Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Spear-Phishing Campaign Targets Uzbekistan and Russia

Spear-Phishing Campaign Targets Uzbekistan and Russia

Posted on February 9, 2026 By CWS

The cyber landscape in Uzbekistan and Russia is currently being challenged by a spear-phishing campaign associated with the cybercriminal entity known as Bloody Wolf. Cybersecurity firm Kaspersky, tracking this activity under the alias Stan Ghouls, has identified the use of the NetSupport remote access trojan (RAT) as a key tool in these attacks. The group, active since at least 2023, has targeted industries across Russia, Kyrgyzstan, Kazakhstan, and Uzbekistan, particularly in sectors like manufacturing, finance, and IT.

Widespread Impact Across Regions

In this latest campaign, approximately 50 systems in Uzbekistan and 10 in Russia have been compromised. The infections extend into Kazakhstan, Turkey, Serbia, and Belarus, albeit at lower levels. Governmental bodies, logistics firms, healthcare facilities, and educational institutions have also been targeted. Kaspersky suggests that while financial gain is a likely motive, the extensive use of RATs may indicate intentions of cyber espionage.

Bloody Wolf’s current strategy involves the misuse of NetSupport, a legitimate remote desktop tool, marking a shift from their previous reliance on STRRAT. Reports from November 2025 by Group-IB highlighted phishing efforts in Kyrgyzstan that facilitated the distribution of this tool.

Phishing Tactics and Malware Deployment

The attack methodology is straightforward: malicious PDF attachments in phishing emails serve as the entry point, leading victims to download a harmful loader. This loader performs several functions, including simulating error messages, checking installation attempts, and ultimately downloading and launching the NetSupport RAT. To ensure persistence, the malware configures autorun scripts and registry entries.

Kaspersky also uncovered Mirai botnet payloads on infrastructure tied to Bloody Wolf, hinting at a possible expansion of their malware capabilities to target IoT devices. The scale of this campaign, affecting over 60 targets, underscores the resources and sophistication at play.

Parallel Cyber Threats and Group Activities

This disclosure coincides with other cyber threats targeting Russian organizations, such as those by ExCobalt, which exploits security flaws and stolen credentials for network access. Positive Technologies has identified these actors as highly dangerous threats to Russian entities. Their arsenal includes backdoors like CobInt and ransomware such as Babuk and LockBit, as well as privilege escalation tools like PUMAKIT.

Additional threats, like Vortex Werewolf and Punishing Owl, have been observed targeting Russia and Belarus, utilizing phishing tactics to deploy tools like Tor and OpenSSH, and executing data theft and leaks. These activities highlight the ongoing vulnerabilities and the need for heightened cybersecurity measures in the region.

As these campaigns continue, understanding their tactics and expanding defensive strategies will be crucial for organizations in affected regions. The involvement of sophisticated threat actors suggests an ongoing risk that requires constant vigilance and adaptation.

The Hacker News Tags:Bloody Wolf, cyber attacks, cyber espionage, cyber threat, Cybersecurity, Kaspersky, Malware, NetSupport RAT, remote access trojan, Russia, spear-phishing, Stan Ghouls, threat intelligence, Uzbekistan

Post navigation

Previous Post: ScarCruft Exploits Cloud Services in New Malware Campaign
Next Post: SolarWinds Web Help Desk Vulnerabilities Exploited in Attacks

Related Posts

Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage The Hacker News
New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto New PumaBot Botnet Targets Linux IoT Devices to Steal SSH Credentials and Mine Crypto The Hacker News
Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign Microsoft Revokes 200 Fraudulent Certificates Used in Rhysida Ransomware Campaign The Hacker News
Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU The Hacker News
Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times Researchers Uncover Malware in Fake Discord PyPI Package Downloaded 11,500+ Times The Hacker News
Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems Trend Micro Confirms Active Exploitation of Critical Apex One Flaws in On-Premise Systems The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks
  • Discord Introduces Age-Restricted Features for Safer Use
  • Major Cybersecurity M&A Deals in January 2026
  • Hackers Utilize DKIM Replay to Exploit Trusted Invoices
  • Ransomware Groups May Shift Back to Encryption Strategies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • SolarWinds WHD Exploited in Complex Multi-Stage Cyber Attacks
  • Discord Introduces Age-Restricted Features for Safer Use
  • Major Cybersecurity M&A Deals in January 2026
  • Hackers Utilize DKIM Replay to Exploit Trusted Invoices
  • Ransomware Groups May Shift Back to Encryption Strategies

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark