Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

March 6, 2026

Zero-Click FreeScout Bug Enables Remote Code Execution

March 6, 2026

Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns

March 5, 2026
Facebook X (Twitter) Instagram
Friday, March 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Multi-Stage “BadPaw” Malware Campaign Targets Ukraine
News

Multi-Stage “BadPaw” Malware Campaign Targets Ukraine

Team-CWDBy Team-CWDMarch 5, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A newly identified malware campaign leveraging a Ukrainian email service to build credibility has been uncovered by cybersecurity researchers.

The operation begins with an email sent from an address hosted on ukr[.]net, a popular Ukrainian provider previously abused by the Russian-linked threat actor APT28 in past campaigns.

According to an advisory by researchers at ClearSky,  who have named the malware “BadPaw,” the attack is triggered when a recipient clicks a link claiming to host a ZIP archive. Instead of initiating a direct download, the victim is redirected to a domain that loads a tracking pixel, allowing the attacker to confirm engagement. A second redirect then delivers the ZIP file.

Although the archive appears to contain a standard HTML file, ClearSky researchers found it is actually an HTA application in disguise. Once executed, the file displays a decoy document referencing a Ukrainian government border crossing appeal, while malicious processes run in the background.

Read more on malware evasion techniques: “Digital Parasite” Warning as Attackers Favor Stealth for Extortion

Before proceeding, the malware checks a Windows Registry key to determine the system’s installation date. If the operating system is less than ten days old, execution stops, a tactic designed to avoid sandbox environments used by security analysts.

If conditions are met, the malware searches for the original ZIP file and extracts additional components. Persistence is achieved through a scheduled task that runs a VBS script, which uses steganography to extract hidden executable code from an image file.

Only nine antivirus engines detected the payload at the time of analysis.

Multi-Layered Backdoor and Attribution

Once activated with a specific parameter, BadPaw connects to a command-and-control (C2) server. The staged communication process includes:

  • Retrieving a numeric response from the /getcalendar endpoint

  • Accessing a landing page titled “Telemetry UP!” via /eventmanager

  • Downloading ASCII-encoded payload data embedded within HTML

The decoded data ultimately deploys a backdoor named “MeowMeowProgram[.]exe,” which provides remote shell access and file system control.

The MeowMeow backdoor incorporates four defensive layers, including runtime parameter requirements, .NET Reactor obfuscation, sandbox detection and monitoring for forensic tools such as Wireshark, Procmon, Ollydbg and Fiddler.

If executed incorrectly, it displays a benign graphical interface featuring a cat image. Clicking the “MeowMeow” button simply generates a harmless message.

ClearSky also identified Russian-language strings embedded in the code. One translated line reads: “Time to reach working/operational condition: (d+) seconds.”

According to ClearSky, these artifacts may indicate a Russian-speaking developer or an operational oversight in failing to localize the malware for Ukrainian targets.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleUAC-0050 Targets European Financial Institution With Spoofed Domain and RMS Malware
Next Article RoguePilot Flaw in GitHub Codespaces Enabled Copilot to Leak GITHUB_TOKEN
Team-CWD
  • Website

Related Posts

News

Top 5 Ways Broken Triage Increases Business Risk Instead of Reducing It

March 6, 2026
News

Coruna Exploit Kit Targets Older iPhones in Multi-Stage Campaigns

March 5, 2026
News

Malicious NuGet Packages Stole ASP.NET Data; npm Package Dropped Malware

March 5, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Children and chatbots: What parents should know

January 23, 2026

How chatbots can help spread scams

October 14, 2025

Here’s what you should know

February 6, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.