Gamaredon Strikes Again: Cyber Shenanigans Target Foreign Military in Ukraine!
Gamaredon targeted a foreign military mission in Ukraine with updated GammaSteel malware, employing sneaky tactics like infected drives and multi-stage obfuscation. Despite being less skilled, this Russian-linked group compensates with relentless focus, showcasing their determination to be a thorn in Ukraine’s side.

Hot Take:
Looks like Gamaredon’s been busy playing catch-the-flag with foreign military missions in Ukraine. But hey, who doesn’t love a good game of cyber espionage with a side of malware updates? Get your popcorn ready, because this is one infostealer saga you don’t want to miss!
Key Points:
- Gamaredon targeted a foreign military mission in Ukraine with updated GammaSteel malware in February 2025.
- This Russian-linked APT group has been pestering Ukrainian entities since 2013.
- Infected removable drives were used as the initial infection vector.
- The attack involved multi-stage, obfuscated assaults leveraging PowerShell and registry scripts.
- Despite lacking skill, Gamaredon compensates with persistence and minor code tweaks.
Already a member? Log in here