Home OSINT News Signals
CYBER

DRILLAPP Backdoor Targets Ukraine, Abuses Microsoft Edge Debugging for Stealth Espionage

🕓 1 min read

EXCLUSIVE: RUSSIAN-BACKED HACKERS DEPLOY ZERO-DAY BROWSER EXPLOIT IN SHOCKING NEW ESPIONAGE CAMPAIGN AGAINST UKRAINE

A chilling new cybersecurity threat has emerged from the digital shadows, directly targeting Ukrainian entities with a stealthy malware backdoor that turns the Microsoft Edge browser into a powerful spy tool. This is not a drill. Dubbed DRILLAPP, this JavaScript-based weapon represents a dangerous evolution in cyber-espionage, leveraging the very features of a trusted web browser to enable full-scale surveillance.

The campaign, first observed in February 2026 and linked to the notorious Russian threat group Laundry Bear, uses cunning phishing lures disguised as judicial documents or charity appeals for Ukraine's "Come Back Alive Foundation." Once clicked, a malicious file deploys the backdoor, which executes silently within Edge in headless mode. The attack chain exploits a critical vulnerability in browser security protocols, granting the malware unrestricted access to the victim's microphone, webcam, screen, and entire local file system without a single prompt.

"This is a masterclass in software abuse," revealed a senior threat intelligence analyst, speaking on condition of anonymity. "The attackers have weaponized standard browser debugging features, turning them into a zero-day exploit for real-time espionage. They've bypassed every sandbox and security setting, creating a perfect storm for a catastrophic data breach."

Every individual and organization is a target in this new era of hybrid warfare. This campaign proves that no software is inherently safe, and a routine click can lead to total compromise. The use of legitimate services like Pastefy for command-and-control and the focus on crypto-related lures for blockchain security researchers shows these actors are refining their tactics for maximum impact and financial gain.

We predict this browser-based attack vector will be copied by ransomware gangs worldwide within months, leading to a new wave of extortion attacks combining data theft with live audio-video blackmail.

Your browser is now a weapon. And it's pointed right at you.

Telegram X LinkedIn
Back to News