Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency

Posted on February 2, 2026February 2, 2026 By CWS

A beforehand unknown hacktivist group referred to as Punishing Owl has emerged with subtle cyberattacks focusing on Russian authorities safety businesses.

The group first surfaced on December 12, 2025, when it introduced the profitable breach of a Russian authorities safety company’s community.

The attackers printed stolen inner paperwork on a knowledge leak website and duplicated the information on a Mega.nz repository, demonstrating their intention to maximise public publicity of the compromise.

The group employed a number of assault strategies to amplify the impression of their operation. After getting access to the sufferer’s DNS configuration, Punishing Owl created a subdomain and modified DNS information to redirect site visitors to a server situated in Brazil.

This server hosted the stolen information together with a political manifesto explaining their motives.

The attackers strategically selected Friday night at 6:37 PM to announce the breach, timing calculated to delay response efforts and guarantee most visibility of their actions.

The group’s social media publish (Supply – Habr)

Following the preliminary breach, the group launched enterprise electronic mail compromise assaults towards the sufferer’s companions and contractors.

Habr analysts recognized that Punishing Owl despatched emails from a Brazilian server utilizing addresses created inside the sufferer’s electronic mail area.

These messages falsely claimed to substantiate the community compromise and included pressing requests to assessment hooked up paperwork.

The assault infrastructure revealed technical sophistication regardless of the group’s current emergence.

DLS useful resource with sufferer information (Supply – Habr)

Punishing Owl configured pretend TLS certificates, established IMAP and SMTP providers for electronic mail operations, and deployed the ZipWhisper PowerShell stealer to reap browser credentials from contaminated techniques.

The malicious emails contained password-protected ZIP archives with disguised LNK information that executed PowerShell instructions, downloading the stealer from a command-and-control server at bloggoversikten[.]com.

An infection Mechanism and Credential Theft

The ZipWhisper stealer operates via a multi-stage an infection course of designed to extract delicate browser knowledge from compromised hosts.

When victims open the disguised LNK file, it silently executes PowerShell instructions that obtain the stealer payload from the attacker’s infrastructure.

The malware then collects information containing net browser credentials, cookies, and saved passwords, packaging them into ZIP archives with particular naming patterns that embrace the username and chunk numbers.

Group manifesto (Supply – Habr)

These archives are saved briefly within the AppData/Native/Temp listing earlier than being uploaded to the command-and-control server via a personalized endpoint construction.

Mimicry of the C2 area (Supply – Habr)

Evaluation of the stealer’s code revealed feedback suggesting the doable use of AI instruments to generate parts of the malicious script, indicating the group could also be leveraging trendy growth methods to speed up their operations towards Russian vital infrastructure targets.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Agency, Government, Group, Hacker, Networks, Owl, Punishing, Russian, Security, Targeting

Post navigation

Previous Post: 21,000+ OpenClaw AI Instances With Personal Configurations Exposed Online
Next Post: ShinyHunters-Branded Extortion Activity Expands, Escalates

Related Posts

Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available Cyber Security News
Sharepoint 0-day, Vmware Exploitation, Threats and Cyber Attacks Cyber Security News
What tools help reduce fraud or friendly fraud for online businesses?  Cyber Security News
Attacks on Palo Alto PAN-OS Global Protect Login Portals Surge from 2,200 IPs Cyber Security News
Microsoft Releases Emergency Patch For Windows Server Update Service RCE Vulnerability Cyber Security News
RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ShinyHunters-Branded Extortion Activity Expands, Escalates
  • New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency
  • 21,000+ OpenClaw AI Instances With Personal Configurations Exposed Online

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenClaw Bug Enables One-Click Remote Code Execution via Malicious Link
  • Microsoft Begins NTLM Phase-Out With Three-Stage Plan to Move Windows to Kerberos
  • ShinyHunters-Branded Extortion Activity Expands, Escalates
  • New Punishing Owl Hacker Group Targeting Networks of Russian Government Security Agency
  • 21,000+ OpenClaw AI Instances With Personal Configurations Exposed Online

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark