Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Russia-related hackers target Tajikistan government with weaponized word documents
Identity

Russia-related hackers target Tajikistan government with weaponized word documents

userBy userMay 27, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 27, 2025Ravi LakshmananMalware/Threat Intelligence

Weaponized Word Documents

Threat actors located in Russia, known as TAG-10, have been observed to run a spear phishing campaign targeting Tajikistan using macro-enabled word templates as the initial payload.

Attack chains are the deviation from the use of threat actors from the use of HTML application (.HTA) loaders called HATVIBE in HTML application (.HTA).

“In light of the historical targeting of Central Asian public sector entities in TAG-10, the campaign is likely to be targeted at governments, education and research institutions within Tajikistan,” the cybersecurity company said.

“These cyberespionage activities may aim to gather intelligence to influence local politics and security, especially during sensitive events such as elections and geopolitical tensions.”

Cybersecurity

TAG-10, also known as UAC-0063, is the name assigned to a threat activity group known for targeting the European Embassy. They are also other organizations in Central Asia, East Asia and Europe. It is believed to be active since at least 2021.

Activities relating to threat actors assessed to share overlap with Russian nation-state hacking crew APT28 were first documented in May 2023 by Romanian cybersecurity company Bitdefender in connection with a campaign that provides malware (StillArce) targeting government entities in Kazakhstan and Afghanistan.

However, it was the Ukrainian Computer Emergency Response Team (CERT-UA) who officially assigned the Moniker UAC-0063 in the same month after discovering a cyberattack targeting state state groups using malware strains such as Logpi, Cherry Spy (aka Downexpyer), Doundex and Pyplunderplug.

The latest campaign, which has been observed since January 2025, targeted at Tajikistan organizations, is a move from Hatobib, delivered via HTA-embedded spear phishing attachments in favor of macro-enabled word templates (.DOTM) files, showing a transition from Hatobib, which highlights the evolution of tactics.

“Previously, TAG-110 leveraged macro-enabled word documents to deliver HTA-based malware Hatvibe for initial access,” said recorded Future. “The newly discovered documents do not include an embedded HTA Hatvibe payload to create scheduled tasks and instead are not leveraging them to persist global template files located in the Word Startup folder.”

Cybersecurity

The phishing emails are known to use documents themed on the Tajikistan government as lure material. This is consistent with the historical use of troilized legitimate government documents as malware delivery vectors. However, cybersecurity companies said they cannot independently verify the reliability of these documents.

Introducing the file is a VBA macro that may place the document template in a Microsoft Word startup folder for automatic execution, then initiate communication with the Command and Control (C2) server and run additional VBA code that provides a C2 response. The exact nature of the second stage payload is unknown.

“However, based on the historic activity and toolset of the TAG-10, successful initial access via macro-enabled templates could potentially deploy a new custom-developed payload with Hatvibe, Cherryspy, Logpie, or potentially new custom-developed payloads designed for spying,” the company said.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMumbai’s heavy rains have been around for years amid India’s “early” monsoon | Weather News
Next Article One of Europe’s top AI researchers grew $13 million seeds to break the model’s “Holy Grail”
user
  • Website

Related Posts

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

July 18, 2025

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

July 18, 2025

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

July 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

China’s vast tools secretly extract from SMS, GPS data and confiscated mobile phones.

UNG0002 group hits Hong Kong China in Pakistan using LNK files and rats in twin campaign

Ivanti Zero-Days was exploited to drop MdifyLoader and launch a cobalt strike attack in memory

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Next-Gen Digital Identity: How TwinH and Avatars Are Redefining Creation

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.