{"id":3152,"date":"2026-03-13T10:20:06","date_gmt":"2026-03-13T09:20:06","guid":{"rendered":"https:\/\/lab52.io\/blog\/?p=3152"},"modified":"2026-03-13T13:55:12","modified_gmt":"2026-03-13T12:55:12","slug":"drillapp-new-backdoor-targeting-ukrainian-entities-with-possible-links-to-laundry-bear","status":"publish","type":"post","link":"https:\/\/lab52.io\/blog\/drillapp-new-backdoor-targeting-ukrainian-entities-with-possible-links-to-laundry-bear\/","title":{"rendered":"DRILLAPP: new backdoor targeting Ukrainian entities with possible links to Laundry Bear"},"content":{"rendered":"\n<p>LAB52, the intelligence team at S2 Group, has identified a new campaign targeting Ukrainian entities, attributed to actors linked to Russia. The campaign, observed during February 2026, employs various judicial and charity themed lures to deploy a JavaScript\u2011based backdoor that runs through the Edge browser and has been named DRILLAPP by LAB52. This artifact enables the attacker to carry out several actions on the target, such as uploading and downloading files, using the microphone, or capturing images through the webcam by leveraging the browser\u2019s capabilities.<\/p>\n\n\n\n<p>Certain tactics shared with a <a href=\"https:\/\/cert.gov.ua\/article\/6286942\">Laundry Bear campaign reported by CERT-UA in January<\/a> have been observed, resulting in the activity being attributed to this group with low confidence. These include the use of charity\u2011themed lures or the hosting of operational artifacts on public text\u2011sharing services.<\/p>\n\n\n\n<p>Two variants of the campaign have been identified, differentiated mainly by their timeline.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">First variant<\/h1>\n\n\n\n<p>The first identified variant dates back to early February. It uses LNK files that create an HTML file in the temporary folder, which then loads a remote script hosted on pastefy.app. For persistence, the executable copies all files with the .lnk extension to the \u201c%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\u201d folder.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"80\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-12-16-32-27-1024x80.png\" alt=\"\" class=\"wp-image-3155\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-12-16-32-27-1024x80.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-12-16-32-27-300x24.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-12-16-32-27-768x60.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-12-16-32-27.png 1072w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Command executed by the LNK file<\/figcaption><\/figure><\/div>\n\n\n<p>Next, a URL containing the bait will be displayed. In this first variant, the bait can cover different topics, such as an image related to the installation of Starlink. Bait simulating requests from the Come Back Alive foundation, a Ukrainian charity founded in 2014 and dedicated to supporting the Ukrainian Armed Forces, has also been observed.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-10-17-13-13-1024x512.png\" alt=\"\" class=\"wp-image-3157\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-10-17-13-13-1024x512.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-10-17-13-13-300x150.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-10-17-13-13-768x384.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-10-17-13-13.png 1274w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Lure displayed with information about the Starlink installation<\/figcaption><\/figure><\/div>\n\n\n<p>Finally, the execution of an HTML file is observed through the Microsoft Edge browser, which loads a remote script hosted on pastefy.app. This script is obfuscated using the open-source tool javascript-obfuscator.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"424\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/image-1024x424.png\" alt=\"\" class=\"wp-image-3160\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/image-1024x424.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/image-300x124.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/image-768x318.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/image.png 1385w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Code obfuscated using javascript-obfuscator<\/figcaption><\/figure><\/div>\n\n\n<p>The browser is executed in headless mode, enabling a series of parameters such as &#8211;no-sandbox, &#8211;disable-web-security, &#8211;allow-file-access-from-files, &#8211;use-fake-ui-for-media-stream, &#8211;auto-select-screen-capture-source=true, and &#8211;disable-user-media-security. These settings allow local file access and automatically grant permissions for the camera, microphone, and screen capture without user interaction.<\/p>\n\n\n\n<p>Using deobfuscation techniques, it has been possible to partially recover the code of the artifact, which functions as a lightweight backdoor allowing the attacker to access the file system and record audio from the microphone, video from the camera, and the device\u2019s screen, all through the browser.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"436\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-22-53-03-1024x436.png\" alt=\"\" class=\"wp-image-3161\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-22-53-03-1024x436.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-22-53-03-300x128.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-22-53-03-768x327.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-22-53-03.png 1075w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Capabilities of the first variant<\/figcaption><\/figure><\/div>\n\n\n<p>When executed for the first time, the malware generates a device fingerprint using Canvas Fingerprinting combined with other data such as screen size and system language. These values are hashed to create the fingerprint. This fingerprint is then stored in the \u201cstream_client_id\u201d field within the browser\u2019s persistent storage.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"367\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-22-48-16-1024x367.png\" alt=\"\" class=\"wp-image-3162\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-22-48-16-1024x367.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-22-48-16-300x108.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-22-48-16-768x276.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-22-48-16.png 1338w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Device fingerprint generation<\/figcaption><\/figure><\/div>\n\n\n<p>This device fingerprint is sent together with the victim\u2019s country, which is determined based on the device\u2019s time zone. Only the time zones corresponding to the United Kingdom, Russia, Germany, France, China, Japan, the United States, Brazil, India, Ukraine, Canada, Australia, Italy, Spain, and Poland are implemented. In any other case, the system defaults to returning the United States.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"675\" height=\"404\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/image-1.png\" alt=\"\" class=\"wp-image-3163\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/image-1.png 675w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/image-1-300x180.png 300w\" sizes=\"(max-width: 675px) 100vw, 675px\" \/><figcaption class=\"wp-element-caption\">Time zones detected by the artifact<\/figcaption><\/figure><\/div>\n\n\n<p>The artifact communicates with the command\u2011and\u2011control server through a WebSocket obtained from a URL hosted on pastefy.app, using localhost:8000 as the default value if the URL is unavailable. This default value is expected to be replaced with a real IP address in later versions and is believed to be a debugging trace.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"510\" height=\"291\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/image-2.png\" alt=\"\" class=\"wp-image-3164\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/image-2.png 510w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/image-2-300x171.png 300w\" sizes=\"(max-width: 510px) 100vw, 510px\" \/><figcaption class=\"wp-element-caption\">Retrieval of the WebSocket via pastefy.app<\/figcaption><\/figure><\/div>\n\n\n<h1 class=\"wp-block-heading\">Second variant<\/h1>\n\n\n\n<p>The second variant, detected in late February 2026, abandons the use of LNK files and adopts CPL files\u2014Windows Control Panel modules that internally function as executable DLL libraries. Although a change in the deployment method has been observed, this new variant exhibits behavior similar to the first one. The lures used in this case include an image of a weapons seizure report and a report from the Southern Office of the State Audit Service of Ukraine in the Mykolaiv region, which is displayed from the official website of the National Guard of Ukraine.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"807\" height=\"848\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-10-11-38-58.png\" alt=\"\" class=\"wp-image-3165\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-10-11-38-58.png 807w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-10-11-38-58-285x300.png 285w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-10-11-38-58-768x807.png 768w\" sizes=\"(max-width: 807px) 100vw, 807px\" \/><figcaption class=\"wp-element-caption\">Lure displayed from the Southern Office of the State Audit Service of Ukraine<\/figcaption><\/figure><\/div>\n\n\n<p>The backdoor downloaded by the second variant of the campaign implements three new capabilities that allow recursive file listing, batch file uploading, and file downloading from the internet.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"925\" height=\"732\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-23-39-11.png\" alt=\"\" class=\"wp-image-3166\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-23-39-11.png 925w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-23-39-11-300x237.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-23-39-11-768x608.png 768w\" sizes=\"(max-width: 925px) 100vw, 925px\" \/><figcaption class=\"wp-element-caption\">Capabilities of the second variant<\/figcaption><\/figure><\/div>\n\n\n<p>For security reasons, JavaScript does not allow the remote downloading of files. This is why the attackers use the Chrome DevTools Protocol (CDP), an internal protocol of Chromium\u2011based browsers that can only be used when the &#8211;remote-debugging-port parameter is enabled.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"633\" height=\"153\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/image-3.png\" alt=\"\" class=\"wp-image-3168\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/image-3.png 633w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/image-3-300x73.png 300w\" sizes=\"(max-width: 633px) 100vw, 633px\" \/><figcaption class=\"wp-element-caption\">Use of CDP through debugging port 9222<\/figcaption><\/figure><\/div>\n\n\n<p>This is initially used to modify the path where the file will be saved.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"496\" height=\"308\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-23-48-18.png\" alt=\"\" class=\"wp-image-3171\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-23-48-18.png 496w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-11-23-48-18-300x186.png 300w\" sizes=\"(max-width: 496px) 100vw, 496px\" \/><figcaption class=\"wp-element-caption\">Modification of the download folder via CDP<\/figcaption><\/figure><\/div>\n\n\n<p>A small script is then injected into the browser, which simulates a user click and downloads the file from the remote server.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"270\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-12-00-01-02-1024x270.png\" alt=\"\" class=\"wp-image-3172\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-12-00-01-02-1024x270.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-12-00-01-02-300x79.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-12-00-01-02-768x203.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-12-00-01-02.png 1314w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Code injection simulating the user click<\/figcaption><\/figure><\/div>\n\n\n<h1 class=\"wp-block-heading\">Early activity<\/h1>\n\n\n\n<p>Additionally, a sample dated January 28 and uploaded from Russia has been identified, in which a similar infection chain and set of commands are used. However, in this case, instead of downloading the backdoor, the artifact establishes communication with the website gnome.com, which does not contain any malicious code.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"202\" src=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-12-00-46-08-1024x202.png\" alt=\"\" class=\"wp-image-3173\" srcset=\"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-12-00-46-08-1024x202.png 1024w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-12-00-46-08-300x59.png 300w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-12-00-46-08-768x152.png 768w, https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/Captura-desde-2026-03-12-00-46-08.png 1084w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Command observed in the PoC<\/figcaption><\/figure><\/div>\n\n\n<p>This sample may represent early activity of the campaign and is attributed to the same actor with a high degree of confidence, given its similarity to the samples from the first variant.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Conclusion<\/h1>\n\n\n\n<p>The analysis conducted indicates that DRILLAPP is a recent artifact that is still in an early stage of development. One of the most notable aspects is the use of the browser to deploy a backdoor, which suggests that the attackers are exploring new ways to evade detection. The browser is advantageous for this type of activity because it is a common and generally non\u2011suspicious process, it offers extended capabilities accessible through debugging parameters that enable unsafe actions such as downloading remote files, and it provides legitimate access to sensitive resources such as the microphone, camera, or screen recording without triggering immediate alerts.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Intelligence Availability Notice<\/h1>\n\n\n\n<p>This article presents selected insights derived from our broader threat intelligence operations and coverage. Additional details related to this campaign, as well as other investigations and ongoing intelligence activities, are enriched and available through our\u00a0<strong><a href=\"https:\/\/s2grupo.es\/soluciones\/threat-intelligence\/\">private intelligence feed.<\/a><\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Indicators of Compromise (IOC)<\/h1>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>First variant<\/strong><\/h2>\n\n\n\n<p>5b978cdc46afa28d83e532cd19622d9097bebedf87efc4c87bd35d8ffad9e672\u00a0<\/p>\n\n\n\n<p>6178b1af51057c0bac75a842afff500a8fa3ed957d79a712a6ef089bec7e7a8b\u00a0<\/p>\n\n\n\n<p>ac60eefc2607216f8126c0b22b6243f3862ef2bb265c585deee0d00a20a436b3\u00a0<\/p>\n\n\n\n<p>e20831cecd763d0dc91fb39f3bd61d17002608c5a40a6cf0bd16111f4e50d341\u00a0<\/p>\n\n\n\n<p>ee90b01b16099e0bb23d4653607a3a559590fc8d0c43120b8456fb1860d2e630\u00a0<\/p>\n\n\n\n<p>32973ef02e10a585a4a0196b013265e29fc57d8e1c50752f7b39e43b9f388715<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Second variant<\/strong><\/h2>\n\n\n\n<p>107b2badfc93fcdd3ffda7d3999477ced3f39f43f458dd0f6a424c9ab52681c3\u00a0<\/p>\n\n\n\n<p>a545908c931ec47884b5ccfb1f112435f5d0cdac140e664673672c9df9016672\u00a0<\/p>\n\n\n\n<p>352f34ea5cc40e2b3ec056ae60fa19a368dbd42503ef225cb1ca57956eb05e81\u00a0<\/p>\n\n\n\n<p>c6905bae088982a2b234451b45db742098f2e2ab4fd6ca62c8f4e801160552aa\u00a0<\/p>\n\n\n\n<p>993d55f60414bf2092f421c3d0ac6af1897a21cc4ea260ae8e610a402bf4c81c\u00a0<\/p>\n\n\n\n<p>ccb7d999ee4d979e175b8c87e09ccda0cbc93b6140471283e3a1f1f9da33759d\u00a0<\/p>\n\n\n\n<p>51e86408904c0ca3778361cde746783a0f2b9fd2a6782aa7e062aa597151876e\u00a0<\/p>\n\n\n\n<p>fb16933b09a4fcca5beff93da05566e924017fb534a2f45caf57b57a633f43a6\u00a0<\/p>\n\n\n\n<p>2b5d8f8db5fd38ae1c34807dcba35b057cffa61eb14ba3b558f82eb630480c3f\u00a0<\/p>\n\n\n\n<p>eb9c1649e01db6a9a94d5d50373e54865d672b14ad6f221c98047c562d3cc0f3\u00a0<\/p>\n\n\n\n<p>8c6ea44ce7f4ed4e4e7e19e11b3b345d58785c93b33aa795ddd1b0d753236b05\u00a0<\/p>\n\n\n\n<p>66a7828bc8c6c783b2ffa3c906d53f6dae1bbddc019283cc369d7d73247c5181\u00a0<\/p>\n\n\n\n<p>886df55794cbca146de96dcc626471b3c097a5c20ba488033b24f4347aa20a14\u00a0<\/p>\n\n\n\n<p>9367f4b4d2775ff47279d143dd9a0ef544ddff81946aab33da9350a49f14e1e1\u00a0<\/p>\n\n\n\n<p>b891fa118db5190f07b18be46eb9bc10677f9afab1406a7d52ce587522ab3d28\u00a0<\/p>\n\n\n\n<p>bad7c6f6ca25363a02eaceb3ed1e378218dc4a246a63d723cfcc5feee3af5056\u00a0<\/p>\n\n\n\n<p>21fefc3913d3d2dfde7f0dff54800ca7512eb5df9513b1a457a2af25fdd51b26\u00a0<\/p>\n\n\n\n<p>801c47550799831bfb1ac6c5c3fd698be95da19fc85bd65f5d8639f26244d2a9<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>DRILLAPP<\/strong><\/h2>\n\n\n\n<p>6fea579685d2433cedb1c32ef704575dcbc1d0a623769e824023ffccd0dedaae\u00a0<\/p>\n\n\n\n<p>76eb713e38f145ee68b89f2febd8f9a28bbb2b464da61cb029d84433a0b2c746\u00a0<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Network indicators<\/strong><\/h2>\n\n\n\n<p>80.89.224[.]13<\/p>\n\n\n\n<p>188.137.228[.]162\u00a0\u00a0<\/p>\n\n\n\n<p>hxxps:\/\/pastefy[.]app\/f69UjsFE\/raw<\/p>\n\n\n\n<p>hxxps:\/\/pastefy[.]app\/nkjTcFw3\/raw<\/p>\n\n\n\n<p>hxxps:\/\/short-link[.]net\/ZVMEq\u00a0<\/p>\n\n\n\n<p>hxxps:\/\/pastefy[.]app\/f69UjsFE\/raw\u00a0<\/p>\n\n\n\n<p>hxxps:\/\/short-link[.]net\/KCVTt\u00a0<\/p>\n\n\n\n<p>hxxps:\/\/iili[.]io\/fphPR3b.jpg\u00a0<\/p>\n\n\n\n<p>hxxps:\/\/short-link[.]net\/HdviE\u00a0<\/p>\n\n\n\n<p>hxxps:\/\/iili[.]io\/q995YYu.jpg\u00a0<\/p>\n\n\n\n<p>hxxps:\/\/pastefy[.]app\/nkjTcFw3\/raw\u00a0<\/p>\n\n\n\n<p>hxxps:\/\/iili[.]io\/q995zhl.jpg\u00a0<\/p>\n\n\n\n<p>hxxps:\/\/iili[.]io\/q995IQ2.jpg\u00a0<\/p>\n\n\n\n<p>hxxps:\/\/iili[.]io\/qKOFGe4.jpg\u00a0<\/p>\n\n\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>LAB52, the intelligence team at S2 Group, has identified a new campaign targeting Ukrainian entities, attributed to actors linked to Russia. The campaign, observed during February 2026, employs various judicial and charity themed lures to deploy a JavaScript\u2011based backdoor that runs through the Edge browser and has been named DRILLAPP by LAB52. This artifact enables [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":3183,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"[]"},"categories":[1],"tags":[],"class_list":{"0":"post-3152","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-uncategorised","8":"entry"},"featured_image_src":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/drillapp.png","featured_image_src_square":"https:\/\/lab52.io\/blog\/wp-content\/uploads\/2026\/03\/drillapp.png","author_info":{"display_name":"3722304989","author_link":"https:\/\/lab52.io\/blog\/author\/3722304989\/"},"_links":{"self":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/3152"}],"collection":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/comments?post=3152"}],"version-history":[{"count":12,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/3152\/revisions"}],"predecessor-version":[{"id":3186,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/posts\/3152\/revisions\/3186"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media\/3183"}],"wp:attachment":[{"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/media?parent=3152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/categories?post=3152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lab52.io\/blog\/wp-json\/wp\/v2\/tags?post=3152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}