Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Bloody Wolf Hackers Use NetSupport RAT in Targeted Attacks

Bloody Wolf Hackers Use NetSupport RAT in Targeted Attacks

Posted on February 10, 2026 By CWS

The cybercriminal group known as Bloody Wolf has intensified its attacks on organizations located in Russia and Uzbekistan. Employing a more sophisticated strategy, the group now uses NetSupport Manager, a legitimate remote administration tool, to gain unauthorized access while evading detection.

Shift in Tactics by Bloody Wolf

Since their emergence in 2023, Bloody Wolf has targeted sectors such as manufacturing, finance, and IT. Initially relying on the STRRAT remote access trojan, they have recently pivoted to leveraging legitimate software like NetSupport Manager. This shift helps them seamlessly integrate with authorized activities, complicating efforts by defenders to identify malicious actions.

Phishing Emails and Initial Access

The attack sequence typically begins with localized spear-phishing emails. These emails, crafted in languages such as Uzbek, mimic official communications from government or legal entities to incite urgency. Included in these emails are malicious PDFs containing links that trigger the download of a Java-based loader when clicked.

This loader is crucial as it facilitates the deployment of the final malware payload, securing the attackers’ position within the victim’s network.

Infrastructure and Persistence Mechanisms

Following the detection of these attacks, analysts at Securelist identified consistent patterns in Bloody Wolf’s operational infrastructure. The group frequently updates its command-and-control domains, creating new ones for each campaign to avoid detection.

Once the malicious loader is executed, a fake error message is displayed to mislead users into believing the application cannot run. Meanwhile, the loader actively downloads NetSupport RAT components and employs checks to terminate itself if unsuccessful, thereby evading sandbox analysis.

For persistence, the malware employs multiple methods, such as placing a script in the Windows Startup folder, adding entries to the Registry’s Run key, and creating scheduled tasks. These measures ensure the malicious tool activates automatically upon user login.

Conclusion and Preventive Measures

To counter these threats, organizations must enhance their monitoring for unauthorized remote desktop tools and scrutinize processes initiated from the Startup folder. Continuous vigilance and updated cybersecurity measures are vital in mitigating the risks posed by the Bloody Wolf group.

Cyber Security News Tags:Bloody Wolf, cyber attacks, Cybersecurity, IT security, Malware, NetSupport RAT, remote access, Russia, spear-phishing, Uzbekistan

Post navigation

Previous Post: AI App Data Breach Exposes Millions of User Messages
Next Post: Ivanti Zero-Day Vulnerability Impacts Dutch and EU Agencies

Related Posts

New ClickFix Attack Tricks Users with ‘Fake OS Update’ to Execute Malicious Commands New ClickFix Attack Tricks Users with ‘Fake OS Update’ to Execute Malicious Commands Cyber Security News
ChatGPT Tricked Into Bypassing CAPTCHA Security and Enterprise Defenses ChatGPT Tricked Into Bypassing CAPTCHA Security and Enterprise Defenses Cyber Security News
Achieving Data Privacy Regulation Compliance in 2025 Frameworks Achieving Data Privacy Regulation Compliance in 2025 Frameworks Cyber Security News
NVIDIA Merlin Vulnerability Allow Attacker to Achieve Remote Code Execution With Root Privileges NVIDIA Merlin Vulnerability Allow Attacker to Achieve Remote Code Execution With Root Privileges Cyber Security News
BlackLock Ransomware Attacking Windows, Linux, and VMware ESXi Environments BlackLock Ransomware Attacking Windows, Linux, and VMware ESXi Environments Cyber Security News
Microsoft 365 Authentication Issues Disrupt User Access Across Multiple Regions Microsoft 365 Authentication Issues Disrupt User Access Across Multiple Regions Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT36 and SideCopy Target Indian Defense with RATs
  • Prometei Botnet Targets Windows Servers with Advanced Tactics
  • Zast.AI Secures $6 Million for Advanced Code Security
  • Critical MSHTML Vulnerability Spurs Urgent Microsoft Patch
  • Defend Against Identity Threats: Join Our Webinar

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT36 and SideCopy Target Indian Defense with RATs
  • Prometei Botnet Targets Windows Servers with Advanced Tactics
  • Zast.AI Secures $6 Million for Advanced Code Security
  • Critical MSHTML Vulnerability Spurs Urgent Microsoft Patch
  • Defend Against Identity Threats: Join Our Webinar

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark