Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Chinese Navy conducts combat patrols near the contested shallows of the South China Sea | South China Sea News

Paramitaris for 40 years than rape during Guatemala prison war | Humanity News for Crime

Federal staff reviewing social media accounts of visa applicants heading to Harvard

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Russia-related hackers target Tajikistan government with weaponized word documents
Identity

Russia-related hackers target Tajikistan government with weaponized word documents

userBy userMay 27, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 27, 2025Ravi LakshmananMalware/Threat Intelligence

Weaponized Word Documents

Threat actors located in Russia, known as TAG-10, have been observed to run a spear phishing campaign targeting Tajikistan using macro-enabled word templates as the initial payload.

Attack chains are the deviation from the use of threat actors from the use of HTML application (.HTA) loaders called HATVIBE in HTML application (.HTA).

“In light of the historical targeting of Central Asian public sector entities in TAG-10, the campaign is likely to be targeted at governments, education and research institutions within Tajikistan,” the cybersecurity company said.

“These cyberespionage activities may aim to gather intelligence to influence local politics and security, especially during sensitive events such as elections and geopolitical tensions.”

Cybersecurity

TAG-10, also known as UAC-0063, is the name assigned to a threat activity group known for targeting the European Embassy. They are also other organizations in Central Asia, East Asia and Europe. It is believed to be active since at least 2021.

Activities relating to threat actors assessed to share overlap with Russian nation-state hacking crew APT28 were first documented in May 2023 by Romanian cybersecurity company Bitdefender in connection with a campaign that provides malware (StillArce) targeting government entities in Kazakhstan and Afghanistan.

However, it was the Ukrainian Computer Emergency Response Team (CERT-UA) who officially assigned the Moniker UAC-0063 in the same month after discovering a cyberattack targeting state state groups using malware strains such as Logpi, Cherry Spy (aka Downexpyer), Doundex and Pyplunderplug.

The latest campaign, which has been observed since January 2025, targeted at Tajikistan organizations, is a move from Hatobib, delivered via HTA-embedded spear phishing attachments in favor of macro-enabled word templates (.DOTM) files, showing a transition from Hatobib, which highlights the evolution of tactics.

“Previously, TAG-110 leveraged macro-enabled word documents to deliver HTA-based malware Hatvibe for initial access,” said recorded Future. “The newly discovered documents do not include an embedded HTA Hatvibe payload to create scheduled tasks and instead are not leveraging them to persist global template files located in the Word Startup folder.”

Cybersecurity

The phishing emails are known to use documents themed on the Tajikistan government as lure material. This is consistent with the historical use of troilized legitimate government documents as malware delivery vectors. However, cybersecurity companies said they cannot independently verify the reliability of these documents.

Introducing the file is a VBA macro that may place the document template in a Microsoft Word startup folder for automatic execution, then initiate communication with the Command and Control (C2) server and run additional VBA code that provides a C2 response. The exact nature of the second stage payload is unknown.

“However, based on the historic activity and toolset of the TAG-10, successful initial access via macro-enabled templates could potentially deploy a new custom-developed payload with Hatvibe, Cherryspy, Logpie, or potentially new custom-developed payloads designed for spying,” the company said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMumbai’s heavy rains have been around for years amid India’s “early” monsoon | Weather News
Next Article One of Europe’s top AI researchers grew $13 million seeds to break the model’s “Holy Grail”
user
  • Website

Related Posts

Rust-based Eddiestealer malware steals browser data using Clickfix Captcha Trick

May 30, 2025

China-linked hackers exploit SAP and SQL server flaws in Asian and Brazilian attacks

May 30, 2025

Healthcare CISO’s journey to enable modern care

May 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Chinese Navy conducts combat patrols near the contested shallows of the South China Sea | South China Sea News

Paramitaris for 40 years than rape during Guatemala prison war | Humanity News for Crime

Federal staff reviewing social media accounts of visa applicants heading to Harvard

Top Startup and Tech Funding News for the Week Ending May 30, 2025

Trending Posts

Chinese Navy conducts combat patrols near the contested shallows of the South China Sea | South China Sea News

May 31, 2025

Paramitaris for 40 years than rape during Guatemala prison war | Humanity News for Crime

May 31, 2025

Trump will raise iron tariffs to 50% at Pennsylvania rally | Donald Trump News

May 31, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top Startup and Tech Funding News for the Week Ending May 30, 2025

Where LLMS retrieves real-time data behind AI searches (and why it’s more important than you think)

SpaceX’s Journey to Mars: How Spaceships Use Hohmann Orbital’s Movement from Earth to Mars (and the Physics Behind)

zircuit allows for top-up of non-curative wallets for crypto.com visa cards

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.