In 2025, a pro-Ukrainian hacktivist group known as BO Team, operating under aliases such as Black Owl, Lifting Zmiy, and Hoody Hyena, has emerged as a significant cyber threat to Russian organizations. First declaring their intent via Telegram in early 2024, the group has since launched a series of targeted cyberattacks against sectors including government, telecommunications, manufacturing, and technology. According to a Kaspersky Lab report, all indicators of compromise (IOCs) tied to Black Owl are geographically isolated to Russia, pointing to a focused and destructive campaign aimed at weakening critical infrastructure while extracting financial ransoms. Black Owl's attack chain typically begins with spear phishing emails masquerading as legitimate correspondence from automation or energy companies. These emails carry malware-laden attachments that install backdoors such as DarkGate, Remcos, and Broken Door. Once inside, the group demonstrates high technical skill through their use of Living off the Land (LotL) tactics—leveraging native Windows tools like PowerShell, wmic.exe, and custom binaries like av_scan.exe to deploy destructive utilities. The group further exploits tools like SDelete for file wiping, Babuk ransomware for encryption, and vssadmin.exe to delete backups and shadow copies, ensuring victims have limited recovery options. Black Owl maintains persistence using scheduled tasks disguised as system updates and performs credential theft using LSASS dumps and Active Directory database extraction via tools like HandleKatz and ntdsutil. Their lateral movement through RDP and SSH enables broad access across compromised networks. Unlike many hacktivist groups, Black Owl opts for prolonged infiltration and strategic sabotage, driven by a blend of ideological alignment with Ukraine and financial extortion. With minimal coordination with other groups and a unique toolset, Black Owl represents a highly autonomous and dangerous actor in today’s cyber threat landscape.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...