Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Adobe Commerce Flaw CVE-2025-54236 Hackers can take over customer accounts

SAP Patch Critical Net Weber (CVSS up to 10.0) and previously misused S/4HANA flaws

Why SpaceX bets directly on the cell market

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor
Identity

Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor

userBy userJuly 25, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 25th, 2025Ravi LakshmananCyber Spy/Malware

Cyber Spy

The Russian aerospace and defense industry has been targeted by a cyberspy campaign that offers a backdoor called the Eaglet to promote data delamination.

An activity called Operation Cargotalon is assigned to a threat cluster tracked as UNG0901 (short for unknown group 901).

“The campaign aims to target employees of the Voronezh Aircraft Production Association (VASO), one of Russia’s major aircraft production entities. One of Russia’s major aircraft production entities is said by Subhajeet, who is important for Russian logistics operations.

The attack begins with a spear phishing email with a cargo delivery-themed lure that includes a ZIP archive. Among them is a Windows Shortcut (LNK) file that uses PowerShell to view decoy Microsoft Excel documents, and deploys the Eaglet DLL implant to the host.

Cybersecurity

See Obltrantterminal, a Russian railway container terminal operator authorized by the US Department of the Treasury’s Office of Foreign Assets Control (OFAC) in February 2024.

Eaglet is designed to collect system information and establish connections to hard-coded remote servers (185.225.17[.]104″) to handle HTTP responses from the server and extract commands that are executed on compromised Windows machines.

Although the implant supports shell access and the ability to upload/download files, the exact nature of the next stage payload delivered through this method is unknown.

Seqrite said he discovered a similar campaign targeting the Russian military sector in Eglet, not to mention the source code, but also the overlap with another threat cluster that was tracked as Headmare, known to target Russian entities.

This includes functional similarities between Eaglet and PhantomDL, GO-based backdoors with shell and file download/upload capabilities, and similarity of the naming scheme used for attachments for phishing messages.

Cybersecurity

The disclosure is believed to be attributed to a fresh wave of attacks this month, a Russian state-sponsored hacking group called UAC-0184 (aka HIVE0156), which recently targeted Ukrainian victims to Renkosratt victims.

Threat actors have a history of delivering Remcos Rat since early 2024, but the newly discovered attack chain that distributes malware has been simplified, and use weaponized LNK or PowerShell files to obtain decoy files and hijacking loaders (aka IDAT loaders) payloads.

“HIVE0156 provides weaponized Microsoft LNK and PowerShell files, leading to the download and execution of Remcos Rat,” said IBM X-Force, adding, “We have observed major decoy documents that focus on the Ukrainian military and suggest that it will evolve into a potential audience.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe new Quantum Bit paves the way for improved antimatter research
Next Article Meta will stop selling political ads in the EU from October
user
  • Website

Related Posts

Adobe Commerce Flaw CVE-2025-54236 Hackers can take over customer accounts

September 10, 2025

SAP Patch Critical Net Weber (CVSS up to 10.0) and previously misused S/4HANA flaws

September 10, 2025

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

September 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Adobe Commerce Flaw CVE-2025-54236 Hackers can take over customer accounts

SAP Patch Critical Net Weber (CVSS up to 10.0) and previously misused S/4HANA flaws

Why SpaceX bets directly on the cell market

iPhone Air is a tip for the future of iPhone and may include folding

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Bridging Healthcare Divides: ‘Break The Gap 2025’ Summit Sets New Agenda for Vertical Health

Wearable Tech Deep Dive: The Science Behind Smartwatches and Your Health Goals

The Adaptable Healthcare Playbook: How TwinH Is Leading the Way

Smart Health, Seamless Integration: GooApps Leads the Way in 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.