell execution, file read/write/delete, file existence checks — describes a capable but not elaborate backdoor. It is not ransomware, it is not a destructive wiper, and it does not appear designed for lateral movement at scale. It looks like an intelligence collection instrument: a quiet, persistent access point optimized for reading documents and executing targeted commands on specific hosts. The question of what information the operators were attempting to exfiltrate from Ukrainian border-related organizations is worth raising even if it cannot yet be answered. Border movement data, personnel files, logistics records, and communications about aid delivery are all strategically valuable to Russian military planners.
What does the Signal delivery vector tell us about platform trust as an attack surface? The concurrent BEARDSHELL campaign's use of Signal to deliver malicious documents is not a footnote — it is a significant indicator of adversary adaptation. Signal adoption among Ukrainian government and military personnel has grown precisely because it is perceived as more secure than email. APT28 is not trying to break Signal's encryption; it is exploiting the trust that encryption reputation generates. When a Signal message arrives from a contact appearing to be a government colleague, the recipient's threat model changes. Organizations that have deployed secure messaging platforms as security upgrades need to accompany those deployments with updated phishing training that explicitly addresses the risk of malicious document delivery via messaging apps — not just email.
What does a 24-48 hour vulnerability weaponization window mean for defenders? Operation Neusploit's exploitation of CVE-2026-21509 within two days of public disclosure should be treated as a structural planning assumption, not an exceptional event. APT28 has demonstrated this capability repeatedly. If the adversary can develop and deploy a working exploit faster than most enterprise patch cycles can respond, the defensive calculus shifts: patching is no longer the primary mitigation for the first 72 hours after a vulnerability disclosure. Organizations operating in APT28's targeting footprint need pre-positioned detection capabilities — behavioral rules that will catch exploitation attempts before signatures exist — and documented escalation procedures that can accelerate emergency patching for critical Office vulnerabilities to a sub-48-hour standard. CERT-UA explicitly warned that attack volumes using CVE-2026-21509 would increase as adversaries exploited organizational patching inertia.
Why does Ukraine function as a proving ground — and for whom? Security researchers and Western governments have described Ukraine as a proving ground for Russian offensive cyber capabilities since at least 2015, when BlackEnergy attacks on Ukrainian power infrastructure pre-dated similar techniques appearing in campaigns elsewhere. The pattern has held across multiple cycles: tools first refined against Ukrainian targets later appear against NATO members, EU institutions, and critical infrastructure providers across Europe and North America. The four concurrent operations documented in early 2026 represent new additions to that pipeline. Organizations outside Ukraine are not watching a foreign conflict. They are watching the development and field-testing of techniques that will eventually be pointed at them.
At what point does continual retooling become unsustainable — and is it? APT28 has been building and discarding malware families for over two decades. The pattern of new tooling is not a sign of weakness; it is a sign of institutional investment. Every new malware family — BadPaw, MeowMeow, BEARDSHELL, COVENANT variants, SLIMAGENT, NotDoor — represents developer hours, testing, operational security review, and infrastructure setup. The West has not found a mechanism that makes this cycle economically or operationally unacceptable for Russia. Sanctions, indictments, and public attribution have not materially slowed the pace of development. The ESET report documenting BEARDSHELL noted that opaque predicate obfuscation ties current 2026 tooling to the same developers who built XTunnel for the 2016 DNC hack. The development team has not changed; the tooling has simply evolved. That is worth naming directly.
Why .NET — and what does that choice tell defenders? Both BadPaw and MeowMeow are .NET assemblies. That is not accidental. .NET is a legitimate, widely deployed Microsoft runtime environment, meaning that a .NET executable operating on an enterprise endpoint is structurally indistinguishable from hundreds of legitimate business applications. It runs under the same process permissions as Office productivity tools. Its network calls look like any other managed application's outbound traffic. And when combined with a commercial obfuscator like .NET Reactor, the binary is analytically opaque without significant reverse engineering investment. This choice is also a signal about where APT28 believes its detection surface is: file-based and signature-dependent. Defenders whose endpoint strategy centers on known-bad file hashes are poorly positioned against a .NET payload obfuscated with a legitimate commercial tool and delivered inside a PNG. The appropriate response is not to add .NET to a blocklist — it is to invest in process lineage monitoring and behavioral rules that treat unexpected .NET processes making outbound HTTP requests to calendar-named endpoints as anomalous by definition, regardless of what the binary itself looks like.
Who beyond Ukrainian government employees receives a border crossing lure and finds it credible? Reporting on this campaign has consistently described the targets as Ukrainian organizations or Ukrainian government entities. But the border crossing lure has a broader potential reach than that framing suggests. Ukrainian diaspora communities across Europe — including in Poland, Germany, and the United Kingdom, which together host several million displaced Ukrainians — include individuals with regular, legitimate reason to navigate border procedures. Humanitarian NGOs operating at Ukrainian checkpoints, journalists traveling between Ukraine and neighboring countries, and European government officials involved in refugee processing are all plausible secondary targets for exactly this lure. The campaign's geographic reach may extend well beyond Ukrainian IP ranges. Organizations in EU member states that employ Ukrainian staff or engage in aid delivery coordination should treat this lure class as directly relevant to their own threat model, not a foreign concern.
What does Russia actually do with border movement intelligence? Coverage of this campaign documents what MeowMeow can do — remote PowerShell execution, file read/write/delete — but does not ask what Russian military intelligence is attempting to learn from compromised border-adjacent networks. The answer is not speculative. Border movement data, when correlated against military personnel registries, produces targeting intelligence: it tells analysts where specific individuals are, when they crossed, and what documents they carried. Logistics and aid delivery schedules — the kind of records that exist on endpoints inside humanitarian and government border organizations — inform Russian planning about supply chain routes that military planners have documented interest in disrupting. Personnel files from border administration organizations can identify Ukrainian officials and military contractors available for follow-on targeting. MeowMeow's capabilities are not elaborate, but they do not need to be. Quiet, sustained read access to the right file system is sufficient to extract data that directly feeds tactical and strategic planning. The backdoor's restraint is a feature, not a limitation.
What does APT28's use of legitimate cloud storage for C2 mean for network defenders? BEARDSHELL uses Icedrive. COVENANT has rotated through pCloud, Koofr, and Filen. Operation Neusploit uses Filen. None of these are obscure, suspicious services — they are legitimate cloud storage platforms used by millions of legitimate users globally. ESET's analysis of BEARDSHELL noted that Icedrive does not provide a publicly documented API, which means APT28 developers reverse-engineered the private API from the official client application to make their malware work. When infrastructure disruptions force them off one provider, they produce an updated binary within hours. This is not a group that stumbles across available cloud services and repurposes them opportunistically. It is a group that invests significant engineering effort in abusing them deliberately. Defenders whose network monitoring strategy relies on blocking known-bad domains or suspicious TLDs have no path to catch this traffic. The C2 connection to api.icedrive.net or app.koofr.net is structurally identical to a legitimate user syncing files. The only detection surface is process lineage: the question is not whether the destination is suspicious, but whether the process making the request should be making it. Behavioral monitoring that enforces what processes are permitted to make outbound requests to specific services — not just whether those services are reachable — is the correct model.
What is the post-exfiltration intelligence cycle — and how does collected data get used? Security research appropriately focuses on the technical chain of compromise, but rarely follows the data after it leaves the victim's system. MeowMeow's capabilities — file read, PowerShell execution, targeted file existence checks — suggest a collection workflow that is deliberately narrow rather than bulk. Operators appear to query specific files rather than vacuum everything. That behavioral restraint implies a collection team with enough prior knowledge of the target to know what to ask for: personnel rosters, aid delivery schedules, logistics contacts, communications about border procedures. Once collected, that data flows into what Russian military intelligence processing. Documents identifying Ukrainian officials can be cross-referenced with OSINT and other compromised data to build targeting packages. Movement records can inform kinetic targeting. Supply chain schedules — specifically the kinds of records held by the humanitarian and government border organizations this campaign targeted — directly feed Russian planners' documented interest in interdicting aid routes to Ukraine. The malware is only the collection mechanism. Understanding where the collected intelligence goes, and how it's used, is essential to appreciating why the targeting choices in this campaign are not arbitrary.
Why does APT28 invest in reverse-engineering private cloud APIs rather than building its own C2 infrastructure? The answer is both technical and strategic. Custom C2 infrastructure leaves a detectable footprint: domain registration patterns, hosting provider choices, SSL certificate issuance, and infrastructure reuse across campaigns are all well-studied detection surfaces. The MITRE ATT&CK framework specifically documents infrastructure analysis as a threat intelligence technique (T1590). By routing C2 through legitimate cloud services, APT28 eliminates most of that surface entirely. There is no APT28 domain to block. There is no suspicious hosting provider to flag. The cost — reverse-engineering a private cloud API and maintaining update capacity when the API changes — is a one-time and ongoing engineering investment that pays indefinitely in detection evasion. The strategic implication for defenders is uncomfortable: traditional infrastructure-based threat intelligence (blocklists, domain reputation, hosting provider analysis) provides substantially diminished value against an adversary using this approach. The detection problem becomes a behavioral problem, which requires a more sophisticated and more expensive detection architecture.
The security community tends to frame the offense-defense dynamic as a gap to be closed — implying that the right combination of tooling, training, and patching velocity will eventually produce parity. The BadPaw/MeowMeow campaign invites a harder question: does that framing accurately describe the situation? APT28 operates with state-level resources, no accountability mechanism that has proven effective, and a development culture documented to have persisted with the same core team for over a decade. Its development cycle for new tooling appears to be measured in weeks. The defender's cycle — from threat publication to organizational rule deployment — is measured in weeks to months at many enterprises. The gap is not a temporary lag. It is a structural condition. Naming that honestly is not defeatism; it is a prerequisite for making rational decisions about where to invest. If patch cycles cannot outrun a 24-to-48-hour weaponization window, then patching is not a primary mitigation for the first few days after any Office vulnerability disclosure — and defensive architectures should be designed around that reality rather than pretending the gap does not exist.- This is not a simple phishing campaign. BadPaw and MeowMeow represent a multi-stage, purpose-built espionage toolkit with layered evasion at every step — tracking pixels before delivery, steganography for payload concealment, registry checks and tool detection before activation, and a decoy interface to mislead researchers. The operational investment is consistent with state-sponsored development, not criminal commodity malware.
- APT28 continues to evolve its tooling across multiple concurrent operations. Both BadPaw and MeowMeow were previously undocumented, and they appeared the same month that ESET published findings on BEARDSHELL/COVENANT and Trellix documented Operation Neusploit. Three distinct toolsets, potentially from different GRU development teams, were active simultaneously. The low-confidence APT28 attribution for BadPaw/MeowMeow should be understood in that context: even if the specific unit is uncertain, the institutional pattern — parallel campaigns, new tooling, diversified delivery — is not.
- Delivery channel diversification is an emerging threat pattern. BadPaw arrived via phishing email; BEARDSHELL arrived via Signal. APT28 is not wedded to any single delivery method. Organizations that have hardened email gateways but not messaging platform phishing awareness, or vice versa, have a partial defense.
- Vulnerability weaponization windows are measured in hours, not days. CVE-2026-21509 was weaponized in 24 to 48 hours. Patching cycles that operate on weekly or monthly schedules cannot respond to that speed. Behavioral detection coverage for the exploitation pattern must exist before signatures do.
- The Russian-language strings are operationally significant. Whether they represent an OPSEC failure or a developer artifact, they are consistent with a long-established pattern in APT28 malware development. They should not be dismissed as inconclusive — they reinforce the broader technical and behavioral attribution evidence.
- Behavioral detection is essential. No file-based signature will reliably catch a payload hidden in a PNG. Defenders must invest in behavioral monitoring — process lineage analysis, scheduled task auditing, anomalous network connections from .NET processes — to detect campaigns like this one before exfiltration occurs.
- COM hijacking-based persistence requires full reimaging. BEARDSHELL and SLIMAGENT both achieve persistence through COM object registry modification. File deletion and patch application are insufficient remediation. Any host confirmed or suspected to be compromised by this toolset should be fully reimaged, not cleaned.
- Ukraine is not the only target. APT28's history demonstrates that techniques first deployed against Ukrainian targets are later adapted for use against NATO governments, defense contractors, logistics firms, and critical infrastructure providers across Europe and North America. The BadPaw/MeowMeow infrastructure and tradecraft, alongside Operation Neusploit's documented targeting across nine countries in early 2026, should be treated as an emerging global threat indicator, not a Ukraine-specific concern.
The BadPaw and MeowMeow campaign is a precise illustration of how modern state-sponsored espionage operates: not with brute force, but with patience, planning, and an intimate understanding of where detection fails. The targeting is specific, the lure is credible, the payload is careful, and the evasion is layered. Ukraine remains under sustained digital siege, and the tools being refined there are entering active development rotation for use against other targets. The four concurrent operations documented in early 2026 are not a peak — they are the observable portion of an ongoing program. Understanding them now is not optional.
BadPaw and MeowMeow Malware: Key Questions
What is the BadPaw malware?
BadPaw is a .NET-based malware loader identified by ClearSky researchers during a cyber espionage campaign targeting Ukrainian organizations. The loader is delivered through a phishing chain involving HTA files and steganographically hidden payloads embedded inside PNG images. Once executed, BadPaw performs sandbox evasion checks, establishes persistence through scheduled tasks, and retrieves the campaign’s final payload from command-and-control infrastructure.
What does the MeowMeow malware do?
MeowMeow is the backdoor deployed by the BadPaw loader during the final stage of the infection chain. It provides attackers with remote access capabilities including PowerShell execution, file system manipulation, and reconnaissance of the compromised environment. The malware only activates when executed with a specific runtime parameter and includes anti-analysis features that terminate execution if debugging or monitoring tools are detected.
How does the BadPaw infection chain work?
The attack begins with a phishing email containing a link to a ZIP archive. When the victim downloads and opens the archive, an HTA file executes through mshta.exe, launching a multi-stage infection chain. A VBScript extracts a steganographically hidden payload from a PNG image, which loads the BadPaw malware. BadPaw then contacts command-and-control endpoints to retrieve and deploy the MeowMeow backdoor.
Is the campaign definitively linked to APT28?
Researchers attribute the campaign with high confidence to Russian state-aligned threat actors but only with low confidence specifically to APT28, also known as Fancy Bear. The attribution is based on targeting patterns, operational techniques, and Russian-language artifacts discovered in the malware code rather than definitive infrastructure or code reuse associated with known APT28 toolsets.
Why did the attackers hide malware inside a PNG image?
The campaign used steganography to conceal the BadPaw executable within an image file in order to evade traditional file-based detection mechanisms. Security tools that rely on file signatures or executable scanning may treat PNG images as harmless content, allowing the malicious payload to bypass inspection until it is extracted and executed by the attack script.
How can defenders detect the BadPaw and MeowMeow malware activity?
Detection should focus on behavioral indicators rather than file signatures. Key signals include mshta.exe launching script interpreters such as wscript.exe or cscript.exe, scheduled tasks created by scripts extracted from downloaded ZIP archives, and unexpected .NET processes making outbound HTTP requests to suspicious endpoints. Analysts should also monitor for steganographic payload extraction from image files, command-line parameters such as -renew and -v associated with the BadPaw and MeowMeow stages, and processes spawned from HTA execution chains that communicate with remote infrastructure shortly after user interaction with a phishing link.
Sources
- ClearSky Cyber Security — Exposing a Russian Campaign Targeting Ukraine Using New Malware Duo: BadPaw and MeowMeow, March 2026. Primary technical source for all infection chain and malware capability details. ClearSky's published summary explicitly states "low confidence" for the APT28 attribution.
- The Hacker News — APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine, March 5, 2026. Note: THN characterizes the APT28 attribution as "moderate confidence," which does not match the language used in ClearSky's primary report ("low confidence") or The Record's coverage. The primary source takes precedence; this article reflects ClearSky's own wording.
- Security Affairs (Pierluigi Paganini) — Russian APT targets Ukraine with BadPaw and MeowMeow malware, March 2026. Note: Security Affairs also characterizes the attribution as "moderate confidence." This reflects THN's framing rather than ClearSky's primary language.
- The Record (Recorded Future News) — Russian hackers deploy new malware in phishing campaign targeting Ukraine, March 4, 2026. The Record characterizes the APT28 attribution as "low confidence," consistent with ClearSky's own language.
- Infosecurity Magazine — Multi-Stage "BadPaw" Malware Campaign Targets Ukraine, March 2026. Source for C2 endpoint details (/getcalendar, /eventmanager, "Telemetry UP!") and MeowMeowProgram.exe filename.
- ESET (WeLiveSecurity) — Sednit Reloaded: Back in the Trenches, March 2026. Source for BEARDSHELL (ChaCha20-Poly1305 decryption, Icedrive API, FNV1a host directory naming), COVENANT (Filen-based C2), and SLIMAGENT analysis including code lineage to XAgent and XTunnel opaque predicate technique. Documents APT28 long-term surveillance of Ukrainian military personnel since April 2024. Also documents COM hijacking persistence method requiring full reimaging for remediation.
- Bleeping Computer — APT28 hackers deploy customized variant of Covenant open-source tool, March 2026. Source for COVENANT cloud provider rotation (pCloud, Koofr, Filen) and CVE-2026-21509 exploitation context.
- Zscaler ThreatLabz (Sudeep Singh) — APT28 Leverages CVE-2026-21509 in Operation Neusploit, February 2026. Zscaler ThreatLabz first identified and named Operation Neusploit in January 2026, observed confirmed in-the-wild exploitation of CVE-2026-21509 on January 29 (three days after Microsoft's January 26 out-of-band patch). Source for MiniDoor (Outlook VBA email forwarding), PixyNetLoader, Covenant Grunt implant, and localized lure details (Romanian, Slovak, Ukrainian languages). High-confidence APT28 attribution based on TTP overlap.
- Trellix (Pham Duy Phuc and Alex Lanstein) — APT28's Stealthy Multi-Stage Campaign Leveraging CVE-2026-21509 and Cloud C2 Infrastructure, February 2026. Independent documentation of the same APT28 campaign using CVE-2026-21509, with Trellix observing their instance approximately 24 hours after the Microsoft patch. Source for targeting distribution (defense 40%, transport 35%, diplomatic 25%), NotDoor Outlook VBA backdoor designation, and Filen.io C2 infrastructure details. Trellix and Zscaler observed overlapping activity with independently consistent TTP attribution to APT28.
- The Record (Recorded Future News) — Russian hackers targeting European maritime and transport organizations using Microsoft Office exploit, February 2026. Source for Operation Neusploit geographic scope, the 72-hour spear-phishing campaign detail (29 distinct emails across nine countries), and compromised government sender accounts across Romania, Bolivia, and Ukraine, as covered in The Record's reporting on the Trellix findings.
- CERT-UA / Daily Security Review — APT28 Hackers Use Signal to Target Ukraine with New Malware Families BeardShell and SlimAgent. Source for Signal messenger delivery vector documentation, Акт.doc malicious document campaign details, and COM hijacking persistence mechanism used by BEARDSHELL and SLIMAGENT.
- SOC Prime — UAC-0001 (APT28) Activity Detection: BEARDSHELL and COVENANT Malware. Source for BEARDSHELL FNV1a hash-based directory naming on compromised hosts, SLIMAGENT AES+RSA screenshot encryption details, and confirmed C2 domains app.koofr.net and api.icedrive.net.
- Industrial Cyber — ClearSky exposes Russian cyber operation targeting Ukraine with newly discovered BadPaw, MeowMeow malware, March 2026. Source for /planneractivate third C2 endpoint, three-file drop structure, BadPaw Regex Finder decoy, -renew parameter, and nine-engine AV detection rate at time of analysis.
- SOC Prime — UAC-0252 Attack Detection: SHADOWSNIFF and SALATSTEALER Fuel Phishing Campaigns in Ukraine, March 3, 2026. Source for UAC-0252 concurrent campaign details including SALATSTEALER's Go-based MaaS architecture and DEAFTICK backdoor.
- United States Department of Justice — Indictment of GRU Officers (Election Interference), July 13, 2018. Charged twelve GRU officers from Units 26165 and 74455 for 2016 election interference operations.
- United States Department of Justice — Indictment of GRU Unit 26165 Officers (Anti-Doping / OPCW), October 4, 2018. Charged seven GRU Unit 26165 officers including Aleksei Morenets, Evgenii Serebriakov, Ivan Yermakov, Artem Malyshev, and Dmitriy Badin for international hacking operations.
- UK National Cyber Security Centre / 21-nation joint advisory — Western intelligence agencies advisory on APT28 logistics targeting campaign, May 2025. Source of Paul Chichester quote.
- CyberScoop — Fancy Bear campaign sought emails of high-level Ukrainians and their military suppliers, May 2025.
- Palo Alto Unit 42 — Fighting Ursa Aka APT28: Illuminating a Covert Campaign. Background on APT28 Ukraine targeting history.
- MITRE ATT&CK Framework — APT28 (G0007). Reference for all MITRE technique IDs cited in this article and for APT28 attribution history.
- FireEye — APT28: A Window Into Russia's Cyber Espionage Operations, 2015. Source for historical documentation of Russian-language build environment and Moscow business-hours development pattern in APT28 malware.