Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Bloody Wolf Hackers Use NetSupport RAT in Targeted Attacks

Bloody Wolf Hackers Use NetSupport RAT in Targeted Attacks

Posted on February 10, 2026 By CWS

The cybercriminal group known as Bloody Wolf has intensified its attacks on organizations located in Russia and Uzbekistan. Employing a more sophisticated strategy, the group now uses NetSupport Manager, a legitimate remote administration tool, to gain unauthorized access while evading detection.

Shift in Tactics by Bloody Wolf

Since their emergence in 2023, Bloody Wolf has targeted sectors such as manufacturing, finance, and IT. Initially relying on the STRRAT remote access trojan, they have recently pivoted to leveraging legitimate software like NetSupport Manager. This shift helps them seamlessly integrate with authorized activities, complicating efforts by defenders to identify malicious actions.

Phishing Emails and Initial Access

The attack sequence typically begins with localized spear-phishing emails. These emails, crafted in languages such as Uzbek, mimic official communications from government or legal entities to incite urgency. Included in these emails are malicious PDFs containing links that trigger the download of a Java-based loader when clicked.

This loader is crucial as it facilitates the deployment of the final malware payload, securing the attackers’ position within the victim’s network.

Infrastructure and Persistence Mechanisms

Following the detection of these attacks, analysts at Securelist identified consistent patterns in Bloody Wolf’s operational infrastructure. The group frequently updates its command-and-control domains, creating new ones for each campaign to avoid detection.

Once the malicious loader is executed, a fake error message is displayed to mislead users into believing the application cannot run. Meanwhile, the loader actively downloads NetSupport RAT components and employs checks to terminate itself if unsuccessful, thereby evading sandbox analysis.

For persistence, the malware employs multiple methods, such as placing a script in the Windows Startup folder, adding entries to the Registry’s Run key, and creating scheduled tasks. These measures ensure the malicious tool activates automatically upon user login.

Conclusion and Preventive Measures

To counter these threats, organizations must enhance their monitoring for unauthorized remote desktop tools and scrutinize processes initiated from the Startup folder. Continuous vigilance and updated cybersecurity measures are vital in mitigating the risks posed by the Bloody Wolf group.

Cyber Security News Tags:Bloody Wolf, cyber attacks, Cybersecurity, IT security, Malware, NetSupport RAT, remote access, Russia, spear-phishing, Uzbekistan

Post navigation

Previous Post: AI App Data Breach Exposes Millions of User Messages
Next Post: Ivanti Zero-Day Vulnerability Impacts Dutch and EU Agencies

Related Posts

Weaponized ScreenConnect RMM Tool Tricks Users into Downloading Xworm RAT Weaponized ScreenConnect RMM Tool Tricks Users into Downloading Xworm RAT Cyber Security News
Threat Actors Allegedly Selling Monolock Ransomware on Dark Web Forums Threat Actors Allegedly Selling Monolock Ransomware on Dark Web Forums Cyber Security News
Surveillance Company Using SS7 Bypass Attack to Track the User’s Location Information Surveillance Company Using SS7 Bypass Attack to Track the User’s Location Information Cyber Security News
Parrot 7.0 Released with New Penetration Testing and AI Tools Parrot 7.0 Released with New Penetration Testing and AI Tools Cyber Security News
Microsoft Dismantles 300+ Websites Used to Distribute RaccoonO365 Phishing Service Microsoft Dismantles 300+ Websites Used to Distribute RaccoonO365 Phishing Service Cyber Security News
SIM Swapping Attacks on the Rise SIM Swapping Attacks on the Rise Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News