LameHug malware uses large language model commands in Ukraine attacks

The LameHug malware leverages an artificial intelligence-powered large language model to generate dynamic attack commands, marking a new tactic seen in recent cyber-attacks on Ukraine´s security sector.

A newly identified strain of malware, dubbed ´LameHug´, utilizes a large language model powered by artificial intelligence to generate operating system commands dynamically on infected Windows machines. This novel approach was first detected by the National Computer Emergency Response Team of Ukraine (CERT-UA) in cyber-attacks targeting the country´s security and defense sector. The attacks were traced to the advanced persistent threat group APT28, a collective widely attributed to Russia´s military intelligence service, the GRU.

According to CERT-UA, the threat actors distributed malicious emails containing a ZIP file attachment named ´Додаток.pdf.zip´, which appeared to have been sent by a government official. Once extracted, the archive contained a file with a .pif extension, wrapped using PyInstaller for deployment. The LameHug malware itself is written in Python and connects to the Hugging Face API to access Alibaba´s open-source Qwen2.5-Coder-32B-Instruct large language model. This enables it to craft and execute commands in real time, allowing the attackers to adapt their tactics during a live compromise without having to distribute new payloads.

Security researchers at IBM X-Force noted that the use of large language models to generate operational commands is unique among malware, increasing its potential to bypass detection by static analysis tools and traditional security software. The campaign highlights an escalation in sophistication among threat actors targeting Ukrainian organizations. APT28, also known by aliases such as Fancy Bear and Sofacy Group, has a history of targeting Ukraine with various cyber-operations, including previous attacks on critical infrastructure and related entities. The emergence of the LameHug malware underscores ongoing risks to national security and demonstrates how actors are incorporating artificial intelligence into offensive cyber tools.

83

Impact Score

Why multimodal content pipelines are reshaping media production

Multimodal content creation pipelines are consolidating text, image, and audio workflows into integrated systems that compress production timelines and expand monetization options, while raising fresh legal and ethical challenges. The article examines the tools, economics, and skills driving this shift for tens of millions of creators.

Semiconductor coverage tracks geopolitics, telecom chips and Artificial Intelligence demand

Light Reading’s semiconductor section brings together coverage of geopolitical risks in chip supply, telecom silicon shakeups and surging Artificial Intelligence infrastructure demand, with a strong focus on how these forces reshape vendors such as Intel, Nvidia, Qualcomm, Samsung and Nokia. The stream highlights how shifts in rare earths policy, network silicon strategy and massive memory orders are redefining the broader communications and computing ecosystem.

Contact Us

Got questions? Use the form to contact us.

Contact Form

Clicking next sends a verification code to your email. After verifying, you can enter your message.