A new Ghostwriter malware campaign is actively targeting Ukrainian government and military institutions, along with Belarusian opposition activists, in a renewed wave of cyber espionage.
The campaign uses weaponized Excel documents embedded with obfuscated macros. As revealed by cybersecurity firm SentinelOne, these documents act as entry points for delivering stealthy payloads, including a new version of PicassoLoader.
Ghostwriter, also known by aliases like Moonscape, TA445, UAC-0057, and UNC1151, has been active since 2016 and has consistently aligned itself with Russian state interests, spreading disinformation and launching targeted cyber operations across Europe.
Ghostwriter Malware Campaign Origins and Targets
Prepping Since Mid-2024, Going Live by Year’s End
The current activity has begun as early as July 2024, with full activation observed in November and December. It primarily targets:
- Ukrainian military and government offices
- Political opposition activists in Belarus
- Entities and individuals viewed as opponents of pro-Russian narratives
According to researcher Tom Hegel at SentinelOne, recent activity involving malware samples and command-and-control (C2) infrastructure suggests that the campaign will remain active in early 2025.
Also Read: E.U. Sanctions Russian Hackers for Cyber Attacks on Estonia’s Government
Infection Chain: From Shared Docs to Stealthy Loaders
The Entry Point: Google Drive and a Familiar Name
The Ghostwriter malware campaign begins with a RAR archive hosted on Google Drive, shared by a user posing as Vladimir Nikiforech. The archive contains a malicious Microsoft Excel file.
Once opened, users are prompted to enable macros — a long-standing method used to trick unsuspecting victims. When enabled, the macro:
- Writes a DLL file to the victim’s system
- Executes the DLL to deploy a streamlined version of PicassoLoader
- Displays a decoy Excel document to avoid suspicion
- Proceeds to download additional malware payloads
This approach has been consistent throughout 2024, with some payloads being used to deliver Cobalt Strike, a popular post-exploitation framework among state-sponsored hackers and cybercriminals.
Technical Details: Macropack and PicassoLoader in Action
Macros Obfuscated with Macropack
The Ghostwriter malware campaign continues using Macropack, a tool that obscures Visual Basic for Applications (VBA) macros in Excel files, making static analysis and detection more difficult.
Once triggered, the macro leverages embedded logic to drop or inject additional malware components. In this campaign:
- The main Excel file drops PicassoLoader
- PicassoLoader handles staging, downloading, and executing second-stage payloads
Example: LibCMD DLL Deployment
In one variant, a specially crafted Excel macro is used to deploy a DLL called LibCMD. This file:
- Executes cmd.exe, Windows’ native command-line tool
- Connects to stdin/stdout streams to establish control
- Loads in-memory as a .NET assembly, avoiding disk artefacts
Steganography and Covert C2
Using JPG Files to Hide Malware
One of the more novel aspects of the Ghostwriter malware campaign is the use of steganography — the practice of hiding data within image files.
SentinelOne observed an Excel lure designed to fetch a seemingly harmless JPG file from the domain sciencealert[.]shop.
Although the domain has since gone offline, this behaviour highlights Ghostwriter’s use of creative obfuscation tactics to deliver malware payloads through nontraditional channels.
When decoded, these images revealed embedded malware that activated post-download, ensuring minimal visibility to endpoint security solutions.
Persistent Use of ConfuserEx Obfuscation
Making Analysis Difficult for Researchers
Most of the .NET downloaders used in the campaign are obfuscated using ConfuserEx. This popular open-source tool scrambles code to hinder reverse engineering.
By employing ConfuserEx, Ghostwriter increases:
- Resilience against antivirus detection
- Difficulty in unpacking malware logic
- The time needed for analysts to deconstruct behaviour
The combination of Macropack for VBA macros and ConfuserEx for .NET binaries demonstrates a clear strategy: layered obfuscation for maximum stealth.
Strategic Intent: Espionage Over Destruction
Not Military, But Politically Aligned
While Belarus is not actively involved in direct military combat in the Russia-Ukraine conflict, this campaign indicates the country’s cyber operators are firmly supporting Russia’s political and intelligence goals.
The Ghostwriter malware campaign`s targets and tactics show a clear preference for:
- Long-term access to sensitive systems
- Data theft and surveillance over destruction
- Influence operations, including spreading false narratives about NATO and Ukraine
Why Excel Macros Still Work in 2025
Despite repeated warnings from security firms and years of public advisories, macros in Microsoft Office files remain a common attack vector — mainly because:
- Many users still enable macros for compatibility reasons
- Macros are deeply embedded in enterprise workflows
- Legacy defences focus on known patterns, while obfuscation techniques keep evolving
This highlights the need for stronger email filtering, endpoint detection, and user training to combat socially engineered lures.
What to Do Now: Recommendations
Defending Against Macro-Based Malware
Organizations, especially those in Eastern Europe, should take proactive steps to prevent the Ghostwriter malware campaign`s based attacks:
- Disable macros by default across Microsoft Office tools
- Enable Microsoft Defender for Office to scan email attachments
- Use network-based anomaly detection to monitor unusual downloads
- Implement filetype restrictions for incoming email attachments (e.g., block RAR/Excel)
- Educate staff on the dangers of enabling macros from unknown sources
- Deploy sandbox environments to inspect suspicious documents safely
FAQs
Who is a Ghostwriter?
Ghostwriter is a Belarus-aligned cyber espionage group known for targeting Ukraine and promoting Russian political agendas through hacking and disinformation.
How does the malware infect victims?
Victims are lured via Excel files hosted on Google Drive. Once macros are enabled, the file drops a DLL to deliver further malware like PicassoLoader.
What is PicassoLoader?
PicassoLoader is a malware staging tool for downloading and executing additional payloads, such as Cobalt Strike, on compromised machines.
What is Macropack?
Macropack is a framework for obfuscating Excel VBA macros, making them difficult for security software to analyze and detect.
What role does steganography play in this attack?
The Ghostwriter hides malware inside image files (JPGs) using steganography. The images are downloaded during the attack and decoded to extract malware.
Is this campaign ongoing?
Yes. As of early 2025, infrastructure and sample activity suggest the campaign is still active and evolving.

65 Comments
Pingback: Ahold Delhaize Cyber Attack Exposes Stolen Company Data
gZALqatfexkrnnfDZUQ
Создание блога life-webmaster.ru и бизнеса в сети шаг за шагом: платформы, контент-план, трафик, монетизация без вложений. Готовые шаблоны и понятные инструкции для старта.
Your article helped me a lot, is there any more related content? Thanks! https://accounts.binance.info/en-IN/register-person?ref=A80YTPZ1
Your article helped me a lot, is there any more related content? Thanks! https://accounts.binance.com/zh-TC/register-person?ref=DCKLL1YD
tallbirchemporium – Items are displayed clearly, shopping feels smooth and natural.
golden access – Clear sections and responsive design made shopping effortless.
Bluestone Picks – Everything loaded fast and the layout is intuitive.
bright store link – Convenient navigation and simple menus helped me get around fast.
brookmoderngoods – Items are logically organized, interface feels calm and clean.
shop willow picks – Items were easy to view and layout was clear.
CozyWood Outlet – Easy to move around, with a layout that keeps everything simple.
New Grove Online – Clean design and intuitive navigation improved the browsing experience.
a href=”https://brightnorthboutique.shop/” />northstylehub – The site layout is neat, making browsing easy and enjoyable.
Can you be more specific about the content of your article? After reading it, I still have some doubts. Hope you can help me.
gqjOmTnJHFaqMxYZjilxr
Yo, check out PKRslot! Found some cool games there the other day. Pretty decent experience, gotta say. pkrslot
I spent some hours in 87club. It worked fine for me. Seems good to me! Jump into the game at 87club
Your article helped me a lot, is there any more related content? Thanks! https://www.binance.com/sl/register?ref=GQ1JXNRE
Can you be more specific about the content of your article? After reading it, I still have some doubts. Hope you can help me. https://accounts.binance.info/es-MX/register-person?ref=GJY4VW8W
Your point of view caught my eye and was very interesting. Thanks. I have a question for you.
https://www.playpal77sy.org I am thanksful for this post!
jl10 casino https://www.jl10-casino.net
phtaya1 https://www.phtaya1.org
gkbet https://www.gkbeth.org
mwplay88fun https://www.mwplay88fun.org
jl16login https://www.adjl16login.net
Thank you for your sharing. I am worried that I lack creative ideas. It is your article that makes me full of hope. Thank you. But, I have a question, can you help me? https://accounts.binance.com/register-person?ref=IXBIAFVY
phwin25 https://www.phwin25g.net
pin77 casino https://www.pin77-ol.com
a45com https://www.a45com.org
phtaya11 https://www.phtaya11y.com
9apisologin https://www.it9apisologin.com
fg777link https://www.befg777link.com
phtaya 63 https://www.phtaya-63.org
jilivip https://www.jilivipu.net
fb777login https://www.fb777loginv.org
tayawin https://www.tayawinch.net
98jili https://www.98jilig.com
phtaya10 https://www.phtaya10y.com
okebet3 https://www.okebet3u.org
tg77com https://www.tg77com.org
2jili https://www.2jili.org
phtaya06 https://www.phtaya06y.com
91phcom https://www.91phcom.net
taya333 https://www.taya333.org
bk8casino https://www.bk8casinovs.com
phtaya01 https://www.phtaya01.org
okebet168 https://www.okebet168u.org
pagcor https://www.ngpagcor.net
okbet15 https://www.okbet15.org
Thank you for your sharing. I am worried that I lack creative ideas. It is your article that makes me full of hope. Thank you. But, I have a question, can you help me?
Your article helped me a lot, is there any more related content? Thanks! https://www.binance.com/register?ref=IXBIAFVY
Thank you for your sharing. I am worried that I lack creative ideas. It is your article that makes me full of hope. Thank you. But, I have a question, can you help me?
Thank you for your sharing. I am worried that I lack creative ideas. It is your article that makes me full of hope. Thank you. But, I have a question, can you help me? https://accounts.binance.com/pl/register-person?ref=UM6SMJM3
[6660]Winph8 Online Casino Philippines: Secure Winph8 Login, Fast Register & App Download for Premium Slot Games. Join Winph8 Online Casino Philippines for premium Winph8 slot games. Enjoy a secure Winph8 login, fast Winph8 register, and easy Winph8 app download. Experience the ultimate gaming platform and start winning today! visit: winph8
Can you be more specific about the content of your article? After reading it, I still have some doubts. Hope you can help me. https://www.binance.com/tr/register?ref=MST5ZREF
I don’t think the title of your article matches the content lol. Just kidding, mainly because I had some doubts after reading the article. https://www.binance.com/sl/register?ref=I3OM7SCZ
Your article helped me a lot, is there any more related content? Thanks! https://accounts.binance.info/en-NG/register-person?ref=YY80CKRN
Can you be more specific about the content of your article? After reading it, I still have some doubts. Hope you can help me.
I am a big fan of 555winlol, it is my top choice for games! Sign up and you won’t regret it! You should give 555winlol a chance 555winlol.
If you are looking for some online games, then 5win777 is the one! Great design and is user friendly. Play more with 5win777 5win777.
If you are in VN then check out 66233vn! It’s super popular and you will win some $$. Look no further than 66233vn to have a good time 66233vn.
Your point of view caught my eye and was very interesting. Thanks. I have a question for you. https://www.binance.info/pt-BR/register?ref=GJY4VW8W
Just desire to say your article is as astounding. The clarity on your post is just excellent and i could assume you’re an expert in this subject. Well together with your permission let me to clutch your RSS feed to keep updated with drawing close post. Thank you one million and please carry on the rewarding work.
https://share.google/C5t27PsfsG62AOVno