New Malware Threat: Understanding the LAMEHUG Phishing Campaign
Overview of the Threat
The Computer Emergency Response Team of Ukraine (CERT-UA) has recently uncovered a sophisticated phishing campaign aimed at spreading a new malware variant known as LAMEHUG. This initiative highlights an evolving landscape in cyber threats, particularly those linked to state-sponsored entities.
Ties to Russian Cyber Activities
CERT-UA attributes this campaign with medium confidence to a well-known Russian hacking group, often referred to as APT28, and also known by names such as Fancy Bear and Sofacy. This group has a long history of cyber espionage and disruptive actions globally.
Details of the Phishing Scheme
On July 10, 2025, CERT-UA received multiple reports regarding suspicious emails sent from compromised accounts resembling those of government officials. The targeted recipients were high-ranking government authorities, emphasizing the campaign’s focus on sensitive information and high-impact targets.
The Mechanics of LAMEHUG
Embedded in these deceptive emails was a ZIP file containing the LAMEHUG payload. This variant comes in three different forms: "Додаток.pif," "AI_generator_uncensored_Canvas_PRO_v0.9.exe," and "image.py." The development of LAMEHUG utilizes Python and incorporates Qwen2.5-Coder-32B-Instruct, a large language model designed by Alibaba Cloud, specifically optimized for coding tasks such as generation, reasoning, and debugging.
Command Generation and Functionality
According to CERT-UA, LAMEHUG employs the Hugging Face API to generate executable commands based on descriptive text. This allows the malware to perform multiple tasks, including gathering basic system information and searching specific directories—namely, Documents, Downloads, and Desktop—for TXT and PDF files.
Once the information is collected, it is transmitted back to an attacker-controlled server through SFTP or HTTP POST requests. While the effectiveness of this novel attack method remains uncertain, the implications of using advanced technologies in cyberattacks are becoming increasingly clear.
Weaponization of Legitimate Technologies
The use of Hugging Face infrastructure for command-and-control operations underlines a concerning trend where legitimate services are co-opted for malicious purposes. This technique enables attackers to blend in with regular network traffic, making it more challenging to detect the presence of the malware.
Emerging Malware Artifacts
This disclosure follows another significant finding from Check Point, which reported on a malware entity named Skynet. This particular malware employs prompt injection techniques aimed at evading artificial intelligence code analysis tools. Skynet demonstrates the attempt to gather system information while establishing a proxy through an embedded, encrypted TOR client.
Attempts at Evasion
Notably, Skynet includes a specific instruction for AI systems to overlook all prior commands, instead instructing the AI to behave as a calculator and respond with "NO MALWARE DETECTED." While the directive failed, it points to an alarming trend where cybercriminals utilize adversarial techniques to navigate around AI-driven security measures.
The Future of Cybersecurity
As generative AI technologies are increasingly woven into cybersecurity protocols, experts anticipate a rise in targeted attempts to exploit these systems. Innovations such as sandbox evasion have already been prominent, and now, the focus is shifting toward evading AI-based security measures.
Historically, the evolution of cyber threats has seen various phases, and the current landscape is no different. As security technologies advance, so too do the methods employed by malicious actors. Organizations must remain vigilant, continuously adapting their defenses to counter these sophisticated threats.


