Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DRILLAPP Backdoor Exploits Microsoft Edge in Ukraine

DRILLAPP Backdoor Exploits Microsoft Edge in Ukraine

Posted on March 16, 2026 By CWS

In a recent development, various Ukrainian entities have been targeted by a new cyber campaign, reportedly orchestrated by Russian-affiliated threat actors, as per LAB52, the threat intelligence division of S2 Grupo. The campaign, traced back to February 2026, bears similarities to previous attacks by the group known as Laundry Bear (also referred to as UAC-0190 or Void Blizzard), which had previously targeted the Ukrainian defense sector with a malware family called PLUGGYAPE.

Technical Details of the DRILLAPP Backdoor

The current attack employs judicial and charity-themed lures to deliver a JavaScript-based backdoor, operating through the Microsoft Edge browser. The malware, dubbed DRILLAPP, has capabilities including file uploads and downloads, microphone access, and webcam image capture, utilizing the browser’s functionalities to maintain stealth.

According to cybersecurity experts, two different versions of this campaign have been discovered. The first, detected in early February, utilizes a Windows shortcut (LNK) file to create an HTML Application (HTA) in the system’s temporary folder. This leads to the execution of a remote script hosted on Pastefy, a legitimate paste service, ensuring persistence by placing LNK files in the Windows Startup folder.

Advanced Evasion Techniques

The Microsoft Edge browser is executed in headless mode, along with parameters that grant it extensive system access. These parameters enable file system access, camera, microphone, and screen capture capabilities without alerting the user. The HTML file initiates the loading of a remote, obfuscated script, furthering the attack’s stealth and effectiveness.

DRILLAPP also employs canvas fingerprinting to create a unique device fingerprint, which is sent along with the victim’s location data, inferred from the device’s time zone. The malware checks for time zones corresponding to major countries, defaulting to the U.S. if no match is found. This helps in tailoring the attack to specific geopolitical targets.

Evolution and Future Implications

A second version of the campaign, identified in late February 2026, replaces LNK files with Windows Control Panel modules, though the infection process remains largely unchanged. This version of DRILLAPP has been enhanced to allow recursive file operations and command executions, increasing its potential impact.

LAB52 notes that the backdoor is still under development, with early variants merely communicating with a domain rather than deploying the full payload. The use of a browser as the attack vector highlights a strategic shift by threat actors towards more covert methods of operation.

As this campaign unfolds, the use of browsers for deploying backdoors underscores the need for heightened vigilance. Browsers, being common and generally benign, offer extended capabilities for malicious activities, making them a preferred tool for cyber espionage.

The Hacker News Tags:Backdoor, Cybersecurity, DRILLAPP, Espionage, LAB52, Malware, Microsoft Edge, Russia, Threat Actors, Ukraine

Post navigation

Previous Post: Critical Flaws in Google Looker Studio Allow Data Breach
Next Post: Hackers Exploit Microsoft Tools to Deploy A0Backdoor

Related Posts

Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies Five U.S. Citizens Plead Guilty to Helping North Korean IT Workers Infiltrate 136 Companies The Hacker News
Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot Researchers Reveal Reprompt Attack Allowing Single-Click Data Exfiltration From Microsoft Copilot The Hacker News
Researchers Warn of MystRodX Backdoor Using DNS and ICMP Triggers for Stealthy Control Researchers Warn of MystRodX Backdoor Using DNS and ICMP Triggers for Stealthy Control The Hacker News
Ex-Defense Employee Sentenced for Selling Zero-Day Exploits Ex-Defense Employee Sentenced for Selling Zero-Day Exploits The Hacker News
Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware The Hacker News
Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • RondoDox Botnet’s Expansive Exploit Arsenal and IP Tactics
  • Stryker Faces Major Cyberattack by Iran-Linked Group
  • CamelClone Espionage Targets Governments via File-Sharing
  • Handala Hack Targets US, Israel with Destructive Cyberattacks
  • MEA Faces Surge in Shipping Scams Exploiting Phishing Tactics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • RondoDox Botnet’s Expansive Exploit Arsenal and IP Tactics
  • Stryker Faces Major Cyberattack by Iran-Linked Group
  • CamelClone Espionage Targets Governments via File-Sharing
  • Handala Hack Targets US, Israel with Destructive Cyberattacks
  • MEA Faces Surge in Shipping Scams Exploiting Phishing Tactics

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News