Skip to content

Top Stories

Top Stories

Primary Menu
  • Breaking News
  • UNIT CONVERTER
  • QR Code Generator
  • SEO META TAG GENERATOR
  • Background Remover Tool
  • Image Enhancer Tool
  • Image Converter Tool
  • Image Compressor Tool
  • Keyword Research Tool
  • Paint Tool
  • About Us
  • Contact Us
  • Privacy Policy
HOME PAGE
  • Home
  • Uncategorized
  • New LAMEHUG AI Malware Devises Commands In Real-Time
  • Uncategorized

New LAMEHUG AI Malware Devises Commands In Real-Time

VedVision HeadLines July 26, 2025
New LAMEHUG AI Malware Devises Commands In Real-Time


1

As AI creates a stir in the tech world, it has now grabbed the attention of threat actors for automating attack strategies. According to a recent CERT Ukraine advisory, a new malware, identified as “LAMEHUG,” has surfaced online that is entirely based on artificial intelligence (AI).

LAMEHUG AI Malware Hints At Emerging Cyberthreats

In a recent advisory from the Computer Emergency Response Team of Ukraine (CERT-UA), their researchers have found a new AI-powered malware in the wild.

This AI malware, dubbed “LAMEHUG,” uses artificial intelligence to devise malicious commands in real-time. This adaptability and automation seemingly empower the threat actors to conduct more potent attacks on their target systems with precision.

As explained, the researchers found this malware following a report of the malware’s distribution among “executive authorities”. Specifically, the target officials received a malicious .zip file, allegedly from a legit yet compromised email account. According to CERT-UA advisory [translated],

CERT-UA received information about the distribution among executive authorities, allegedly on behalf of a representative of the relevant ministry, of emails with an attachment in the form of the file “Appendix.pdf.zip”.

Analyzing the archive made the researchers find the executable file with a .pif extension. CERT-UA named this malicious Python executable as “LAMEHUG”.

Inspecting this executable revealed further details about the new malware, the most interesting thing being its reliance on artificial intelligence. Written in Python, this malware uses Hugging Face AI API to generate commands based on the text description.

It uses LLM Qwen 2.5-Coder-32B-Instruct via the huggingface[.]co service API to generate commands based on statically entered text (description) for their subsequent execution on a computer.

After successfully infiltrating the target device, the malware performs various malicious functions, particularly gathering system information, system identifiers, and network details. Moreover, it also accesses and exfiltrates stored documents after scanning the system for Microsoft Office documents and PDF files.

Malware Potentially Links Back To Russian APT28

While the exact identity of the threat actors behind this malware remains unclear, CERT-UA could trace back its link to Russian state actors APT28. As mentioned in an update,

CERT-UA assesses with moderate confidence that this activity is linked to the UAC-0001 (APT28) hacking group, which is controlled by Russian special services.

APT28, also known as Sofacy, Fancy Bear, Strontium, and Pawn Storm, is a long known Russian state actor group that has conducted several cyber-espionage attacks globally. Formed in early 2000s, the threat actors have been involved in key cyberattacks against government entities across Europe, such as Germany, the Netherlands, and Ukraine, and the United States.

Over time, the group has employed various strategies to infiltrate target networks. And now, the discovery of LAMEHUG malware indicates just another strategy from the threat actors to evolve into a more evasive group.

According to IBM X-Force, this capability empowers threat actors to “adapt their tactics” in real-time without requiring additional payloads. Moreover, with an AI-powered malware that connects to a C&C from an external infrastructure such as Hugging Face, the threat actors potentially improvise their attack capabilities, ensuring more evasive operations for longer durations.

Let us know your thoughts in the comments.



Source link

Continue Reading

Previous: Roman Storm’s Team Expected to Close Case Next Week, Developer May Still Testify
Next: Prince William given fitting sendoff at Buckingham Palace as he prepares to leave the UK

Related News

Pakistan’s Youth Leading Charge on Bitcoin Adoption
  • Uncategorized

Pakistan’s Youth Leading Charge on Bitcoin Adoption

VedVision HeadLines July 26, 2025
Client Challenge
  • Uncategorized

Client Challenge

VedVision HeadLines July 26, 2025
  • Uncategorized

New sub-$0.002 token aims to rival Dogecoin at $1

VedVision HeadLines July 26, 2025

Recent Posts

  • Pakistan’s Youth Leading Charge on Bitcoin Adoption
  • Prince William sends ‘proud’ message to ‘stunning’ Lionesses ahead of Spain clash
  • Bitcoin Price Reclaims $118K Liquidity as BTC Traders Hope For New Highs Next
  • Client Challenge
  • Tamil Nadu’s Development is Our Main Focus: Modi – News Today

Recent Comments

No comments to show.

Archives

  • July 2025
  • June 2025
  • May 2025
  • April 2025

Categories

  • Current Affairs
  • Shopping
  • Uncategorized

You may have missed

Pakistan’s Youth Leading Charge on Bitcoin Adoption
  • Uncategorized

Pakistan’s Youth Leading Charge on Bitcoin Adoption

VedVision HeadLines July 26, 2025
Prince William sends ‘proud’ message to ‘stunning’ Lionesses ahead of Spain clash
  • Current Affairs

Prince William sends ‘proud’ message to ‘stunning’ Lionesses ahead of Spain clash

VedVision HeadLines July 26, 2025
Bitcoin Price Reclaims 8K Liquidity as BTC Traders Hope For New Highs Next
  • Current Affairs

Bitcoin Price Reclaims $118K Liquidity as BTC Traders Hope For New Highs Next

VedVision HeadLines July 26, 2025
Client Challenge
  • Uncategorized

Client Challenge

VedVision HeadLines July 26, 2025
Copyright © All rights reserved. | MoreNews by AF themes.