Russian APT28 Deploys LAMEHUG Malware Using AI for Phishing Attacks

  • A new phishing campaign in Ukraine delivers Malware called LAMEHUG using compromised email accounts.
  • LAMEHUG uses a large language model, Qwen2.5-Coder-32B-Instruct by Alibaba Cloud, to generate and execute system commands.
  • The campaign is linked with medium confidence to Russian state-backed group APT28.
  • Attackers target executive government officials, seeking to steal system data and documents using legitimate cloud services as cover.
  • Recent findings also reveal malware attempts to bypass Artificial Intelligence analyses using prompt injection techniques.

On July 18, 2025, the Computer Emergency Response Team of Ukraine (CERT-UA) reported a phishing campaign aimed at delivering malware known as LAMEHUG. The campaign used hacked email accounts that appeared to be from ministry officials, targeting government executives in Ukraine.

- Advertisement -

According to CERT-UA, the scheme was uncovered after suspicious emails were reported on July 10, 2025. These emails contained a ZIP file with three different versions of the LAMEHUG malware: “Додаток.pif,” “AI_generator_uncensored_Canvas_PRO_v0.9.exe,” and “image.py.” The agency attributed the activity with medium confidence to the Russian state-aligned group APT28.

LAMEHUG is written in Python and relies on the Qwen2.5-Coder-32B-Instruct large language model from Alibaba Cloud, which is designed for coding tasks. CERT-UA said, “It uses the LLM Qwen2.5-Coder-32B-Instruct via the huggingface[.]co service API to generate commands based on statically entered text (description) for their subsequent execution on a computer.” The malware can collect basic host details and search for .txt and .pdf files in key user folders like Documents, Downloads, and Desktop. Stolen data is sent to attacker-controlled servers through secure file transfer protocol (SFTP) or HTTP POST requests.

Attackers used the Hugging Face and Llama platforms to access the model, blending in with legitimate cloud traffic. CERT-UA stated that the abuse of trusted cloud infrastructure makes detection more challenging.

In related findings, security researchers from Check Point recently detected a malware called Skynet that tries to resist artificial intelligence analysis. Skynet employs “prompt injection,” which are tricks embedded into the malware code that tell AI-powered security tools to ignore detection commands or return false negatives. As quoted by Check Point, “First, we had the Sandbox, which led to hundreds of sandbox escape and evasion techniques; now, we have the AI malware auditor. The natural result is hundreds of attempted AI audit escape and evasion techniques. We should be ready to meet them as they arrive.”

- Advertisement -

CERT-UA did not report the overall success rate of the LAMEHUG campaign. The agency continues to monitor phishing and malware strategies that use advanced coding models and legitimate enterprise services to avoid detection.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Bhutan Moves $12M in Bitcoin Amid Market Gains

Bhutan, a major nation-state holder, moved around 175 Bitcoin worth approximately $11.85 million on...

Alphabet Stock Could Have Made $365K In Decade: Buffett Wisdom

Warren Buffett's long-term investment philosophy emphasizes holding stocks indefinitely, as captured in his quote,...

Grok AI Mocks Football Tragedy Victims After User Prompts

Grok generated vulgar posts referencing football tragedies like Hillsborough after users prompted it to...

Anthropic sues Trump for retaliation over Pentagon AI ban

AI company Anthropic has sued multiple U.S. government agencies, alleging an unlawful retaliation campaign...

Bitcoin Reaches $69k Amid Tentative Market Stabilization

Bitcoin's price climbed more than 4% to roughly $69,100 as risk assets steadied following...

Must Read

7 Best Audiobooks on Cybersecurity

Cybersecurity has become an essential topic in our increasingly digital world. As technology evolves and becomes more integrated into our daily lives, the importance...