CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign,
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a phishing campaign that’s designed to deliver a malware codenamed LAMEHUG.
« An obvious feature of LAMEHUG is the use of LLM (large language model), used to generate commands based on their textual representation (description), » CERT-UA said in a Thursday advisory.
The activity has been attributed with medium
« An obvious feature of LAMEHUG is the use of LLM (large language model), used to generate commands based on their textual representation (description), » CERT-UA said in a Thursday advisory.
The activity has been attributed with medium
,
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a phishing campaign that’s designed to deliver a malware codenamed LAMEHUG.
« An obvious feature of LAMEHUG is the use of LLM (large language model), used to generate commands based on their textual representation (description), » CERT-UA said in a Thursday advisory.
The activity has been attributed with medium
« An obvious feature of LAMEHUG is the use of LLM (large language model), used to generate commands based on their textual representation (description), » CERT-UA said in a Thursday advisory.
The activity has been attributed with medium
, ,
https://thehackernews.com/2025/07/cert-ua-discovers-lamehug-malware.html