Back to News
Cybersecurity

New DRILLAPP Backdoor Exploits Microsoft Edge to Conduct Espionage Against Ukraine

A new cyber espionage campaign targeting Ukrainian entities has been identified, leveraging Microsoft Edge debugging functionalities.

Recent intelligence from S2 Grupo's LAB52 has revealed a sophisticated cyber espionage campaign targeting Ukrainian organizations, attributed to Russian-linked threat actors. This campaign, identified as using a backdoor named DRILLAPP, was first observed in February 2026 and exhibits similarities to previous operations conducted by the group known as Laundry Bear. The exploitation of Microsoft Edge's debugging features indicates a notable advancement in the tactics employed by these threat actors, allowing for stealthier operational capabilities.

For businesses, particularly those within the cybersecurity and defense sectors, these findings underscore the critical need for enhanced monitoring and protective measures against advanced persistent threats (APTs). The utilization of well-known software functions for malicious purposes highlights vulnerabilities that may exist within widely-used applications. As the cyber landscape continues to evolve, organizations must prioritize the implementation of robust security protocols and staff training to recognize and mitigate such sophisticated threats. This incident is a stark reminder of the persistent risk posed by state-sponsored cyber activities, emphasizing the importance of vigilance and resilience in cybersecurity strategies.

---

*Originally reported by [The Hacker News](https://thehackernews.com/2026/03/drillapp-backdoor-targets-ukraine.html)*