APromptRiskDBThreat intelligence atlas
AI Case Study

LAMEHUG: Malware Leveraging Dynamic AI-Generated Commands - AI Case Study

In July 2025, Ukrainian authorities reported the emergence of LAMEHUG, a new AI-powered malware attributed to the Russian state-backed threat actor APT28 (also tracked as Forest Blizzard or UAC-0001). LAMEHUG uses a large language model (LLM) to dynamically generate commands on the infected hosts. The campaign began with a phishing attack leveraging a compromised governmen...

IncidentUkraine’s security and defense sectorAPT28Defense EvasionInitial AccessLateral Movement

Overview

Case steps8Steps described in the case record.
Techniques8Attack methods mentioned in the case steps.
Linked CVEs0Known vulnerabilities mentioned in the record.

Risk patterns

Patterns found in the case record and its linked vulnerabilities.

  • 1Dominant ATLAS tactic. Defense Evasion appears in 2 case steps.
  • 2Multiple attack methods. The case connects to 8 unique AI attack methods.

Procedure timeline

Search the case steps or filter them by attacker goal.

Defense Evasion2Initial Access1Lateral Movement1Execution1AI Attack Staging1Collection1Exfiltration1
  1. Step 2

    Phishing

    Lateral Movement

    APT28 sent a phishing email from the compromised account with an attachment containing malware.

  2. Defense Evasion

    The attachment was called “Appendix.pdf.zip” which could confuse the recipient into thinking it was a legitimate PDF file.

  3. Execution

    The attachment contained an executable file with a .pif extension, created using PyInstaller from Python source code which CERT-UA classified it as LAMEHUG malware. Files with the .pif extension are executable on Windows.

  4. Collection

    The LAMEHUG malware used the AI generated commands to collect system information (saved to %PROGRAMDATA%\info\info.txt) and recursively searched Documents, Desktop, and Downloads to stage files for exfiltration.

Mitigations

Defenses connected to the attack methods in this case.

Sources

Original public records and references for this case.

Original source

Original source links

Open the MITRE ATLAS data and public references used for this case study.