Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Spear-Phishing Campaign Targets Uzbekistan and Russia

Spear-Phishing Campaign Targets Uzbekistan and Russia

Posted on February 9, 2026 By CWS

The cyber landscape in Uzbekistan and Russia is currently being challenged by a spear-phishing campaign associated with the cybercriminal entity known as Bloody Wolf. Cybersecurity firm Kaspersky, tracking this activity under the alias Stan Ghouls, has identified the use of the NetSupport remote access trojan (RAT) as a key tool in these attacks. The group, active since at least 2023, has targeted industries across Russia, Kyrgyzstan, Kazakhstan, and Uzbekistan, particularly in sectors like manufacturing, finance, and IT.

Widespread Impact Across Regions

In this latest campaign, approximately 50 systems in Uzbekistan and 10 in Russia have been compromised. The infections extend into Kazakhstan, Turkey, Serbia, and Belarus, albeit at lower levels. Governmental bodies, logistics firms, healthcare facilities, and educational institutions have also been targeted. Kaspersky suggests that while financial gain is a likely motive, the extensive use of RATs may indicate intentions of cyber espionage.

Bloody Wolf’s current strategy involves the misuse of NetSupport, a legitimate remote desktop tool, marking a shift from their previous reliance on STRRAT. Reports from November 2025 by Group-IB highlighted phishing efforts in Kyrgyzstan that facilitated the distribution of this tool.

Phishing Tactics and Malware Deployment

The attack methodology is straightforward: malicious PDF attachments in phishing emails serve as the entry point, leading victims to download a harmful loader. This loader performs several functions, including simulating error messages, checking installation attempts, and ultimately downloading and launching the NetSupport RAT. To ensure persistence, the malware configures autorun scripts and registry entries.

Kaspersky also uncovered Mirai botnet payloads on infrastructure tied to Bloody Wolf, hinting at a possible expansion of their malware capabilities to target IoT devices. The scale of this campaign, affecting over 60 targets, underscores the resources and sophistication at play.

Parallel Cyber Threats and Group Activities

This disclosure coincides with other cyber threats targeting Russian organizations, such as those by ExCobalt, which exploits security flaws and stolen credentials for network access. Positive Technologies has identified these actors as highly dangerous threats to Russian entities. Their arsenal includes backdoors like CobInt and ransomware such as Babuk and LockBit, as well as privilege escalation tools like PUMAKIT.

Additional threats, like Vortex Werewolf and Punishing Owl, have been observed targeting Russia and Belarus, utilizing phishing tactics to deploy tools like Tor and OpenSSH, and executing data theft and leaks. These activities highlight the ongoing vulnerabilities and the need for heightened cybersecurity measures in the region.

As these campaigns continue, understanding their tactics and expanding defensive strategies will be crucial for organizations in affected regions. The involvement of sophisticated threat actors suggests an ongoing risk that requires constant vigilance and adaptation.

The Hacker News Tags:Bloody Wolf, cyber attacks, cyber espionage, cyber threat, Cybersecurity, Kaspersky, Malware, NetSupport RAT, remote access trojan, Russia, spear-phishing, Stan Ghouls, threat intelligence, Uzbekistan

Post navigation

Previous Post: ScarCruft Exploits Cloud Services in New Malware Campaign
Next Post: SolarWinds Web Help Desk Vulnerabilities Exploited in Attacks

Related Posts

Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks The Hacker News
Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks The Hacker News
New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack The Hacker News
SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks SonicWall NetExtender Trojan and ConnectWise Exploits Used in Remote Access Attacks The Hacker News
SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers SonicWall SSL VPN Flaw and Misconfigurations Actively Exploited by Akira Ransomware Hackers The Hacker News
Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News