Site icon API Security Blog

CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign

image
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a phishing campaign that's designed to deliver a malware codenamed LAMEHUG. "An obvious feature of LAMEHUG is the use of LLM (large language model), used to generate commands based on their textual representation (description)," CERT-UA said in a Thursday advisory. The activity has been attributed with medium confidence to a Russian state-sponsored hacking group tracked as APT28, which is also known as Fancy Bear, Forest Blizzard, Sednit, Sofacy, and UAC-0001. The cybersecurity agency said it found the malware after receiving reports on July 10, 2025, about suspicious emails sent from compromised accounts and impersonating ministry officials. The emails targeted executive government authorities. Present within these emails was a ZIP archive that, in turn, contained the LAMEHUG payload in the form of three different variants named "Додаток.pif, "AI_generator_uncensored_Canvas_PRO_v0.9.exe," and "image.py." Developed using Python, LAMEHUG leverages Qwen2.5-Coder-32B-Instruct, a large language model developed by Alibaba Cloud that's specifically fine-tuned for coding tasks, such as generation, reasoning, and fixing. It's available on platforms Hugging Face and Llama. "It uses the LLM Qwen2.5-Coder-32B-Instruct via the huggingface[.]co service API to generate commands based on statically entered text (description) for their subsequent execution on a computer," CERT-UA said. It supports commands…Read More

Exit mobile version