Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Advanced materials made in space could benefit UK industry

How top CISOs can overcome burnout and speed up MTTR without hiring more people

Bloody Wolf uses NetSupport RAT in spear phishing campaign to target Russian Uzbekistan

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Bloody Wolf uses NetSupport RAT in spear phishing campaign to target Russian Uzbekistan
Identity

Bloody Wolf uses NetSupport RAT in spear phishing campaign to target Russian Uzbekistan

userBy userFebruary 9, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananFebruary 9, 2026Threat Intelligence/Cyber ​​Espionage

The threat actor known as Bloody Wolf is said to be involved in a campaign targeting Uzbekistan and Russia, infecting systems with a remote access Trojan known as NetSupport RAT.

Cybersecurity vendor Kaspersky is tracking this activity under the name “Stan Goulds.” This threat actor is known to have been active since at least 2023 and has orchestrated spear-phishing attacks against manufacturing, financial, and IT sectors in Russia, Kyrgyzstan, Kazakhstan, and Uzbekistan.

The campaign is estimated to have caused around 50 victims in Uzbekistan, and 10 devices in Russia were also affected. Other infections, to a lesser extent, have been confirmed in Kazakhstan, Turkey, Serbia and Belarus. Infection attempts have also been recorded on devices within government agencies, logistics companies, medical facilities, and educational institutions.

“Given that Stangur targets financial institutions, we believe that their main motive is financial gain,” Kaspersky noted. “That said, their heavy use of RATs could also indicate cyber espionage.”

Exploitation of NetSupport, a legitimate remote administration tool, is a starting point for attackers who have previously used STRRAT (also known as Strigoi Master) in their attacks. In November 2025, Group-IB documented a phishing attack targeting organizations in Kyrgyzstan to distribute tools.

The attack chain is very simple: a phishing email loaded with a malicious PDF attachment is used as a launchpad to cause an infection. The PDF document has embedded links that, when clicked, lead to the download of a malicious loader that handles multiple tasks.

It displays a fake error message to give the impression that the application cannot run on the victim’s machine. Check if the number of previous RAT installation attempts is less than 3. If this number reaches or exceeds the limit, the loader throws an error message: “Attempt limit reached. Please try another computer.” Download and launch NetSupport RAT from one of several external domains. To ensure NetSupport RAT persistence, set up an autorun script in your startup folder, add the NetSupport startup script (‘run.bat’) to the autorun key in the registry, and create a scheduled task that triggers the execution of the same batch script.

Kaspersky said it also identified a Mirai botnet payload staged on infrastructure associated with Bloody Wolf, raising the possibility that the actor has expanded its malware arsenal to target IoT devices.

“More than 60 targets were hit, which is a surprisingly large number for a sophisticated and targeted campaign,” the company concluded. “This shows that these parties are willing to commit significant resources to their operations.”

This disclosure coincided with a number of cyber campaigns targeting Russian organizations, including one conducted by ExCobalt, which gained initial access to targeted networks by leveraging known security flaws and credentials stolen from contractors. Positive Technologies described the adversary as one of the “most dangerous groups” attacking Russian organizations.

This attack features the use of a variety of tools, along with an attempt to siphon Telegram credentials and message history, as well as Outlook Web Access credentials, from a compromised host by injecting malicious code into the login page.

CobInt, a known backdoor used by the group. Lockers such as Babuk and LockBit. PUMAKIT, along with previous iterations known as Facefish (February 2021), Kitsune (February 2022), and Megatsune (November 2023), is a kernel rootkit for escalating privileges, hiding files and directories, and hiding itself from system tools. Kitsune’s use was also associated with the threat cluster known as Sneaky Wolf (also known as Sneaking Leprachaun) by BI.ZONE. Octopus is a Rust-based toolkit used to escalate privileges on compromised Linux systems.

“The group has changed its initial access tactics, shifting its focus from exploiting one-day vulnerabilities in Internet-available corporate services (such as Microsoft Exchange) to infiltrating the infrastructure of its primary targets through contractors,” Positive Technologies said.

Russian state institutions, scientific companies, and IT organizations are also being targeted by a previously unknown attacker known as Punishing Owl, who steals and leaks data on the dark web. The group is suspected of being a politically motivated hacktivist organization, has been active since December 2025, and one of its social media accounts is controlled from Kazakhstan.

This attack utilizes a phishing email containing a password-protected ZIP archive. This archive contains Windows shortcuts (LNKs) disguised as PDF documents. When an LNK file is opened, a PowerShell command is executed that downloads a stealer named ZipWhisper from a remote server, collects sensitive data, and uploads it to the same server.

Another threat cluster that has its sights set on Russia and Belarus is Vortex Werewolf. The ultimate goal of the attack is to deploy Tor and OpenSSH to facilitate persistent remote access. The campaign was previously exposed by Cyble and Seqrite Labs in November 2025, with the latter calling the campaign Operation SkyCloak.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEuropean offshore wind power for a competitive EU steel industry
Next Article How top CISOs can overcome burnout and speed up MTTR without hiring more people
user
  • Website

Related Posts

How top CISOs can overcome burnout and speed up MTTR without hiring more people

February 9, 2026

TeamPCP worm exploits cloud infrastructure to build criminal infrastructure

February 9, 2026

BeyondTrust fixes critical pre-authentication RCE vulnerability in remote support and PRA

February 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Advanced materials made in space could benefit UK industry

How top CISOs can overcome burnout and speed up MTTR without hiring more people

Bloody Wolf uses NetSupport RAT in spear phishing campaign to target Russian Uzbekistan

European offshore wind power for a competitive EU steel industry

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.