Bloody Wolf, a long-running threat actor active since at least 2023, has expanded its activity across Central Asia, targeting organizations in Kyrgyzstan and Uzbekistan throughout 2025. The group impersonates Ministries of Justice using convincing PDF lures and domains to trick victims in government, finance, and IT sectors into opening malicious links. Once engaged, the documents instruct users to install Java, enabling the execution of JAR loaders for deploying the NetSupport RAT. The infection chain begins with spear-phishing emails containing PDF attachments that embed malicious URLs labeled as case materials. When clicked, victims are guided to download the JAR files and install Java under the guise of viewing legal documents. In the Uzbekistan wave, infrastructure was geo-fenced so only requests from inside the country triggered malware delivery, while others were redirected to legitimate government pages. Execution of the JAR triggers a fake error message while silently downloading and staging NetSupport Manager components from attacker infrastructure. The Java loaders are lightweight, built with outdated Java 8, and generated from a custom template. Their role is simple but effective: download the NetSupport payload, configure persistence through scheduled tasks, registry keys, and startup folders, and launch the RAT using file paths and variables unique to each sample. The NetSupport version used is a legitimate but outdated 2013 release obtained from public sources. Once active, it enables remote control, file access, and covert monitoring while blending into normal administrative activity. Organizations should block unauthorized JAR execution, tighten email filtering, and educate users on spear-phishing imitating government agencies. Monitoring for unexpected NetSupport installations, unusual remote sessions, and Java execution on endpoints is essential. Strengthening domain impersonation detection, enforcing MFA, and integrating threat intelligence can help identify evolving activity as Bloody Wolf continues refining its low-profile but persistent campaigns.
Cybercriminals are intensifying their attacks on the telecommunications and media sector, targeting critical infrastructure with sophisticated methods. Recent security analysis rev...
A widespread supply-chain attack has targeted the npm ecosystem, where several JavaScript packages were found distributing a sophisticated malware strain known as Shai-Hulud. The m...
A recent investigation by Bitsight TRACE has exposed a stealthy yet highly scalable attack vector leveraging malicious calendar subscriptions on iOS and macOS devices. Over 4 milli...