{"id":278,"date":"2026-03-16T10:38:35","date_gmt":"2026-03-16T10:38:35","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=278"},"modified":"2026-03-16T10:38:35","modified_gmt":"2026-03-16T10:38:35","slug":"drillapp-backdoor-targets-ukraine-abuses-microsoft-edge-debugging-for-stealth-espionage","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=278","title":{"rendered":"DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage"},"content":{"rendered":"<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjLAzfBgcfc_bSkMovfPss0X0ONO4MhDVIOKyB_FgCnAZ4NOfVM3MdIMfIr0QMDCqKBvJaAz0mRIPYV075qfnurW27qWCCmjlcnDX-DOnb-kHulHrvk-k_cZCchJfEfxBdhkUf3GCbboHdQzxOCv3sEzSvgKaOoCNRgD20y7ZywYWsYtjjnh8dDLMbqJnvr\/s1700-e365\/uk-cyberattacks.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Ukrainian entities have emerged as the target of a new campaign likely orchestrated by threat actors linked to Russia, according to a report from S2 Grupo&#8217;s LAB52 threat intelligence team.<\/p>\n<p>The campaign, <a href=\"https:\/\/lab52.io\/blog\/drillapp-new-backdoor-targeting-ukrainian-entities-with-possible-links-to-laundry-bear\/\">observed<\/a> in February 2026, has been assessed to share overlaps with a prior campaign mounted by Laundry Bear (aka UAC-0190 or Void Blizzard) aimed at Ukrainian defense forces with a malware family known as PLUGGYAPE.<\/p>\n<p>The attack activity \u00abemploys various judicial and charity themed lures to deploy a JavaScript\u2011based backdoor that runs through the Edge browser,\u00bb the cybersecurity company said. Codenamed <strong>DRILLAPP<\/strong>, the malware is capable of uploading and downloading files, leveraging the microphone, and capturing images through the webcam by taking advantage of the web browser&#8217;s features.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/not-fast-enough-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhlXM830ruQd2xT6M7JNeNRjaFa1onD12WjSCHihTFMTzbyfT9h-irPmXy_h3E1HGSs6sdv7FTmnyNVTM5kmSb7BuUtZe8gKoTQt99P1sSzRcqqXpOJP6eoAOhR3DGb6qHx9kOZ_HBZUMmVnsnd0DM7QfUp81bgzTvvgLww6oqB-EhnDfWXH5pWCYhAsyLs\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>Two different versions of the campaign have been identified, with the first iteration detected in early February by making use of a Windows shortcut (LNK) file to create an HTML Application (HTA) in the temporary folder, which then loads a remote remote script hosted on Pastefy, a legitimate paste service.<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>To establish persistence, the LNK files are copied to the Windows Startup folder so that they are automatically launched following a system reboot. The attack chain then displays a URL containing lures related to installing Starlink or a Ukrainian charity named Come Back Alive Foundation.<\/p>\n<p>The HTML file is eventually executed via the Microsoft Edge browser in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Headless_browser\">headless mode<\/a>, which then loads the remote obfuscated script hosted on Pastefy.<\/p>\n<p>The browser is executed with additional parameters like \u2013no-sandbox, \u2013disable-web-security, \u2013allow-file-access-from-files, \u2013use-fake-ui-for-media-stream, \u2013auto-select-screen-capture-source=true, and \u2013disable-user-media-security, granting it access to the local file system, as well as camera, microphone, and screen capture without requiring any user interaction.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi1aAJG38sglu5mCXzEeN4sPJuXRmQmzD0hAacZH8ZLmMj91KNzfkY277d7-IUBApMShbNfKhAh3VkWby75Ewd-GrKypXi9HdvUctBGPy6wbtc2O0NWMgdr1mLEEkg4us70GK70YTJosE16KL8iC6PI3mEzYZyTbPz5FZnmwft0iizYqY6U0_0iwn9VqCGC\/s1700-e365\/camera.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi1aAJG38sglu5mCXzEeN4sPJuXRmQmzD0hAacZH8ZLmMj91KNzfkY277d7-IUBApMShbNfKhAh3VkWby75Ewd-GrKypXi9HdvUctBGPy6wbtc2O0NWMgdr1mLEEkg4us70GK70YTJosE16KL8iC6PI3mEzYZyTbPz5FZnmwft0iizYqY6U0_0iwn9VqCGC\/s1700-e365\/camera.png\" alt=\"\" border=\"0\" data-original-height=\"436\" data-original-width=\"1024\"\/><\/a><\/div>\n<p>The artifact essentially functions as a lightweight backdoor to facilitate file system access and capture audio from the microphone, video from the camera, and images of the device&#8217;s screen all through the browser. It also generates a device fingerprint using a technique called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Canvas_fingerprinting\">canvas fingerprinting<\/a> when run for the first time and uses Pastefy as a dead drop resolver to fetch a WebSocket URL used for command\u2011and\u2011control (C2) communications.<\/p>\n<p>The malware transmits the device fingerprint data along with the victim&#8217;s country, which is determined from the machine&#8217;s time zone. It specifically checks if the time zones correspond to the U.K., Russia, Germany, France, China, Japan, the U.S., Brazil, India, Ukraine, Canada, Australia, Italy, Spain, and Poland. If that&#8217;s not the case, it defaults to the U.S.<\/p>\n<p>The second version of the campaign, spotted in late February 2026, eschews LNK files for Windows Control Panel modules, while keeping the infection sequence largely intact. Another notable change involves the backdoor itself, which has now been upgraded to allow recursive file enumeration, batch file uploads, and arbitrary file download.<\/p>\n<p>\u00abFor security reasons, JavaScript does not allow the remote downloading of files,\u00bb LAB52 said. \u00abThis is why the attackers use the Chrome DevTools Protocol (CDP), an internal protocol of Chromium\u2011based browsers that can only be used when the \u2013remote-debugging-port parameter is enabled.\u00bb<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/cyber-comm-guide-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigDbfWwE4P_DsjfBRxgecgosqTRr8-2j328LrzdUBWrWmWeDUTI7OhXc-zXveYOjBc7GStGz5WnpXsJGaLCuoryIXbL7NxRyaWzIJGO1TBpd48NkYzNqTMj9zWMzgfvqh20RxsdMll45TFiMzXja0pAd7roFjMnzsRYBGHOWSLnyKN-oMKyCLoYcjmb5hm\/s728-e100\/ciso-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>It&#8217;s believed that the backdoor is still in the initial stages of development. An early variant of the malware detected in the wild on January 28, 2026, has been observed just communicating with the domain \u00abgnome[.]com\u00bb instead of downloading the primary payload from Pastefy.<\/p>\n<p>\u00abOne of the most notable aspects is the use of the browser to deploy a backdoor, which suggests that the attackers are exploring new ways to evade detection,\u00bb the Spanish security vendor said.<\/p>\n<p>\u00abThe browser is advantageous for this type of activity because it is a common and generally non\u2011suspicious process, it offers extended capabilities accessible through debugging parameters that enable unsafe actions such as downloading remote files, and it provides legitimate access to sensitive resources such as the microphone, camera, or screen recording without triggering immediate alerts.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ukrainian entities have emerged as the target of a new campaign likely orchestrated by threat actors linked to Russia, according to a report from S2 Grupo&#8217;s LAB52 threat intelligence team.&hellip;<\/p>\n","protected":false},"author":1,"featured_media":279,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[226,179,690,689,568,691,147,570,78,451],"class_list":["post-278","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-abuses","tag-backdoor","tag-debugging","tag-drillapp","tag-edge","tag-espionage","tag-microsoft","tag-stealth","tag-targets","tag-ukraine"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=278"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/278\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/279"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}