NCSC, SBU reveal overt Russian cyber campaign as cyber war continues to evolve
Sandworm-linked threat actors gained access to battlefield tablets


The UK’s National Cyber Security Centre (NCSC) and joint partners have issued a report into a new malware linked to the Sandworm group openly targeting Ukrainian military devices.
‘Infamous Chisel’ is an infostealer malware that was found targeting Android devices in use by Ukrainian military personnel on the front lines as a possible first step towards a wider-scale compromise of Ukrainian military networks.
Though the malware largely contains standard components implemented with intermediate sophistication, and was easily discovered via an investigation, researchers noted that Android has no automatic detection for attacks of this kind.
The authors also noted the overt nature of the campaign was matched by the serious danger associated with any exfiltration of sensitive Ukrainian military data.
According to the NCSC, Infamous Chisel made little attempt to obscure its activities from security services but had been specially crafted to establish persistence on victims’ devices.
The Security Service of Ukraine (SBU) discovered and eradicated the malware on Android tablets, and shared its findings with international partners.
“Since the first days of the full-scale war, we have been fending off cyber attacks of Russian intelligence services aiming to break our military command system and more,” said Illia Vitiuk, head of the SBU’s cyber security department.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
“The operation we have carried out now is the cyber defense of our forces.”
The SBU first published a report on Infamous Chisel on 8 August, in which it stated that it was confident the APT group Sandworm was behind the malware campaign.
RELATED RESOURCE
Choose the optimal cloud security platform and discover what the right solution should enable you to do.
DOWNLOAD FOR FREE
In the weeks after, the NCSC worked on analyzing the threat with international partners including the US Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA), New Zealand’s National Cyber Security Centre (NCSC-NZ), and the Canadian Centre for Cyber Security.
Paul Chichester, director of operations at the NCSC, noted that the campaign represents a new evolution in Russia’s ongoing cyber campaigns against Ukraine and its allies.
“The exposure of this malicious campaign against Ukrainian military targets illustrates how Russia’s illegal war in Ukraine continues to play out in cyberspace,” he said.
“Our new report shares expert analysis of how this new malware operates and is the latest example of our work with allies in support of Ukraine’s staunch defense. The UK is committed to calling out Russian cyber aggression and we will continue to do so.”
The NCSC has linked Sandworm to Russia’s Main Intelligence Directorate (GRU), specifically its Unit 74455 which is otherwise known as the Main Centre for Special Technologies GTsST.
Previously tracked by Microsoft as IRIDIUM, and now known under the name Seashell Blizzard, Sandworm is the main suspect behind the NotPetya attacks that in 2017 encrypted Ukrainian financial, energy, and government systems.
The NCSC has also credited Sandworm with a 2018 attempt to breach UK Defence and Science Technology Laboratory (DSTL) systems, as well as widespread description of Georgian government websites.
In November 2022 the UK government specifically named Sandworm’s ‘Industroyer2’ malware as a strain of concern, and pledged to provide Ukraine with £6.35 million ($8 million) for cyber defense which has since been increased to up to £25 million ($32 million).
The Industroyer family targets industrial control systems (ICS) and is part of a wave of new threats against critical national infrastructure (CNI).
How does Infamous Chisel operate?
Infamous Chisel is made up of several main components named ‘netd’, ‘killer’, ‘blob’, and ‘td’ which all perform different functions.
‘Netd’ replaces the default binary of the same name within Android’s system directory, which allows it to achieve persistence. Its main function is to exfiltrate data, which it performs approximately once per day. It collects a wide range of file types, including .dat, .bat, .txt, and .xml.
The component collects device information as well as any network and application data specific to the Ukraine military. It scans all networks available via the Transmission Control Protocol (TCP) ports approximately every two days, and collects network information as .tmp and .csv text files for exfiltration.
The SBU described some of its behavior as consistent with Russian intelligence activities, and the NCSC noted that network scanning of this kind suggests an intent for lateral attacks down the line.
RELATED RESOURCE
Learn about the benefits AI brings to cyber security landscape.
Once collected, the malware uses the ‘blob’ and ‘td’ components to establish a connection with a hard-coded local IP via the open-source anonymous browser The Onion Router (Tor). The software package ‘dropbear’ maintains the threat actor’s remote access to the infected device via port 34371.
‘Killer’ is simply used to end ‘netd’ by remote threat actor command.
The SBU additionally identified a component named ‘stl’, through which the malware collects data on the device’s connection to the Starlink satellite constellation, as well as two components used to download additional Trojans.
Ukrainian forces have made extensive use of SpaceX’s Starlink since Russia’s invasion, to stay connected in areas with poor traditional connectivity. Its fleet of low-earth orbit (LEO) satellites has been a reliable platform for crucial networks, amid Russian missile and cyber attacks on other communications networks.
Initially provided to Ukraine for free, the New York Times has since reported that SpaceX has requested funds from the Department of Defense (DoD) to subsidize its operating costs and that Elon Musk has personally intervened to ‘geofence’ Starlink access within Ukraine.
It’s possible that this has curtailed Ukrainian troops from accessing the internet via Starlink in regions under Russian occupation.

Rory Bathgate is Features and Multimedia Editor at ITPro, overseeing all in-depth content and case studies. He can also be found co-hosting the ITPro Podcast with Jane McCallion, swapping a keyboard for a microphone to discuss the latest learnings with thought leaders from across the tech sector.
In his free time, Rory enjoys photography, video editing, and good science fiction. After graduating from the University of Kent with a BA in English and American Literature, Rory undertook an MA in Eighteenth-Century Studies at King’s College London. He joined ITPro in 2022 as a graduate, following four years in student journalism. You can contact Rory at rory.bathgate@futurenet.com or on LinkedIn.
-
RSAC Conference 2025: The front line of cyber innovation
ITPro Podcast Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event
-
Anthropic CEO Dario Amodei thinks we're burying our heads in the sand on AI job losses
News With AI set to hit entry-level jobs especially, some industry execs say clear warning signs are being ignored
-
‘States don’t do hacking for fun’: NCSC expert urges businesses to follow geopolitics as defensive strategy
News Paul Chichester, director of operations at the UK’s National Cyber Security Centre, urged businesses to keep closer tabs on geopolitical events to gauge potential cyber threats.
-
Cyber attacks have rocked UK retailers – here's how you can stay safe
News Following recent attacks on retailers, the NCSC urges other firms to make sure they don't fall victim too
-
Five Eyes cyber agencies issue guidance on edge device vulnerabilities
News Cybersecurity agencies including the NCSC and CISA have issued fresh guidance on edge device security.
-
"Thinly spread": Questions raised over UK government’s latest cyber funding scheme
The funding will go towards bolstering cyber skills, though some industry experts have questioned the size of the price tag
-
State-sponsored cyber crime is officially out of control
News North Korea is the most prolific attacker, but Russia and China account for the most disruptive and tightly-targeted campaigns
-
Modern enterprise cybersecurity
whitepaper Cultivating resilience with reduced detection and response times
-
IDC InfoBrief: How CIOs can achieve the promised benefits of sustainability
whitepaper CIOs are facing two conflicting strategic imperatives
-
The NCSC and FBI just issued a major alert over a state-backed hacker group – here’s what you need to know
News State-affiliated attackers are targeting individuals via spear-phishing techniques, according to the NCSC