CERT-UA Uncovers LAMEHUG Malware Tied to APT28, Leveraging LLM for Phishing Attacks

Published:

spot_img

New Malware Threat: Understanding the LAMEHUG Phishing Campaign

Overview of the Threat

The Computer Emergency Response Team of Ukraine (CERT-UA) has recently uncovered a sophisticated phishing campaign aimed at spreading a new malware variant known as LAMEHUG. This initiative highlights an evolving landscape in cyber threats, particularly those linked to state-sponsored entities.

Ties to Russian Cyber Activities

CERT-UA attributes this campaign with medium confidence to a well-known Russian hacking group, often referred to as APT28, and also known by names such as Fancy Bear and Sofacy. This group has a long history of cyber espionage and disruptive actions globally.

Details of the Phishing Scheme

On July 10, 2025, CERT-UA received multiple reports regarding suspicious emails sent from compromised accounts resembling those of government officials. The targeted recipients were high-ranking government authorities, emphasizing the campaign’s focus on sensitive information and high-impact targets.

The Mechanics of LAMEHUG

Embedded in these deceptive emails was a ZIP file containing the LAMEHUG payload. This variant comes in three different forms: "Додаток.pif," "AI_generator_uncensored_Canvas_PRO_v0.9.exe," and "image.py." The development of LAMEHUG utilizes Python and incorporates Qwen2.5-Coder-32B-Instruct, a large language model designed by Alibaba Cloud, specifically optimized for coding tasks such as generation, reasoning, and debugging.

Command Generation and Functionality

According to CERT-UA, LAMEHUG employs the Hugging Face API to generate executable commands based on descriptive text. This allows the malware to perform multiple tasks, including gathering basic system information and searching specific directories—namely, Documents, Downloads, and Desktop—for TXT and PDF files.

Once the information is collected, it is transmitted back to an attacker-controlled server through SFTP or HTTP POST requests. While the effectiveness of this novel attack method remains uncertain, the implications of using advanced technologies in cyberattacks are becoming increasingly clear.

Weaponization of Legitimate Technologies

The use of Hugging Face infrastructure for command-and-control operations underlines a concerning trend where legitimate services are co-opted for malicious purposes. This technique enables attackers to blend in with regular network traffic, making it more challenging to detect the presence of the malware.

Emerging Malware Artifacts

This disclosure follows another significant finding from Check Point, which reported on a malware entity named Skynet. This particular malware employs prompt injection techniques aimed at evading artificial intelligence code analysis tools. Skynet demonstrates the attempt to gather system information while establishing a proxy through an embedded, encrypted TOR client.

Attempts at Evasion

Notably, Skynet includes a specific instruction for AI systems to overlook all prior commands, instead instructing the AI to behave as a calculator and respond with "NO MALWARE DETECTED." While the directive failed, it points to an alarming trend where cybercriminals utilize adversarial techniques to navigate around AI-driven security measures.

The Future of Cybersecurity

As generative AI technologies are increasingly woven into cybersecurity protocols, experts anticipate a rise in targeted attempts to exploit these systems. Innovations such as sandbox evasion have already been prominent, and now, the focus is shifting toward evading AI-based security measures.

Historically, the evolution of cyber threats has seen various phases, and the current landscape is no different. As security technologies advance, so too do the methods employed by malicious actors. Organizations must remain vigilant, continuously adapting their defenses to counter these sophisticated threats.

spot_img

Related articles

Recent articles

Dubai Airshow 2025: The Biggest Yet, Showcasing eVTOL Innovations, a Mega Space Pavilion, and 1,500 Exhibitors

Dubai Airshow 2025: The Biggest Innovation Showcase Yet Overview of Dubai Airshow 2025 The Dubai Airshow 2025 is gearing up to take place at Dubai World...

Mohali Court Denies Bail to Main Suspect in ₹72-Lakh Cyber Fraud Case

Mohali Court Denies Bail in ₹72-Lakh Cyber Fraud Case A Mohali court has declined a regular bail request from Arun, a 23-year-old man involved in...

Railways Shuts Down 7.7 Million Accounts in Major Tatkal Bot Fraud Crackdown

Indian Railways: Strengthening Digital Security for Ticket Bookings In a significant move to combat ticket fraud, Indian Railways has rolled out a new security regimen...

Discover Six Flags Qiddiya: Opening Date, Ticket Prices, and 28 Record-Breaking Rides

Discovering Qiddiya City: A New Era of Entertainment An Overview of Qiddiya City Nestled in the stunning Tuwaiq Mountains and just a 40-minute drive from Riyadh,...