CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 14, 2026

'FrostyNeighbor' APT Carefully Targets Govt Orgs in Poland, Ukraine

Dark Reading Archived May 14, 2026 ✓ Full text saved

Attackers uniquely fingerprint victims before delivering spear-phishing payloads aimed at espionage, in the latest campaign from the Belarussian nation-state threat group.

Full text archived locally
✦ AI Summary · Claude Sonnet


    CYBERATTACKS & DATA BREACHES ENDPOINT SECURITY REMOTE WORKFORCE THREAT INTELLIGENCE NEWS 'FrostyNeighbor' APT Carefully Targets Govt Orgs in Poland, Ukraine Attackers uniquely fingerprint victims before delivering spear-phishing payloads aimed at espionage, in the latest campaign from the Belarussian nation-state threat group. Elizabeth Montalbano,Contributing Writer May 14, 2026 4 Min Read SOURCE: PIOTR MALCZYK VIA ALAMY STOCK PHOTO A known Belarussian cyber-espionage group is back with a threat campaign against targets in Eastern Europe that uses spear-phishing to deliver malicious payloads to Eastern European government and military organizations. The campaign is unique in that the group appears to be particularly choosy about who it targets. In a campaign that began in March and targets entities in Poland and Ukraine, specifically, FrostyNeighbor — also tracked as Ghostwriter, UNC1151, TA445, PUSHCHA, and Storm-0257 — demonstrates a continued evolution of its cybercriminal activities on behalf of Belarus, according to a report by ESET research published Thursday. Its latest attack wave targets Ukrainian and Polish government organizations, and demonstrates how the group is continuing to evolve its espionage toolkit and delivery infrastructure, according to ESET. The advanced persistent threat (APT) is using a fresh compromise chain with spear-phishing PDFs, server-side victim validation, and a JavaScript-based version of PicassoLoader, the group's main payload downloader, to ultimately deploy Cobalt Strike for post-compromise operations. Related:Foxconn Attack Highlights Manufacturing's Cyber Crisis "Since January 2026, the group seems to have abandoned the use of macro-based initial lure document ... to only use blurry PDFs containing a malicious link to the next stage," Damien Schaeffer, ESET senior malware researcher, tells Dark Reading. That PDF lure impersonates Ukrainian telecom provider Ukrtelecom, and claims to provide secure customer data protection. It includes a download link hosted on attacker-controlled infrastructure. FrostNeighbor's Cyber Evolution Beyond Disinformation LOADING... FrostyNeighbor, believed to be active since at least 2016, is known for combining cyber espionage with other malicious operations, including spear-phishing, credential theft, malware deployment, and disinformation activity associated with the broader Ghostwriter influence operation.  That campaign — which began in 2021 and was first believed to be out of Russia — targeted several European countries, including Germany, Poland, Ukraine, and the Baltic states of Estonia, Latvia, and Lithuania, with phishing and misinformation. Eventually, researchers discovered that Ghostwriter/FrostyNeighbor had a more significant phishing infrastructure than first known, which figures prominently in its latest attack.  The latest iteration is highly targeted, with attackers fingerprinting the victim's computer to ensure targeting is specific. While this in and of itself is not unique, FrostyNeighbor operators appear to then be deciding manually whether or not the target will get the implant or not, Schaeffer says. Related:China's 'FamousSparrow' APT Nests in South Caucasus Energy Firm FrostyNeighbor's Manual, Specific Victim-Targeting If the victim is not from the expected geographic location, the server delivers a benign PDF file. However, if the victim is using an IP address from Ukraine, the server instead delivers a RAR archive containing the first stage of the attack — a JavaScript file that drops and displays the aforementioned PDF file as a decoy. Simultaneously, it also executes the second stage: a JavaScript version of the PicassoLoader downloader.  When running, PicassoLoader fingerprints the victim's computer by collecting the username, computer name, OS version, boot time of the computer, current time, and list of running processes with their process IDs. The decision whether or not to deliver a payload is very likely manually performed by the operators, as mentioned before, based on the collected information to decide if the victim is of interest, according to ESET. If they are, command-and-control (C2) responds with a third-stage JavaScript dropper for Cobalt Strike, the final payload; otherwise, it returns an empty response.  Defensive, Anti-Espionage Action for Eastern European Targets Related:Tech Can't Stop These Threats — Your People Can FrostyNeighbor remains "quite active in term of operations, and has demonstrated a continued evolution in its TTPs, trying new techniques to evade detections and compromise its targets," Schaeffer says. Indeed, the newest compromise chain outlined in the report is a continuation of the group's persistent willingness to update and renew its arsenal, according to ESET. For this reason, organizations that could be targeted by the group — especially in Poland, Lithuania, and Ukraine — should take defensive measures. These include taking the usual spear-phishing precautions, such as carefully analyzing emails with an attachment coming from external or unknown senders, Schaeffer says.  Defenders also can implement best practices such as restricting user permissions to the minimum, or preventing execution of downloaded files, and monitoring its users and environment for suspicious network communications, he adds. To help defenders identify the campaign, ESET also included a comprehensive list of indicators of compromise (IoCs) in its report. Don't miss the latest Dark Reading Confidential podcast, How the Story of a USB Penetration Test Went Viral. Two decades ago Dark Reading posted its first blockbuster piece — a column by a pen tester who sprinkled rigged thumb drives around a credit union parking lot and let curious employees do the rest. This episode looks back at the history-making piece with its author, Steve Stasiukonis. Listen now! About the Author Elizabeth Montalbano Contributing Writer Elizabeth Montalbano is a freelance writer, journalist, and therapeutic writing mentor with more than 25 years of professional experience. Her areas of expertise include technology, business, and culture. Elizabeth previously lived and worked as a full-time journalist in Phoenix, San Francisco, and New York City; she currently resides in a village on the southwest coast of Portugal. In her free time, she enjoys surfing, hiking with her dogs, traveling, playing music, yoga, and cooking. Want more Dark Reading stories in your Google search results? ADD US NOW More Insights Industry Reports How Enterprises Are Developing Secure Applications Inside RSAC 2026: security leaders reveal the risks redefining your defense strategy How Enterprises Are Harnessing Emerging Technologies in Cybersecurity Ditch the Data Center: Understanding Flexible Cloud Infrastructure Security Management 2025 State of Malware Access More Research Webinars What is the Right Role for Identity Threat Detection and Response (ITDR) in Your Organization? Your Guide to Securing AI Adoption in Your Organization The New Attack Surface: How Attackers Are Exploiting OAuth to Own Your Cloud Workspace Prompt Injection Is Just the Start: Securing LLMs in AI Systems Anatomy of a Data Breach: What to Do if it Happens to You More Webinars You May Also Like CYBERATTACKS & DATA BREACHES Critical Fortinet Flaws Under Active Attack by Jai Vijayan, Contributing Writer DEC 17, 2025 CYBERATTACKS & DATA BREACHES CISA Warns of 'Ongoing' Brickstorm Backdoor Attacks by Rob Wright DEC 04, 2025 CYBERATTACKS & DATA BREACHES F5 BIG-IP Environment Breached by Nation-State Actor by Alexander Culafi OCT 15, 2025 CYBERATTACKS & DATA BREACHES Jaguar Land Rover Shows Cyberattacks Mean (Bad) Business by Robert Lemos, Contributing Writer OCT 03, 2025 Editor's Choice THREAT INTELLIGENCE From Stuxnet to ChatGPT: 20 News Events That Shaped Cyber byDark Reading Editorial Team MAY 6, 2026 31 MIN READ CYBER RISK Physical Cargo Theft Gets a Boost From Cybercriminals byRobert Lemos MAY 4, 2026 5 MIN READ CYBER RISK NSA Chief During Snowden Affair Shares Regrets, Reflections 13 Years Later byDark Reading Editorial Team APR 28, 2026 Want more Dark Reading stories in your Google search results? Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE LOADING... RSAC 2026: key news & insights At RSAC 2026, Dark Reading captured critical intelligence on AI, new attack methods, geopolitics, and much more Get Your Recap Webinars Your Guide to Securing AI Adoption in Your Organization TUES, JUNE 9, 2026 AT 1PM EST What is the Right Role for Identity Threat Detection and Response (ITDR) in Your Organization? WED, JUNE 3, 2026 AT 1PM EST The New Attack Surface: How Attackers Are Exploiting OAuth to Own Your Cloud Workspace WED, JUNE 24,2026 AT 1PM EST Prompt Injection Is Just the Start: Securing LLMs in AI Systems TUES, MAY 26, 2026, AT 1PM EST Anatomy of a Data Breach: What to Do if it Happens to You JUNE 18TH, 2026 | 11:00AM -5:00PM ET | DOORS OPEN AT 10:30AM ET More Webinars BLACK HAT USA | MANDALAY BAY, LAS VEGAS The premier cybersecurity event of the year returns to Mandalay Bay with a re‑engineered, six‑day program built to ignite innovation, push boundaries, and bring the global security community together like never before. Use code: DARKREADING to save $200 on a Briefings pass or $100 on a Business pass. GET YOUR PASS
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◇ Industry News & Leadership
    Published
    May 14, 2026
    Archived
    May 14, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗