Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware

Posted on December 4, 2025December 4, 2025 By CWS

A classy assault marketing campaign referred to as Operation DupeHike has emerged as a big risk to Russian company environments, particularly focusing on staff inside human sources, payroll, and administrative departments.

The marketing campaign, attributed to the risk group UNG0902, leverages fastidiously crafted decoy paperwork themed round worker bonuses and inner monetary insurance policies to ship a beforehand unknown malware ecosystem to victims’ machines.

The assault begins with spear-phishing emails containing ZIP archives disguised as authentic company paperwork.

These archives are named “Премия 2025.zip” (Bonus.Zip in English) and include malicious shortcut information (.LNK) that look like PDF paperwork, utilizing filenames like “Document_1_On_the_size_of_the_annual_bonus.pdf.lnk” to deceive recipients into opening them.

Seqrite safety analysts recognized this marketing campaign after discovering a malicious ZIP archive on VirusTotal on November 21, 2025.

The analysis staff famous that the risk actor demonstrates subtle understanding of Russian company HR workflows, crafting decoy paperwork that define real looking bonus constructions tied to efficiency metrics, KPIs, and organizational targets.

The lure doc references Russia’s Labor Code and establishes a default bonus charge of fifteen % of annual wage, creating convincing social engineering materials for focusing on staff in monetary departments.

An infection Mechanism and Technical Breakdown

The assault chain operates by way of three distinct phases, starting with malicious LNK execution. When a sufferer opens the shortcut file, PowerShell executes hidden within the background utilizing particular flags: NoNI, nop, and w hidden parameters.

An infection Chain (Supply – Seqrite)

The script makes use of Invoke-WebRequest to obtain a second-stage implant known as DUPERUNNER from the attacker-controlled server at 46.149.71.230.

DUPERUNNER, a C++ compiled implant, performs important reconnaissance and injection operations. The malware accommodates a number of capabilities designed for sustaining persistence and evading detection.

It enumerates goal processes together with explorer.exe, notepad.exe, and msedge.exe for injection functions whereas concurrently downloading decoy PDFs to show to customers, creating the phantasm of authentic doc processing.

The implant then performs distant thread injection to load the ultimate payload: an AdaptixC2 beacon. This command-and-control beacon makes use of HTTP POST requests to speak with attacker infrastructure, enabling distant command execution and knowledge exfiltration capabilities.

The beacon employs dynamic API decision utilizing djb2-style hashing to keep away from static detection signatures.

Default port configuration for AdaptixC2 HTTP Beacon (Supply – Seqrite)

Seqrite researchers extracted configuration artifacts revealing the beacon identification numbers and command-and-control infrastructure hosted on servers beneath ASN 48282 and AS 9123, operated by VDSINA-AS and TIMEWEB-AS.

The infrastructure demonstrates port configuration adjustments from port 80 throughout implant supply to port 443 for closing beacon operations, indicating ongoing refinement of assault infrastructure.

This marketing campaign represents an evolving risk panorama the place subtle social engineering combines with superior malware capabilities to focus on company environments in Japanese Europe.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacking, Documents, DupeHike, DUPERUNNER, Employees, Malware, Operation, Weaponized

Post navigation

Previous Post: Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT
Next Post: Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts

Related Posts

Crypto User Loses $9,000 in Seconds After Clicking Instagram Ad Promising Easy Profits Cyber Security News
Greedy Sponge Hackers Attacking Financial Institutions With Modified Version of AllaKore RAT Cyber Security News
Hackers Mimic IT Teams to Exploit Microsoft Teams Request to Gain System Remote Access Cyber Security News
Chrome Use After Free Vulnerability Let Attackers Execute Arbitrary Code Cyber Security News
“GPUGate” Malware Abuses Uses Google Ads and GitHub to Deliver Advanced Malware Payload Cyber Security News
Red Hat Confirms Data Breach After Hackers Claim to Steal 570GB of Private GitHub Repositories Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft January 2026 Security Update Causes Credential Prompt Failures in Remote Desktop Connections
  • Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking
  • Black Basta Ransomware Leader Added to EU Most Wanted and INTERPOL Red Notice
  • Let’s Encrypt has made 6-day IP-based TLS certificates Generally Available
  • Python-powered Toolkit for Information Gathering and reconnaissance

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark