By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
Computing

APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine

News Room
Last updated: 2026/03/05 at 6:00 AM
News Room Published 5 March 2026
Share
APT28-Linked Campaign Deploys BadPaw Loader and MeowMeow Backdoor in Ukraine
SHARE

Ravie LakshmananMar 05, 2026Cyber Espionage / Threat Intelligence

Cybersecurity researchers have disclosed details of a new Russian cyber campaign that has targeted Ukrainian entities with two previously undocumented malware families named BadPaw and MeowMeow.

“The attack chain initiates with a phishing email containing a link to a ZIP archive. Once extracted, an initial HTA file displays a lure document written in Ukrainian concerning border crossing appeals to deceive the victim,” ClearSky said in a report published this week.

In parallel, the attack chain leads to the deployment of a .NET-based loader called BadPaw, which then establishes communication with a remote server to fetch and deploy a sophisticated backdoor called MeowMeow.

The campaign has been attributed with moderate confidence to the Russian state-sponsored threat actor known as APT28, based on the targeting footprint, the geopolitical nature of the lures used, and overlaps with techniques observed in previous Russian cyber operations. 

The starting point of the attack sequence is a phishing email sent from ukr[.]net, likely in an attempt to establish credibility and secure the trust of targeted victims. Present in the message is a link to a purported ZIP file, causing the user to be redirected to a URL that loads an “exceptionally small image,” effectively acting as a tracking pixel to signal the operators that the link was clicked.

Once this step is complete, the victim is redirected to a secondary URL from where the archive is downloaded. The ZIP file includes an HTML Application (HTA) that, once launched, drops a decoy document as a distraction mechanism, while it executes follow-on stages in the background.

“The dropped decoy document serves as a social engineering tactic, presenting a confirmation of receipt for a government appeal regarding a Ukrainian border crossing,” ClearSky said. “This lure is intended to maintain the veneer of legitimacy.”

The HTA file also carries out checks to avoid running within sandbox environments. It does this by querying the Windows Registry key “KLMSOFTWAREMicrosoftWindows NTCurrentVersionInstallDate” to estimate the “age” of the operating system. The malware is designed to abort execution if the system was installed less than ten days prior.

Should the system meet the environment criteria, the malware locates the downloaded ZIP archive and extracts two files from it – a Visual Basic Script (VBScript) and a PNG image – and saves them to disk under different names. It also creates a scheduled task to execute the VBScript as a way of ensuring persistence on the infected system.

The primary responsibility of the VBScript is to extract malicious code embedded within the PNG image, an obfuscated loader referred to as BadPaw that’s capable of contacting a command-and-control (C2) server to download additional components, including an executable named MeowMeow.

“Consistent with the ‘BadPaw’ tradecraft, if this file is executed independently of the full attack chain, it initiates a dummy code sequence,” the Israeli cybersecurity company explained. “This decoy execution displays a graphical user interface (GUI) featuring a picture of a cat, aligning with the visual theme of the initial image file from which the primary malware was extracted.”

“When the ‘MeowMeow’ button within the decoy GUI is clicked, the application simply displays a ‘Meow Meow Meow’ message, performing no further malicious actions. This serves as a secondary functional decoy to mislead manual analysis.”

The backdoor’s malicious code is activated only when it’s executed with a certain parameter (“-v”) that’s provided by the initial infection chain, and after checking that it’s running on an actual endpoint as opposed to a sandbox, and no forensic and monitoring tools like Wireshark, Procmon, Ollydbg, and Fiddler are running in the background.

At its core, MeowMeow is equipped to remotely execute PowerShell commands on the compromised host and support file system operations, such as the ability to read, write, and delete data. ClearSky said it identified Russian language strings in the source code, reinforcing the assessment that the activity is the work of a Russian-speaking threat actor.

“The presence of these Russian-language strings suggests two possibilities: the threat actor committed an operational security (OPSEC) error by failing to localize the code for the Ukrainian target environment, or they inadvertently left Russian development artifacts within the code during the malware’s production phase,” it said.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Apple Music Rolling Out Disclosure Tags for AI-Made Songs Apple Music Rolling Out Disclosure Tags for AI-Made Songs
Next Article Google just made my favorite Phone app feature even better. Here’s how to use it Google just made my favorite Phone app feature even better. Here’s how to use it
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Ship First, Scale Never: Marvin’s Anti-Overengineering Guide | HackerNoon
Ship First, Scale Never: Marvin’s Anti-Overengineering Guide | HackerNoon
Computing
Russian army faces comms crisis amid Starlink cut and Kremlin crackdown
Russian army faces comms crisis amid Starlink cut and Kremlin crackdown
News
Walmart may be preparing a new version of its popular Onn 4K Pro streaming box
Walmart may be preparing a new version of its popular Onn 4K Pro streaming box
News
AI can unmask your secret accounts 
AI can unmask your secret accounts 
News

You Might also Like

Ship First, Scale Never: Marvin’s Anti-Overengineering Guide | HackerNoon
Computing

Ship First, Scale Never: Marvin’s Anti-Overengineering Guide | HackerNoon

0 Min Read
Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders
Computing

Preparing for the Quantum Era: Post-Quantum Cryptography Webinar for Security Leaders

3 Min Read
ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
Computing

ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More

19 Min Read
Vibe Coding vs Specs: The Missing Middle | HackerNoon
Computing

Vibe Coding vs Specs: The Missing Middle | HackerNoon

8 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?