Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

Ravie LakshmananFeb 13, 2026Threat Intelligence / Malware

A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL.

Google Threat Intelligence Group (GTIG) described the hacking group as possibly affiliated with Russian intelligence services. The threat actor is assessed to have targeted defense, military, government, and energy organizations within the Ukrainian regional and national governments.

However, the group has also exhibited growing interest in aerospace organizations, manufacturing companies with military and drone ties, nuclear and chemical research organizations, and international organizations involved in conflict monitoring and humanitarian aid in Ukraine, GTIG added.

“Despite being less sophisticated and resourced than other Russian threat groups, this actor recently began to overcome some technical limitations using LLMs [large language models],” GTIG said.

“Through prompting, they conduct reconnaissance, create lures for social engineering, and seek answers to basic technical questions for post-compromise activity and C2 infrastructure setup.”

Recent phishing campaigns have involved the threat actor impersonating legitimate national and local Ukrainian energy organizations to obtain unauthorized access to organizational and personal email accounts.

The group is also said to have masqueraded as a Romanian energy company that works with customers in Ukraine, in addition to targeting a Romanian firm and conducting reconnaissance on Moldovan organizations.

To enable its operations, the threat actor generates email address lists tailored to specific regions and industries based on their research. The attack chains seemingly contain LLM-generated lures and embed Google Drive links pointing to a RAR archive containing CANFAIL malware.

Typically disguised with a double extension to pass off as a PDF document (*.pdf.js), CANFAIL is an obfuscated JavaScript malware that’s designed to execute a PowerShell script that, in turn, downloads and executes a memory-only PowerShell dropper. In parallel, it displays a fake “error” message to the victim.

Google said the threat actor is also linked to a campaign called PhantomCaptcha that was disclosed by SentinelOne SentinelLABS in October 2025 as targeting organizations associated with Ukraine’s war relief efforts through phishing emails that direct recipients to fake pages hosting ClickFix-style instructions to activate the infection sequence and deliver a WebSocket-based trojan.

Similar Posts

  • New and Updated Tutorials for Drupal 11

    TL;DR; We’ve added a new tutorial, Upgrade to Drupal 11. And, we’ve updated all tutorials and code in our Drupal Module Developer Guide for compatibility with Drupal 11. Upgrade to Drupal 11 is new free tutorial in the course, Upgrade Drupal, and part of our Keep Drupal Up-To-Date guide. If your site is on Drupal…

  • Release Day: Single Directory Components in Drupal

    We’ve heard from many of you that you want to learn more about Single Directory Components (SDCs) in Drupal. Which makes sense, since they are one of the most exciting new features in Drupal theming since Twig was added to Drupal 8. We’re excited to share that the first phase of our brand-new SDC course…

  • 7 Best PHP Hosting Server Providers in 2025,Jul

    Are you looking for an efficient and versatile website hosting solution?  Why not try hosting based on the PHP scripting language? Choosing a hosting is a daunting task especially when you have so many options!  The hosting solution that you choose must have certain technical capabilities and functionality so that your project can develop and…

  • The 8 Best AI Detectors, Tested and Compared

    We recently launched our new AI detector. For almost any webpage, you can analyze the likelihood that AI was used to create it, highlight AI-generated sections of text, and even identify the specific AI models used to create the text. There are tons of AI detectors available. And, while ours is the only one that can…