Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Blue Origin sticks to first landing of New Glenn rocket, launches NASA spacecraft

Russian hackers create 4,300 fake travel websites to steal hotel guests’ payment data

Five months later, bottles of $1,200 Besties All-In Tequila are finally starting to ship.

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor
Identity

Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor

userBy userJuly 25, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 25th, 2025Ravi LakshmananCyber Spy/Malware

Cyber Spy

The Russian aerospace and defense industry has been targeted by a cyberspy campaign that offers a backdoor called the Eaglet to promote data delamination.

An activity called Operation Cargotalon is assigned to a threat cluster tracked as UNG0901 (short for unknown group 901).

“The campaign aims to target employees of the Voronezh Aircraft Production Association (VASO), one of Russia’s major aircraft production entities. One of Russia’s major aircraft production entities is said by Subhajeet, who is important for Russian logistics operations.

The attack begins with a spear phishing email with a cargo delivery-themed lure that includes a ZIP archive. Among them is a Windows Shortcut (LNK) file that uses PowerShell to view decoy Microsoft Excel documents, and deploys the Eaglet DLL implant to the host.

Cybersecurity

See Obltrantterminal, a Russian railway container terminal operator authorized by the US Department of the Treasury’s Office of Foreign Assets Control (OFAC) in February 2024.

Eaglet is designed to collect system information and establish connections to hard-coded remote servers (185.225.17[.]104″) to handle HTTP responses from the server and extract commands that are executed on compromised Windows machines.

Although the implant supports shell access and the ability to upload/download files, the exact nature of the next stage payload delivered through this method is unknown.

Seqrite said he discovered a similar campaign targeting the Russian military sector in Eglet, not to mention the source code, but also the overlap with another threat cluster that was tracked as Headmare, known to target Russian entities.

This includes functional similarities between Eaglet and PhantomDL, GO-based backdoors with shell and file download/upload capabilities, and similarity of the naming scheme used for attachments for phishing messages.

Cybersecurity

The disclosure is believed to be attributed to a fresh wave of attacks this month, a Russian state-sponsored hacking group called UAC-0184 (aka HIVE0156), which recently targeted Ukrainian victims to Renkosratt victims.

Threat actors have a history of delivering Remcos Rat since early 2024, but the newly discovered attack chain that distributes malware has been simplified, and use weaponized LNK or PowerShell files to obtain decoy files and hijacking loaders (aka IDAT loaders) payloads.

“HIVE0156 provides weaponized Microsoft LNK and PowerShell files, leading to the download and execution of Remcos Rat,” said IBM X-Force, adding, “We have observed major decoy documents that focus on the Ukrainian military and suggest that it will evolve into a potential audience.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe new Quantum Bit paves the way for improved antimatter research
Next Article Meta will stop selling political ads in the EU from October
user
  • Website

Related Posts

Russian hackers create 4,300 fake travel websites to steal hotel guests’ payment data

November 13, 2025

Fake Chrome extension “Safery” uses Sui blockchain to steal Ethereum wallet seed phrases

November 13, 2025

Why 2026 will be the year of machine speed security

November 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Blue Origin sticks to first landing of New Glenn rocket, launches NASA spacecraft

Russian hackers create 4,300 fake travel websites to steal hotel guests’ payment data

Five months later, bottles of $1,200 Besties All-In Tequila are finally starting to ship.

Defending Apple’s $230 iPhone socks

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.