CERT-UA reports PLUGGYAPE cyberattacks on defense forces

Security Affairs
Actively Exploited

Overview

The Computer Emergency Response Team of Ukraine (CERT-UA) has reported a series of cyberattacks targeting Ukraine's defense forces, utilizing a malware known as PLUGGYAPE. These attacks are believed to be linked to the Russian cyber group Void Blizzard, also referred to as Laundry Bear or UAC-0190. The attacks come amidst ongoing tensions and conflict in the region, raising concerns about the security of military operations in Ukraine. Given the group’s history and capabilities, these incidents could pose significant risks to the integrity of defense communications and operations. The situation underscores the continuing cyber warfare component of the conflict, as nation-states increasingly rely on digital tactics alongside traditional military strategies.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: Ukraine's defense forces
  • Timeline: Newly disclosed

Original Article Summary

CERT-UA reported PLUGGYAPE malware attacks on Ukraine’s defense forces, linked with medium confidence to Russia’s Void Blizzard group. The Computer Emergency Response Team of Ukraine (CERT-UA) reported new cyberattacks against Ukraine’s defense forces using PLUGGYAPE malware. Government experts attributed the attack with medium confidence to the Russian-linked group Void Blizzard (aka Laundry Bear, UAC-0190), active […]

Impact

Ukraine's defense forces

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Newly disclosed

Remediation

Not specified

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Topics: This incident relates to Malware.

Related Coverage

Verizon outage affects over 2 million users: What 'SOS' means, refunds, more updates

Latest news

Verizon experienced a significant outage affecting over 2 million users across the United States, causing many to see an 'SOS' signal on their devices. This outage has raised concerns as it disrupted voice and data services for a considerable number of customers. While the exact cause of the outage has not been detailed, it is essential for users to remain informed about the situation as it develops. Verizon has acknowledged the issue and is working to restore services as quickly as possible. Users may want to check their accounts for potential refunds or credits due to the service disruption, especially if they rely heavily on their phones for work or communication.

Jan 15, 2026

Alleged Dell data compromise raises skepticism

SCM feed for Latest

A recent report has cast doubt on the authenticity of a claimed data breach involving Dell. The incident allegedly compromised a database containing over 5,000 records, which include emails from more than 2,000 employees. However, security experts and researchers are questioning the validity of this breach, suggesting the information may not be as serious as it appears. If true, this situation could expose sensitive employee data, raising concerns about privacy and security within the company. As investigations continue, it remains essential for organizations to remain vigilant about potential data breaches and to verify claims before reacting.

Jan 15, 2026

Intensified curtailment of North Korean cyber threats sought by US

SCM feed for Latest

The U.S. is calling on United Nations member states to strengthen sanctions against North Korea, particularly targeting its IT worker scheme and cryptocurrency thefts. These activities are believed to finance North Korea’s nuclear and ballistic missile programs. By pressuring other nations to take action, the U.S. aims to limit North Korea's ability to fund its military ambitions through cybercrime. This situation raises concerns among international cybersecurity experts, as North Korean cyber operations have become increasingly sophisticated and threatening. The focus on sanctions reflects a broader strategy to curb the regime's funding sources and deter its aggressive military posture.

Jan 15, 2026

South Korean giant Kyowon confirms data theft in ransomware attack

BleepingComputer

The Kyowon Group, a major South Korean conglomerate, has confirmed that it fell victim to a ransomware attack that has significantly disrupted its operations. During this incident, customer information may have been compromised, raising concerns about potential identity theft and fraud. The company is currently investigating the extent of the data breach and working to restore its systems. This attack not only affects Kyowon’s business operations but also puts its customers at risk as their personal data might be exposed. As cyberattacks become more frequent and sophisticated, businesses must prioritize cybersecurity measures to protect sensitive information.

Jan 14, 2026

Retail, Services Industries Under Fire in Oceania

darkreading

In 2022, businesses in Australia, New Zealand, and the South Pacific, particularly in retail and construction, faced a surge in cyberattacks, outpacing incidents in critical sectors such as healthcare and utilities. This trend indicates that smaller, Main Street businesses are increasingly becoming targets for cybercriminals, who often view them as more vulnerable due to their limited resources for cybersecurity. The rise in attacks could lead to significant financial losses, operational disruptions, and compromise of customer data, which would have lasting impacts on these businesses and their clients. As cyber threats evolve, it’s crucial for these industries to strengthen their defenses and adopt better security practices to protect against future breaches.

Jan 14, 2026

Sources: DHS finalizing replacement for disbanded critical infrastructure security council

CyberScoop

The Department of Homeland Security (DHS) is working to establish a new council called ANCHOR, aimed at improving communication and collaboration between government entities and the private sector regarding critical infrastructure security. This initiative comes after the previous council was disbanded and will include discussions on liability and other key areas. The goal is to enhance the nation's resilience against cyber threats and secure vital services that impact everyday life. By fostering dialogue between different stakeholders, the DHS hopes to create a more unified approach to safeguarding critical infrastructure. This development is important as it reflects an ongoing commitment to addressing vulnerabilities in sectors like energy, transportation, and communication.

Jan 14, 2026