A new wave of cyberattacks has emerged targeting Ukraine’s draft-eligible men, exploiting MeduzaStealer malware, a sophisticated tool historically associated with Russia-linked cybercriminals. According to researchers, hackers have employed the malware through Telegram, further illustrating the ongoing digital warfare accompanying the military conflict between Ukraine and Russia.
The MeduzaStealer Malware: A Weapon of Cyber Espionage
MeduzaStealer, a potent malware initially seen in Russian cyberattacks, is designed to harvest sensitive information from compromised systems. This includes login credentials, browsing histories, computer metadata, and even data stored in password managers. Previously, Russia-affiliated threat actors used the malware in attacks on Ukrainian and Polish targets, including in 2022 when the hacker group UAC-0050 unleashed MeduzaStealer on victims in both countries.
In this most recent campaign, Ukrainian authorities have identified hackers exploiting the vulnerability of Ukraine’s conscription process. Ukraine’s draft-eligible men are now the primary targets, as the attackers aim to compromise personal data stored in a government app called Reserve+.
How the Attack Unfolded
Ukraine’s Computer Emergency Response Team (CERT-UA) revealed that hackers posed as a technical support bot for the Reserve+ app via a Telegram account. This app, launched by the Ukrainian government earlier this year, enables men liable for military service to update their personal data online, streamlining the conscription process. As the app collects highly sensitive personal information, it quickly became a prime target for cybercriminals.
The hackers, posing as legitimate technical support, requested users to upload a ZIP file that purportedly contained instructions on updating personal information. Upon opening the file, users unknowingly installed the MeduzaStealer malware. The malware’s primary objective was to extract specific types of documents, and it executed its mission covertly before self-deleting, making detection and analysis more difficult for cybersecurity teams.
Although the number of affected users remains undisclosed, the malware’s potential impact is significant. Over 4.5 million Ukrainians have utilized the Reserve+ app to manage their personal conscription data, raising concerns about the potential scale of the breach. The exact data stolen and its future use remains unknown, but such information is likely valuable for future cyberattacks, espionage efforts, or even psychological warfare.
Russia’s Growing Use of Mobile Platforms in Cyber Warfare
This is not the first time Russian-affiliated hackers have targeted Ukraine’s digital infrastructure through widely-used mobile applications. Russia-linked cybercriminals have previously abused popular platforms such as Telegram and Signal to infiltrate Ukrainian military networks. In recent months, hackers distributed malware disguised as legitimate military software via Signal, aiming to steal credentials from Ukrainian soldiers and track their physical locations.
The cyberattacks are not limited to stealing data; they are part of a broader strategy of information warfare. By compromising systems, Russia can collect critical intelligence, disrupt Ukrainian operations, and undermine morale among Ukrainian conscripts and military personnel.
Fake Reserve+ Apps Multiply the Threat
The Ukrainian Defense Ministry has already identified at least three fake versions of the Reserve+ app, which are believed to serve the same purpose of harvesting personal data from Ukrainian conscripts. These fake apps, likely created by the same Russia-linked threat actors, pose a significant threat as they could be used in follow-up cyberattacks or psychological operations aimed at further destabilizing Ukraine’s military efforts.
The Larger Implications of Cyber Espionage on the Battlefield
The ongoing cyberattacks highlight the evolving nature of warfare in the digital age. Russia has long been known for its sophisticated cyber capabilities, and the MeduzaStealer campaign underscores how cyber tools are now as crucial as conventional weapons on the battlefield. By compromising sensitive personal and military data, Russian-affiliated hackers can execute targeted attacks that have real-world consequences on the battlefield.
The ability to steal and exploit military data could be used to gain tactical advantages, while the psychological effects on those whose information has been compromised could weaken the resolve of Ukraine’s military and civilian forces. This form of cyber warfare is a reminder that modern conflicts are no longer restricted to tanks and missiles but extend into the digital domain, where personal data and national security intersect.

