top of page

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

  • 6 days ago
  • 2 min read

Key Findings


  • Google Threat Intelligence Group (GTIG) has identified a previously undocumented threat actor, possibly affiliated with Russian intelligence services, that has been targeting Ukrainian organizations with the CANFAIL malware.

  • The threat actor has primarily targeted defense, military, government, and energy organizations within the Ukrainian regional and national governments, but has also shown growing interest in aerospace, manufacturing with military/drone ties, nuclear and chemical research, and international organizations involved in Ukraine's conflict monitoring and humanitarian aid.

  • Despite being less sophisticated and resourced than other Russian threat groups, the actor has recently begun to overcome some technical limitations by leveraging large language models (LLMs) for reconnaissance, creating lures for social engineering, and solving basic technical questions for post-compromise activity and command-and-control infrastructure setup.


Background


  • The threat actor has been conducting phishing campaigns, impersonating legitimate Ukrainian and Romanian energy organizations to obtain unauthorized access to organizational and personal email accounts.

  • The group has also masqueraded as a Romanian energy company that works with customers in Ukraine, in addition to targeting a Romanian firm and conducting reconnaissance on Moldovan organizations.

  • To enable its operations, the threat actor generates email address lists tailored to specific regions and industries based on their research.


Attack Vectors


  • The attack chains contain LLM-generated lures and embed Google Drive links pointing to a RAR archive containing the CANFAIL malware, often disguised with a double extension (*.pdf.js) to pass off as a PDF document.

  • CANFAIL is an obfuscated JavaScript malware that executes a PowerShell script, which then downloads and executes a memory-only PowerShell dropper. In parallel, it displays a fake "error" message to the victim.


Linked Campaigns


  • The threat actor is also linked to a campaign called PhantomCaptcha, which was disclosed by SentinelOne SentinelLABS in October 2025. This campaign targeted organizations associated with Ukraine's war relief efforts through phishing emails that directed recipients to fake pages hosting ClickFix-style instructions to activate the infection sequence and deliver a WebSocket-based trojan.


Other Russian Threat Groups


  • GTIG has observed other Russian espionage groups, such as APT44 (Sandworm/FROZENBARENTS), TEMP.Vermin, UNC5125, UNC5792, UNC4221, UNC5976, and UNC6096, targeting Ukrainian and Western defense-related organizations using military- and drone-themed lures.

  • These groups have employed a variety of malware, including WAVESIGN, INFAMOUSCHISEL, VERMONSTER, SPECTRUM, MESSYFORK, GREYBATTLE, STALECOOKIE, TINYWHALE, and CraxsRAT, to steal information and hijack secure messaging accounts used by the Ukrainian military.


Sources


  • https://thehackernews.com/2026/02/google-ties-suspected-russian-actor-to.html

  • https://securityaffairs.com/187976/hacking/suspected-russian-hackers-deploy-canfail-malware-against-ukraine.html

  • https://x.com/xcybersecnews/status/2022448392949911781

  • https://www.news4hackers.com/google-links-russian-actor-to-canfail-malware-attacks-on-ukrainian-organizations/

  • https://x.com/TheCyberSecHub/status/2022363721679671428

  • https://x.com/shah_sheikh/status/2022363723936207012

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page