Russia-Linked Group Gamaredon Targets Ukraine with USB-Propagated Malware

Ukraine has been the target of persistent cyberattacks for years. It has faced a range of threat actors, including state-sponsored groups and financially motivated criminals. One of the most active and determined of these groups is Gamaredon. The group’s main focus is espionage, primarily related to Ukraine and its ongoing conflict with Russia. Recent reports have highlighted that Gamaredon has adopted a new tactic to spread its malware via USB drives.

Gamaredon’s Activities in Ukraine

Gamaredon has been active since at least mid-2013, and has focused on targeting individuals and entities in Ukraine. The group is also tracked under different names such as Armageddon, Primitive Bear, Shuckworm, and Trident Ursa. Most of these names are linked to Russia’s Federal Security Service (FSB), indicating that Gamaredon is likely operating on behalf of the FSB.

Attempts to steal sensitive information and gain long-term access have been ongoing

Gamaredon has demonstrated an impressive ability to infiltrate the networks of its targets and maintain long-term access. According to Symantec, the hacking group has obtained long-term access to victim networks, sometimes for as long as three months. During this time, Gamaredon repeatedly attempts to steal sensitive information related to the war between Ukraine and Russia, such as military secrets or diplomatic data.

New tactics are being used by Gamaredon

To remain effective and evade detection, Gamaredon has had to constantly adapt. On the technical side, the group has been using updated tools, fresh infrastructure, and new tactics. For example, in recent attacks, a new PowerShell script was used to spread the group’s custom backdoor, named Pterodo, via USB drives. These USB drives are likely used by the attackers for lateral movement across victim networks and to help them reach air-gapped machines within targeted organizations.

The use of USB drives for lateral movement

Symantec has identified multiple systems that appear to have been compromised after being infected through USB drives. This tactic is not new, but it indicates that Gamaredon is willing to use established methods to achieve its objectives. The USB drives are likely carrying a Trojan program that will execute as soon as they physically connect to the target machine.

Identifying compromised systems and the use of legitimate services

As well as identifying systems that have been compromised, Symantec has also spotted Gamaredon’s use of legitimate services, such as Telegram, for command-and-control (C&C) infrastructure. This technique allows the hackers to blend in with normal traffic and makes it harder for defenders to spot and block any suspicious activity.

The recent Gamaredon campaign

According to Symantec, the most recent Gamaredon campaign started in February-March 2021. The campaign focuses on systems containing sensitive military information. Indications in some organizations suggest that the attackers are targeting the machines of the organizations’ human resources departments, indicating that information about individuals working at the various organizations is a priority for the attackers, among other things.

Targeting individuals and human resources departments

One of the worrying aspects of the latest Gamaredon campaign is that it appears to be targeting individuals as well as organizations. Human resources departments may have been targeted to allow the hackers to access details about the employees of the organizations. This information could then be used to launch further attacks on selected individuals within the target organization.

Gamaredon has been a persistent threat to Ukraine for several years, and the group continues to evolve its tactics. Its recent use of USB-propagated malware is a reminder that established threat actors may still choose to rely on relatively old techniques if they are still effective. The group’s ability to maintain long-term persistent access to compromised networks and adopt new tactics means that it remains a serious threat to Ukraine and other neighboring countries. Defenders need to remain vigilant and continually assess their security arrangements to ensure they have a chance to detect and block Gamaredon’s activities.

Explore more

Why Are Companies Suddenly Hiring Again in 2026?

The sudden ping of a LinkedIn notification or a direct recruiter email has recently transformed from a rare digital relic into a daily occurrence for many professionals. After a prolonged period characterized by “ghost” job postings and a deafening silence from human resources departments, the professional landscape has reached a startling tipping point. In a single month, U.S. job openings

HR Leadership Is Crucial for Successful AI Transformation

The rapid integration of artificial intelligence into the modern corporate landscape is no longer a futuristic prediction but a present-day reality, fundamentally reshaping how organizations operate, hire, and plan for the future. In today’s market, 95% of C-suite executives identify AI as the most significant catalyst for transformation they will witness in their entire professional lives. This shift represents a

Does Your Response Speed Signal Your Professional Status?

When an incoming notification pings on a high-resolution smartphone screen, the decision to let it sit for hours rather than seconds is rarely a matter of simple forgetfulness. In the contemporary corporate landscape, an employee who responds to every message within the blink of an eye is often lauded as a dedicated team player, yet in many elite professional circles,

How AI-Native Architecture Will Power 6G Wireless Networks

The fundamental transformation of global telecommunications is no longer defined by incremental increases in bandwidth but by the total integration of cognitive computing into the very fabric of signal transmission. As of 2026, the industry is witnessing the sunset of the era where Artificial Intelligence functioned merely as an external troubleshooting tool for cellular towers. Instead, the groundwork for 6G

The Global Race Toward 6G Engineering and Commercial Reality

The relentless momentum of global telecommunications has reached a pivotal juncture where the transition from laboratory theory to tangible engineering hardware defines the current technological landscape. If every decade of telecommunications has a “north star,” the year 2030 is currently pulling the entire global engineering community toward its orbit with an irresistible force. We are currently navigating a critical three-year