Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More

How to browse the web more sustainably with a green browser

Japan joins groundbreaking research partnership with Horizon Europe

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Bloody Wolf expands Java-based NetSupport RAT attacks in Kyrgyzstan and Uzbekistan
Identity

Bloody Wolf expands Java-based NetSupport RAT attacks in Kyrgyzstan and Uzbekistan

userBy userNovember 27, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

November 27, 2025Ravi LakshmananMalware/Social Engineering

The threat actor known as Bloody Wolf is believed to be involved in a cyber attack campaign targeting Kyrgyzstan with the purpose of delivering the NetSupport RAT since at least June 2025.

As of October 2025, the operation has expanded to include Uzbekistan, Group IB researchers Amirbek Kurbanov and Volen Kayo said in a joint report with Ukuk, a state-owned company affiliated with the Kyrgyz Republic Prosecutor General’s Office. The attacks targeted the financial, government, and information technology (IT) sectors.

“Those threat actors are [Kyrgyzstan’s] “The Ministry of Justice hosted malicious Java Archive (JAR) files designed to deploy the NetSupport RAT through official-looking PDF documents and domain names,” the Singapore-based company said.

“A combination of social engineering and easily accessible tools will allow Bloody Wolf to remain effective while keeping its operational profile low.”

DFIR retainer service

Bloody Wolf is the name assigned to a group of hackers of unknown origin that conducted spear-phishing attacks targeting organizations in Kazakhstan and Russia using tools such as STRRAT and NetSupport. This group is estimated to have been active since at least late 2023.

Targeting Kyrgyzstan and Uzbekistan using similar early access techniques indicates the threat actor’s growing activity in Central Asia, primarily crafting phishing emails impersonating trusted government ministries and distributing weaponized links and attachments.

This attack chain follows more or less the same approach in that it tricks the message recipient into clicking a link that downloads a malicious Java Archive (JAR) loader file along with Java runtime installation instructions.

Although the email claims that installation is required to view the documentation, it is actually used to run the loader. Once launched, the loader retrieves the next stage payload (i.e. the NetSupport RAT) from infrastructure under the attacker’s control and sets persistence in three ways:

Create a scheduled task Add a Windows registry value Drop a batch script into the folder “%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup”

CIS build kit

The Uzbekistan phase of the campaign is notable for incorporating geofencing restrictions. This redirects international requests to the legitimate data.egov.[.]Uzu’s website. Requests from within Uzbekistan were found to trigger downloads of JAR files from embedded links within PDF attachments.

According to Group-IB, the JAR loader observed in the campaign is built on Java 8, which was released in March 2014. The attackers are believed to be using custom JAR generators or templates to generate these artifacts. The NetSupport RAT payload is an older version of NetSupport Manager from October 2013.

“Bloody Wolf has demonstrated that low-cost, commercially available tools can be armed with sophisticated, regionally targeted cyber operations.” “By leveraging trust in government agencies and leveraging simple JAR-based loaders, the group continues to maintain a strong foothold across Central Asian threats.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleDid NASA’s telescope really ‘see’ dark matter? Strange gamma rays prompt bold claims, but scientists urge caution
Next Article The real drama this Thanksgiving may be Michael Burley vs. Nvidia
user
  • Website

Related Posts

Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More

December 22, 2025

How to browse the web more sustainably with a green browser

December 22, 2025

Android malware operations massively merge dropper, SMS theft, and RAT capabilities

December 22, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Firewall Exploits, AI Data Theft, Android Hacks, APT Attacks, Insider Leaks & More

How to browse the web more sustainably with a green browser

Japan joins groundbreaking research partnership with Horizon Europe

UK government announces biggest animal welfare reforms in history

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.