Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Russian-Linked CANFAIL Malware Targets Ukrainian Defense
Russian-Linked CANFAIL Malware Targets Ukrainian Defense
NEWS

Russian-Linked CANFAIL Malware Targets Ukrainian Defense

Google Threat Intelligence Group attributes a previously undocumented JavaScript malware called CANFAIL to a Russian-linked threat actor targeting...

Dylan H.

News Desk

February 13, 2026
3 min read

New Russian Malware Campaign Targeting Ukraine

Google Threat Intelligence Group (GTIG) has attributed a previously undocumented malware campaign to a Russian-linked threat actor targeting Ukrainian defense, military, government, energy, and aerospace organizations. The malware, dubbed CANFAIL, uses obfuscated JavaScript payloads disguised as PDF documents to establish persistent access and exfiltrate sensitive data.


Campaign Overview

AttributeDetails
Threat ActorPreviously undocumented Russian-linked group
MalwareCANFAIL (obfuscated JavaScript)
AttributionGoogle Threat Intelligence Group (GTIG)
TargetsUkrainian defense, military, government, energy, aerospace
DeliveryPhishing emails with Google Drive links to RAR archives
Lure GenerationLLM-generated content in Ukrainian
ObjectiveEspionage, persistent access, data exfiltration

Attack Chain

[Phishing Email with LLM-Generated Ukrainian Lure]
        |
        v
[Google Drive Link]
        |
        v
[RAR Archive Download]
        |
        v
[*.pdf.js — CANFAIL JavaScript (double extension)]
        |
        v
[Windows Script Host Execution]
        |
        v
[PowerShell Cradle — Memory-Only Payload]
        |
        v
[C2 Beacon + Data Exfiltration]

Technical Details

Double-Extension File Trick

CANFAIL files use double extensions to disguise JavaScript as PDFs:

military_procurement_notice_2026.pdf.js
defense_budget_allocation_feb2026.pdf.js
personnel_transfer_orders_UA.pdf.js

With default Windows settings hiding known file extensions, victims see only the .pdf portion.

LLM-Enhanced Lures

The use of LLM-generated content marks a notable shift. Previous campaigns often contained grammatical errors. These lures are:

  • Grammatically correct in Ukrainian
  • Contextually accurate to the target organization
  • Formatted to match legitimate government document styles
  • Personalized with target-specific references

Memory-Only Payload Delivery

CANFAIL triggers PowerShell scripts that download and execute payloads entirely in memory using Invoke-Expression with base64-encoded commands, leaving no artifacts on disk.

Capabilities

  • System reconnaissance — Enumerate software, processes, network config, AD membership
  • Credential harvesting — Extract stored credentials from browsers and Windows credential manager
  • File exfiltration — Search for documents matching military and defense keywords
  • Keylogging — Capture keystrokes targeting email, messaging, and VPN applications
  • Persistence — Scheduled tasks and registry run keys

Detection Recommendations

  1. Block double-extension files — Quarantine files with extensions like .pdf.js, .doc.js
  2. Monitor Windows Script Host — Alert on wscript.exe executing files from download directories
  3. Restrict PowerShell — Enable Constrained Language Mode and Script Block Logging
  4. Inspect Google Drive links — Deploy CASBs to inspect files downloaded from Google Drive
  5. Hunt for scheduled task persistence — Review recently created scheduled tasks

Sources

  • The Hacker News — Google Ties Russian Actor to CANFAIL Malware
  • Security Affairs — Russian Hackers Deploy CANFAIL Against Ukraine

Related Reading

  • Google Disrupts Massive Chinese Espionage Campaign
  • All Four Major Nation-State Adversaries Now Weaponizing
  • APT28 Weaponizes Microsoft Office Zero-Day in 3 Days
#APT#Russia#Ukraine#Malware#CANFAIL#Google TAG#Espionage

Related Articles

Google Disrupts Massive Chinese Espionage Campaign

Google's Threat Intelligence Group dismantles UNC2814, a China-linked operation that deployed a novel backdoor called GRIDTIDE abusing Google Sheets API...

3 min read

APT28 Weaponizes Microsoft Office Zero-Day in 3 Days

Russia-linked APT28 (Fancy Bear) weaponized Microsoft Office CVE-2026-21509 within days of disclosure, deploying espionage implants against Ukrainian...

3 min read

All Four Major Nation-State Adversaries Now Weaponizing

Google reports that APT groups from China, Russia, Iran, and North Korea are all actively using Gemini AI for cyber operations including target...

3 min read
Back to all News