Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Bloody Wolf Hackers Use NetSupport RAT in Targeted Attacks

Bloody Wolf Hackers Use NetSupport RAT in Targeted Attacks

Posted on February 10, 2026 By CWS

The cybercriminal group known as Bloody Wolf has intensified its attacks on organizations located in Russia and Uzbekistan. Employing a more sophisticated strategy, the group now uses NetSupport Manager, a legitimate remote administration tool, to gain unauthorized access while evading detection.

Shift in Tactics by Bloody Wolf

Since their emergence in 2023, Bloody Wolf has targeted sectors such as manufacturing, finance, and IT. Initially relying on the STRRAT remote access trojan, they have recently pivoted to leveraging legitimate software like NetSupport Manager. This shift helps them seamlessly integrate with authorized activities, complicating efforts by defenders to identify malicious actions.

Phishing Emails and Initial Access

The attack sequence typically begins with localized spear-phishing emails. These emails, crafted in languages such as Uzbek, mimic official communications from government or legal entities to incite urgency. Included in these emails are malicious PDFs containing links that trigger the download of a Java-based loader when clicked.

This loader is crucial as it facilitates the deployment of the final malware payload, securing the attackers’ position within the victim’s network.

Infrastructure and Persistence Mechanisms

Following the detection of these attacks, analysts at Securelist identified consistent patterns in Bloody Wolf’s operational infrastructure. The group frequently updates its command-and-control domains, creating new ones for each campaign to avoid detection.

Once the malicious loader is executed, a fake error message is displayed to mislead users into believing the application cannot run. Meanwhile, the loader actively downloads NetSupport RAT components and employs checks to terminate itself if unsuccessful, thereby evading sandbox analysis.

For persistence, the malware employs multiple methods, such as placing a script in the Windows Startup folder, adding entries to the Registry’s Run key, and creating scheduled tasks. These measures ensure the malicious tool activates automatically upon user login.

Conclusion and Preventive Measures

To counter these threats, organizations must enhance their monitoring for unauthorized remote desktop tools and scrutinize processes initiated from the Startup folder. Continuous vigilance and updated cybersecurity measures are vital in mitigating the risks posed by the Bloody Wolf group.

Cyber Security News Tags:Bloody Wolf, cyber attacks, Cybersecurity, IT security, Malware, NetSupport RAT, remote access, Russia, spear-phishing, Uzbekistan

Post navigation

Previous Post: AI App Data Breach Exposes Millions of User Messages
Next Post: Ivanti Zero-Day Vulnerability Impacts Dutch and EU Agencies

Related Posts

Hackers Use Legitimate Drivers to Kill Antivirus Processes and Lower The System’s Defenses Hackers Use Legitimate Drivers to Kill Antivirus Processes and Lower The System’s Defenses Cyber Security News
Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Leaked Online Cyber Security News
ShowDoc Vulnerability Exploited by Cybercriminals ShowDoc Vulnerability Exploited by Cybercriminals Cyber Security News
Critical Windows Shell Vulnerability Threatens User Security Critical Windows Shell Vulnerability Threatens User Security Cyber Security News
NVIDIA Merlin Vulnerability Allow Attacker to Achieve Remote Code Execution With Root Privileges NVIDIA Merlin Vulnerability Allow Attacker to Achieve Remote Code Execution With Root Privileges Cyber Security News
Microsoft Exchange Server Vulnerability Enables Privelege Escalation Microsoft Exchange Server Vulnerability Enables Privelege Escalation Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark