Google Threat Intelligence Group (GTIG) has attributed a set of phishing-led intrusions against Ukrainian organizations to a previously undocumented threat actor delivering malware it calls **CANFAIL**.

## What happened

- GTIG assesses the actor may be affiliated with Russian intelligence services.

- Targeting focuses on Ukrainian **defense, military, government, and energy** organizations, with additional interest in aerospace, manufacturing tied to military/drone work, nuclear/chemical research, and international/humanitarian entities involved in Ukraine.

## How the attack works (high level)

According to GTIG, recent campaigns:

1. Impersonate legitimate regional/national energy organizations (and even a Romanian energy company with Ukrainian customers) to gain access to organizational and personal email accounts.

2. Use **Google Drive links** leading to a **RAR archive**.

3. The archive contains an obfuscated JavaScript payload disguised with a **double extension** (e.g., `*.pdf.js`) to appear document-like.

4. The JavaScript executes PowerShell that ultimately downloads and runs a **memory-only PowerShell dropper**, while showing a fake error message to reduce suspicion.

## LLMs in the loop

GTIG notes this actor has started using **LLMs** to overcome technical limitations—helping with:

- Reconnaissance and target research

- Creating social-engineering lures

- Answering basic technical questions for post-compromise activity and C2 setup

## Why it matters

This report reinforces a recurring theme in modern intrusions: **low-to-mid sophistication operators can scale quickly** by combining commodity delivery chains (Drive → archive → script → PowerShell) with LLM-assisted social engineering.

## Defensive takeaways

- Block/alert on script execution from user-writable locations, and treat **double extensions** as suspicious.

- Monitor for unusual Google Drive download patterns and RAR extraction followed by PowerShell.

- Harden email security and train users specifically on **impersonation lures** in critical-sector contexts.

Source: Google Threat Intelligence Group (via The Hacker News).