ANAVEM
Reference
Languagefr
Dark military command center with glowing security alert screens and dramatic lighting

Russian APT Targets Ukrainian Defense with New Malware

Russian-linked threat actors launched a fresh campaign against Ukrainian entities in February 2026, deploying new malware variants.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
16 March 2026, 10:07 2 min read 16

Last updated 16 March 2026, 23:57

SEVERITYHigh
EXPLOITActive Exploit
PATCH STATUSUnavailable
VENDORUkrainian Government Organizations
AFFECTEDUkrainian defense systems and ...
CATEGORYCyber Attacks

Key Takeaways

Russian APT Launches February 2026 Campaign Against Ukraine

Russian-linked threat actors initiated a targeted campaign against Ukrainian entities in February 2026, according to S2 Grupo's LAB52 threat intelligence team. The operation shows tactical overlaps with previous attacks attributed to Laundry Bear, also tracked as UAC-0190 or Void Blizzard.

Security researchers identified the campaign through analysis of malware samples and infrastructure patterns consistent with Russian state-sponsored operations. The attackers deployed new malware variants specifically crafted for this operation.

Ukrainian Defense Forces Primary Target

The campaign primarily focuses on Ukrainian defense organizations and government entities. Previous Laundry Bear operations have consistently targeted Ukraine's military infrastructure and defense contractors since the conflict began.

The threat group has maintained persistent access attempts against critical Ukrainian systems throughout 2025 and into early 2026. Defense organizations remain the highest-priority targets for Russian cyber operations.

Related: ClickFix Malware Campaign Targets AI Coding Assistants

Related: China-Linked APT Targets Southeast Asian Military Since 2020

Related: China APT Targets South American Telecom Infrastructure

Related: Chinese APT Targets Asian Organizations in Multi-Year

Laundry Bear Tactics Evolve for 2026 Operations

The new campaign leverages updated malware tools while maintaining core operational techniques from previous Laundry Bear attacks. Researchers noted infrastructure reuse and similar command-and-control patterns from earlier operations.

Ukrainian organizations should implement enhanced monitoring for Russian APT indicators and review CISA's Known Exploited Vulnerabilities catalog for potential attack vectors. Security teams must prioritize patching systems against vulnerabilities commonly exploited by Russian state actors.

Frequently Asked Questions

What is Laundry Bear APT group?+
Laundry Bear, also known as UAC-0190 or Void Blizzard, is a Russian state-sponsored threat group that has consistently targeted Ukrainian defense organizations since the conflict began. The group specializes in deploying custom malware against military and government infrastructure.
When did the latest Ukrainian cyber attack occur?+
The latest Russian APT campaign against Ukrainian entities was observed in February 2026 by S2 Grupo's LAB52 threat intelligence team. This represents a continuation of ongoing Russian cyber operations against Ukrainian defense forces.
How can Ukrainian organizations defend against Russian APT attacks?+
Ukrainian organizations should implement enhanced monitoring for Russian APT indicators and prioritize patching systems against commonly exploited vulnerabilities. Security teams must review CISA's Known Exploited Vulnerabilities catalog and maintain updated threat intelligence on Russian state actor tactics.
Emanuel DE ALMEIDA
About the Author

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...