Russian APT28 Deploys LAMEHUG Malware Using AI for Phishing Attacks

  • A new phishing campaign in Ukraine delivers Malware called LAMEHUG using compromised email accounts.
  • LAMEHUG uses a large language model, Qwen2.5-Coder-32B-Instruct by Alibaba Cloud, to generate and execute system commands.
  • The campaign is linked with medium confidence to Russian state-backed group APT28.
  • Attackers target executive government officials, seeking to steal system data and documents using legitimate cloud services as cover.
  • Recent findings also reveal malware attempts to bypass Artificial Intelligence analyses using prompt injection techniques.

On July 18, 2025, the Computer Emergency Response Team of Ukraine (CERT-UA) reported a phishing campaign aimed at delivering malware known as LAMEHUG. The campaign used hacked email accounts that appeared to be from ministry officials, targeting government executives in Ukraine.

- Advertisement -

According to CERT-UA, the scheme was uncovered after suspicious emails were reported on July 10, 2025. These emails contained a ZIP file with three different versions of the LAMEHUG malware: “Додаток.pif,” “AI_generator_uncensored_Canvas_PRO_v0.9.exe,” and “image.py.” The agency attributed the activity with medium confidence to the Russian state-aligned group APT28.

LAMEHUG is written in Python and relies on the Qwen2.5-Coder-32B-Instruct large language model from Alibaba Cloud, which is designed for coding tasks. CERT-UA said, “It uses the LLM Qwen2.5-Coder-32B-Instruct via the huggingface[.]co service API to generate commands based on statically entered text (description) for their subsequent execution on a computer.” The malware can collect basic host details and search for .txt and .pdf files in key user folders like Documents, Downloads, and Desktop. Stolen data is sent to attacker-controlled servers through secure file transfer protocol (SFTP) or HTTP POST requests.

Attackers used the Hugging Face and Llama platforms to access the model, blending in with legitimate cloud traffic. CERT-UA stated that the abuse of trusted cloud infrastructure makes detection more challenging.

In related findings, security researchers from Check Point recently detected a malware called Skynet that tries to resist artificial intelligence analysis. Skynet employs “prompt injection,” which are tricks embedded into the malware code that tell AI-powered security tools to ignore detection commands or return false negatives. As quoted by Check Point, “First, we had the Sandbox, which led to hundreds of sandbox escape and evasion techniques; now, we have the AI malware auditor. The natural result is hundreds of attempted AI audit escape and evasion techniques. We should be ready to meet them as they arrive.”

- Advertisement -

CERT-UA did not report the overall success rate of the LAMEHUG campaign. The agency continues to monitor phishing and malware strategies that use advanced coding models and legitimate enterprise services to avoid detection.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

CryptoQuant: Whale ‘Reaccumulation’ Narrative Overstated Now

Onchain data from CryptoQuant indicate claims of large-scale Bitcoin reaccumulation by whales are overstated.Exchange...

XRP Eyes Rally as ETFs and Buy Signal Boost 2026 Hopes Surge

Ripple settled its US lawsuit in 2025, helping XRP reach a $3.65 all-time high...

Bitfinex Hacker Ilya Lichtenstein Freed Early via First Step

Ilya Lichtenstein was released from prison after serving 14 months of a five-year sentence...

Waymo’s 2026 Expansion Could Drive Big Gains for GOOGL Surge

Alphabet rallied more than 60% in 2025 and enters 2026 with investor optimism tied...

Tesla shares slip as Q4 deliveries deemed largely neutral US

Tesla delivered 418,227 vehicles in Q4, slightly below the 422,850 company-polled consensus and last...
- Advertisement -

Must Read

How To Buy a Handshake Domain: A Step-by-Step Guide

Handshake Domains | Benefits | Drawbacks | How To Buy | Supported BrowsersIn this step-by-step guide, I am going to show you how to...
Bitcoin (BTC) $ 89,609.00 1.65%
Ethereum (ETH) $ 3,112.50 4.27%
XRP (XRP) $ 1.98 6.18%
Bittensor (TAO) $ 244.57 8.42%
Polkadot (DOT) $ 2.09 4.90%
Cardano (ADA) $ 0.385711 8.21%
Chainlink (LINK) $ 13.22 6.07%
Hyperliquid (HYPE) $ 24.19 0.67%
Monero (XMR) $ 419.37 0.16%
Hedera (HBAR) $ 0.120401 6.67%
Toncoin (TON) $ 1.82 7.42%