Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Increasing debate over the expansion of age verification methods

Noisy Bear targets Kazakhstan energy sector with its Barrelfire Phishing campaign

The $1 pay package of the mask is full of boning versions of his own broken promise

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Noisy Bear targets Kazakhstan energy sector with its Barrelfire Phishing campaign
Identity

Noisy Bear targets Kazakhstan energy sector with its Barrelfire Phishing campaign

userBy userSeptember 6, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

The threat actors of Russian origin probably stem from a new set of attacks targeting Kazakhstan’s energy sector.

The activity, known as the codename for Operation Barrelfire, is tied to a new threat group that Seqrite Labs tracks as a noisy bear. Threat actors have been active since at least April 2025.

“The campaign is aimed at Kazumunaigus or KMG employees who have threat entities providing fake documents related to the KMG IT department, mimicking official internal communications, and leveraging themes such as policy updates, internal certification procedures, and pay adjustments.

The infection chain begins with a phishing email containing a Windows Shortcut (LNK) downloader, decoy documents related to Kazmunaigas, and a zip attachment containing a readme.txt file written in both Russian and Kazakh, and instructions for running a program named “kazmunaygaz_viewer”.

According to the cybersecurity company, the email was sent in May 2025 from a compromised email address of an individual working in the finance department of Kazumunaigas and targeted other employees of the company.

The LNK file payload is designed to drop additional payloads, including malicious batch scripts that pave the way for a PowerShell loader called a downshell. The attack culminates in the deployment of DLL-based implants. This is a 64-bit binary that allows you to run shellcode and launch a reverse shell.

Audit and subsequent

Further analysis of the threat actor’s infrastructure revealed that it is hosted at Aeza Group, Russia-based bulletproof hosting (BPH) service provider.

The development was carried out by Harfanglab, a Belarusian threat actor known as Ghostwriter (Frostyneighbor or UNC1151), in a campaign targeting Ukraine and Poland since April 2025, and a campaign aimed at gathering information about the equipped systems and deploying implants for implantation for penetration.

“These archives contain XLS spreadsheets with VBA macros that drop and load DLLs,” said the French cybersecurity company. “The latter is responsible for collecting information about the compromised system and obtaining the next stage of malware from the Command and Control (C2) server.”

Subsequent iterations of the campaign are known to write Microsoft Cabinet (CAB) files along with LNK shortcuts to extract and run DLLs from Archive. The DLL then conducts initial reconnaissance before dropping the next stage of malware from the external server.

Meanwhile, an attack targeting Poland coordinates the attack chain, using Slack as a beacon mechanism and data exfiltration channel, and downloads two stages of payload that establishes contact with the domain peshack in return[.]ICU.

In at least one example, DLLs dropped via macro race Excel spreadsheets are used to load cobalt strike beacons, facilitating further activity after exposure.

“These small changes suggest that UAC-0057 is likely to try to avoid detection, but they are likely to prioritize continuity or development of its operationality over stealth and refinement,” Harfanglab said.

Cyberattacks reported against Russia

The findings emerged amid the new Old Gremlin’s fearful attack on Russian companies in the first half of 2025, targeting eight large domestic industrial companies using a phishing email campaign.

The Kaspersky-by-Kaspersky intrusion has run a malicious script, including bringing in your own Vulnerable Driver (BYOVD) technique to disable the victim’s computer and the legitimate node.js interpreter security solution.

The phishing attack targeting Russia also provided a new information steeler called Phantom Stealer, called the open source steeler codenamed Steeler, to collect a wide range of sensitive information using adult content and email baits related to payments. It also shares a duplicate with another Stealerium derivative known as Warp Stealer.

According to F6, Phantom Stealer inherits Stealerium’s “Porndetector” module, which captures webcam screenshots when users visit porn websites by keeping tabs in their active browser windows, and also inherits whether the title contains a configurable list of porn or sex.

CIS Build Kit

“This is likely to be used later for ‘sexttorth’,” Proofpoint said in its own analysis of the malware. “This feature is not novel among cybercrime malware, but it’s not much observed.”

Over the past few months, Russian organizations have also been on the receivers of attacks carried out by hacking groups tracked as Cloud Atlas, Phantomcore, and Scully Wolves, harvesting sensitive information and using malware families such as VBShower, Phantomrat, and Phantomrshell to provide additional payloads.

Another cluster of activities includes new Android malware that pretends to be antivirus tools created by the Russian Federal Security Services Agency (FSB) for Russian business representatives to elect representatives of Russian companies. The app is an attempt to pass security_fsb, pig (Russian in FSB), and the last name as the central bank of the Russian Federation.

First discovered in January 2025, malware removes data from Messenger and browser apps, streams from phone cameras, excludes Log Keystrokes, and asks for extensive permissions to access SMS messages, locations, audio and cameras. It also requires background execution, device administrator rights and accessibility services.

“The app’s interface only offers one language in Russian,” Doctor Web said. “Therefore, the malware is completely focused on Russian users. Backdoors protect against being removed using accessibility services if they receive a corresponding command from a threat actor.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe $1 pay package of the mask is full of boning versions of his own broken promise
Next Article Increasing debate over the expansion of age verification methods
user
  • Website

Related Posts

Malicious NPM packages spoof as flashbots and steal Ethereum wallet keys

September 6, 2025

The Adaptable Healthcare Playbook: How TwinH Is Leading the Way

September 5, 2025

CISA orders immediate patches of critical Sitecore vulnerabilities under aggressive exploitation

September 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Increasing debate over the expansion of age verification methods

Noisy Bear targets Kazakhstan energy sector with its Barrelfire Phishing campaign

The $1 pay package of the mask is full of boning versions of his own broken promise

Malicious NPM packages spoof as flashbots and steal Ethereum wallet keys

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Adaptable Healthcare Playbook: How TwinH Is Leading the Way

Smart Health, Seamless Integration: GooApps Leads the Way in 2025

Beyond Compliance: The New Era of Smart Medical Device Software Integration

Unlocking Tomorrow’s Health: Medical Device Integration

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.