Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

itch.io is the latest market to crack down on adult games

Tesla has announced the launch of human-assisted Robotaki in San Francisco, but state regulators say it isn’t

Astronomer winks with “temporary spokesman” Gwyneth Paltrow in the viral infamy

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Rare Wolf Apt uses legal software in attacks against hundreds of Russian companies
Identity

Rare Wolf Apt uses legal software in attacks against hundreds of Russian companies

userBy userJune 10, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 10, 2025Ravi LakshmananCryptocurrency/Malware

A rare werewolf apt

The threat actor known as rare wolves (formerly wolves) is linked to a series of cyberattacks targeting Russia and independent states (CIS) countries.

“A distinctive feature of this threat is that it supports attackers using legal third-party software in developing their malicious binaries,” Kaspersky said. “The malicious features of the campaign described in this article are implemented through command files and PowerShell scripts.”

The purpose of the attack is to establish remote access to the compromised host and siphon credentials and deploy Xmrig Cryptocurrency Miner. The activity affected hundreds of Russian users across industrial companies and engineering schools, and reduced infections recorded in Belarus and Kazakhstan.

The unusual Werewolf, also known as Librarian Ghouls and Rezet, is a moniker assigned to the Advanced Persistent Threat (APT) group, with a track record of impressive organizations in Russia and Ukraine. It is believed to be active since at least 2019.

Cybersecurity

According to bi.zone, threat actors use phishing emails to gain initial access, leverage scaffolding to steal documents, drop tools such as Mipko Employee Monitor, WebBrowserPassView, and Defender Control to interact with infected systems, harvest passwords, and disable Antivirus software.

The latest attack set documented by Kaspersky reveals that it uses phishing emails as a malware delivery vehicle, using password-protected archives containing executables as the starting point for activating the infection.

Residing in the archive is an installer that is used to deploy legitimate tools called 4T Tray Minimizers, and other payloads containing decoy PDF documents that mimic payment orders.

“The software can minimize application execution into the system tray, allowing attackers to obscure their existence on the compromised system,” Kaspersky said.

These intermediate payloads are used to retrieve additional files from remote servers, such as Defender Control and Blat, legitimate utilities for sending stolen data via SMTP to attacker-controlled email addresses. The attack is also characterized by the use of AnyDesk remote desktop software and by Windows batch scripts that facilitate data theft and minor deployment.

A notable aspect of batch scripting is that it launches a PowerShell script that incorporates the ability to automatically awaken the victim system at 1am local time and allows attackers to remotely access a 4-hour window via AnyDesk. The machine will be shut down at 5am by a scheduled task.

“Utilizing third-party legal software for malicious purposes is a common technique, making it more difficult to detect and attribution of APT activities,” Kaspersky said. “All malicious features still rely on installers, commands, and PowerShell scripts.”

Cybersecurity

The disclosure is because the positive technology revealed that a financially motivated cybercrime group called Darkgaboon is targeting Russian entities using Lockbit 3.0 ransomware. The Darkgaboon, first discovered in January 2025, is said to have been in operation since May 2023.

The attack uses phishing emails containing RTF bait documents and archive files containing Windows screensaver files to drop Lockbit encryption and Trojan horses such as Xworm and Revenge Rat. The use of readily available tools is seen on the part of attackers as an attempt to consolidate with a wider range of cybercriminal activities and challenge attribution efforts.

“Darkgaboon is not a client of the Lockbit Raas service and acts independently, as demonstrated by the use of public versions of Lockbit ransomware, the lack of traces of data extraction in the attacked companies, and the absence of traditional threats of exposing stolen information. [data leak site] Portal: “Positive Technology researcher Victor Kazakov said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHealthier Planetary Data-Driven Swarm Efficiency
Next Article MSU’s research shines light on the origins of cosmic rays
user
  • Website

Related Posts

N. The US sanctions company behind the Korean IT scheme. Arizona woman was jailed to run a laptop farm

July 25, 2025

Patchwork targets Turkish defense companies with spear phishing using malicious LNK files

July 25, 2025

Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor

July 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

itch.io is the latest market to crack down on adult games

Tesla has announced the launch of human-assisted Robotaki in San Francisco, but state regulators say it isn’t

Astronomer winks with “temporary spokesman” Gwyneth Paltrow in the viral infamy

Tesla Vet says “reviewing real products, not mockups” is the key to innovative maintenance

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.