Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Tesla wants to bring Robotaxis to San Francisco. This is what gets in the way.

Meta name Shengjia Zhao as Chief Scientist of AI Superintelligence Unit

Sam Altman warns that ChatGpt is not legally confidential when using it as a therapist

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor
Identity

Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor

userBy userJuly 25, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 25th, 2025Ravi LakshmananCyber Spy/Malware

Cyber Spy

The Russian aerospace and defense industry has been targeted by a cyberspy campaign that offers a backdoor called the Eaglet to promote data delamination.

An activity called Operation Cargotalon is assigned to a threat cluster tracked as UNG0901 (short for unknown group 901).

“The campaign aims to target employees of the Voronezh Aircraft Production Association (VASO), one of Russia’s major aircraft production entities. One of Russia’s major aircraft production entities is said by Subhajeet, who is important for Russian logistics operations.

The attack begins with a spear phishing email with a cargo delivery-themed lure that includes a ZIP archive. Among them is a Windows Shortcut (LNK) file that uses PowerShell to view decoy Microsoft Excel documents, and deploys the Eaglet DLL implant to the host.

Cybersecurity

See Obltrantterminal, a Russian railway container terminal operator authorized by the US Department of the Treasury’s Office of Foreign Assets Control (OFAC) in February 2024.

Eaglet is designed to collect system information and establish connections to hard-coded remote servers (185.225.17[.]104″) to handle HTTP responses from the server and extract commands that are executed on compromised Windows machines.

Although the implant supports shell access and the ability to upload/download files, the exact nature of the next stage payload delivered through this method is unknown.

Seqrite said he discovered a similar campaign targeting the Russian military sector in Eglet, not to mention the source code, but also the overlap with another threat cluster that was tracked as Headmare, known to target Russian entities.

This includes functional similarities between Eaglet and PhantomDL, GO-based backdoors with shell and file download/upload capabilities, and similarity of the naming scheme used for attachments for phishing messages.

Cybersecurity

The disclosure is believed to be attributed to a fresh wave of attacks this month, a Russian state-sponsored hacking group called UAC-0184 (aka HIVE0156), which recently targeted Ukrainian victims to Renkosratt victims.

Threat actors have a history of delivering Remcos Rat since early 2024, but the newly discovered attack chain that distributes malware has been simplified, and use weaponized LNK or PowerShell files to obtain decoy files and hijacking loaders (aka IDAT loaders) payloads.

“HIVE0156 provides weaponized Microsoft LNK and PowerShell files, leading to the download and execution of Remcos Rat,” said IBM X-Force, adding, “We have observed major decoy documents that focus on the Ukrainian military and suggest that it will evolve into a potential audience.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe new Quantum Bit paves the way for improved antimatter research
Next Article Meta will stop selling political ads in the EU from October
user
  • Website

Related Posts

N. The US sanctions company behind the Korean IT scheme. Arizona woman was jailed to run a laptop farm

July 25, 2025

Patchwork targets Turkish defense companies with spear phishing using malicious LNK files

July 25, 2025

SOCO404 and Koske malware target cloud services with cross-platform encryption attacks

July 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Tesla wants to bring Robotaxis to San Francisco. This is what gets in the way.

Meta name Shengjia Zhao as Chief Scientist of AI Superintelligence Unit

Sam Altman warns that ChatGpt is not legally confidential when using it as a therapist

It took Google a month to shut down Catwatchful, a phone spyware operation hosted on the server

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Is ‘Baby Grok’ the Future of Kids’ AI? Elon Musk Launches New Chatbot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.