Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency

Posted on February 2, 2026February 2, 2026 By CWS

A beforehand unknown hacktivist group referred to as Punishing Owl has emerged with subtle cyberattacks focusing on Russian authorities safety businesses.

The group first surfaced on December 12, 2025, when it introduced the profitable breach of a Russian authorities safety company’s community.

The attackers printed stolen inner paperwork on a knowledge leak website and duplicated the information on a Mega.nz repository, demonstrating their intention to maximise public publicity of the compromise.

The group employed a number of assault strategies to amplify the impression of their operation. After getting access to the sufferer’s DNS configuration, Punishing Owl created a subdomain and modified DNS information to redirect site visitors to a server situated in Brazil.

This server hosted the stolen information together with a political manifesto explaining their motives.

The attackers strategically selected Friday night at 6:37 PM to announce the breach, timing calculated to delay response efforts and guarantee most visibility of their actions.

The group’s social media publish (Supply – Habr)

Following the preliminary breach, the group launched enterprise electronic mail compromise assaults towards the sufferer’s companions and contractors.

Habr analysts recognized that Punishing Owl despatched emails from a Brazilian server utilizing addresses created inside the sufferer’s electronic mail area.

These messages falsely claimed to substantiate the community compromise and included pressing requests to assessment hooked up paperwork.

The assault infrastructure revealed technical sophistication regardless of the group’s current emergence.

DLS useful resource with sufferer information (Supply – Habr)

Punishing Owl configured pretend TLS certificates, established IMAP and SMTP providers for electronic mail operations, and deployed the ZipWhisper PowerShell stealer to reap browser credentials from contaminated techniques.

The malicious emails contained password-protected ZIP archives with disguised LNK information that executed PowerShell instructions, downloading the stealer from a command-and-control server at bloggoversikten[.]com.

An infection Mechanism and Credential Theft

The ZipWhisper stealer operates via a multi-stage an infection course of designed to extract delicate browser knowledge from compromised hosts.

When victims open the disguised LNK file, it silently executes PowerShell instructions that obtain the stealer payload from the attacker’s infrastructure.

The malware then collects information containing net browser credentials, cookies, and saved passwords, packaging them into ZIP archives with particular naming patterns that embrace the username and chunk numbers.

Group manifesto (Supply – Habr)

These archives are saved briefly within the AppData/Native/Temp listing earlier than being uploaded to the command-and-control server via a personalized endpoint construction.

Mimicry of the C2 area (Supply – Habr)

Evaluation of the stealer’s code revealed feedback suggesting the doable use of AI instruments to generate parts of the malicious script, indicating the group could also be leveraging trendy growth methods to speed up their operations towards Russian vital infrastructure targets.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Agency, Government, Group, Hacker, Networks, Owl, Punishing, Russian, Security, Targeting

Post navigation

Previous Post: 21,000+ OpenClaw AI Instances With Personal Configurations Exposed Online
Next Post: ShinyHunters-Branded Extortion Activity Expands, Escalates

Related Posts

New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks Cyber Security News
Dell Data Breach – Test Lab Platform Hacked by World Leaks Group Cyber Security News
MastaStealer Weaponizes Windows LNK Files, Executes PowerShell Command, and Evades Defender Cyber Security News
New AI-Powered Wi-Fi Biometrics WhoFi Tracks Humans Behind Walls with 95.5% Accuracy Cyber Security News
New Text Message Based Phishing Attack from China Targeting Users Around the Globe Cyber Security News
Stellantis, the Maker of Citroën, FIAT, Jeep, and Other Cars, Confirms Data Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ShinyHunters-Branded Extortion Activity Expands, Escalates
  • New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • DynoWiper Data-Wiping Malware Attacking Energy Companies to Destroy Data
  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ShinyHunters-Branded Extortion Activity Expands, Escalates
  • New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark