Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
UnsolicitedBooker Shifts Focus to Central Asian Telecoms

UnsolicitedBooker Shifts Focus to Central Asian Telecoms

Posted on February 24, 2026 By CWS

The emergence of UnsolicitedBooker as a significant cyber threat in Central Asia marks a notable shift in their operations. Telecommunications companies in Kyrgyzstan and Tajikistan have recently come under attack by this group, which previously focused its efforts on Saudi Arabian targets. According to a recent report from Positive Technologies, the attackers have utilized two sophisticated backdoors named LuciDoor and MarsSnake.

Targeted Attacks on Kyrgyzstan and Tajikistan

The cybercriminals behind UnsolicitedBooker have been active since at least March 2023. Initially identified by ESET in May 2025, the group was linked to cyber activities targeting an international organization in Saudi Arabia. The latest attacks, however, highlight their focus on Kyrgyz telecommunications, employing phishing emails that include Microsoft Office documents to deliver malware.

These documents, appearing as legitimate telecom tariff plans, prompt users to enable macros, which then execute a malware loader. This loader, known as LuciLoad, subsequently installs the LuciDoor backdoor. A similar attack pattern was observed in November 2025, with a variant loader, MarsSnakeLoader, deploying MarsSnake malware.

Advanced Malware Techniques

UnsolicitedBooker’s use of LuciDoor and MarsSnake showcases their technical expertise. Written in C++, LuciDoor connects to a command-and-control server, collecting and transmitting system data. It can execute commands, modify files, and upload content through cmd.exe. MarsSnake shares similar functionalities, executing arbitrary commands and accessing files on the infected systems.

Interestingly, MarsSnake has also been linked to attacks in China. These operations begin with a Windows shortcut masquerading as a Word document, launching scripts to activate the malware without a loader. This technique resembles tactics used by the Mustang Panda group in previous campaigns targeting Thailand.

Strategic Implications and Future Outlook

The strategic targeting of telecom companies in Central Asia by UnsolicitedBooker underscores the evolving nature of cyber threats. Positive Technologies notes that the group initially employed LuciDoor but shifted to MarsSnake, only to revert to LuciDoor by 2026. This adaptability demonstrates their persistent threat.

Other cybersecurity threats have also emerged, such as PseudoSticky, mimicking pro-Ukrainian groups to target Russian organizations. This group uses phishing and trojans like RemcosRAT and DarkTrack RAT for data theft. Meanwhile, Cloud Atlas targets Russian entities using custom malware such as VBShower and VBCloud.

The continued evolution of these threat actors highlights the need for vigilant cybersecurity measures. Organizations must remain proactive in defending against increasingly sophisticated cyber threats as these groups adapt their strategies and tools.

The Hacker News Tags:Central Asia, command-and-control, cyber threat, Cybersecurity, LuciDoor, Malware, MarsSnake, Phishing, Telecommunications, UnsolicitedBooker

Post navigation

Previous Post: Spanish Crackdown on Anonymous Fénix Hackers

Related Posts

TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies TamperedChef Malware Disguised as Fake PDF Editors Steals Credentials and Cookies The Hacker News
GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs GlassWorm Malware Discovered in Three VS Code Extensions with Thousands of Installs The Hacker News
GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security The Hacker News
New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries The Hacker News
China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes The Hacker News
What 2025 Is Teaching Us About Cloud Defense What 2025 Is Teaching Us About Cloud Defense The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UnsolicitedBooker Shifts Focus to Central Asian Telecoms
  • Spanish Crackdown on Anonymous Fénix Hackers
  • Cyber Group Claims Massive Data Breach at Odido
  • AI-Powered Cyber Attacks Target Global FortiGate Devices
  • Chinese AI Firms Accused of Copying Claude Using 16 Million Queries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UnsolicitedBooker Shifts Focus to Central Asian Telecoms
  • Spanish Crackdown on Anonymous Fénix Hackers
  • Cyber Group Claims Massive Data Breach at Odido
  • AI-Powered Cyber Attacks Target Global FortiGate Devices
  • Chinese AI Firms Accused of Copying Claude Using 16 Million Queries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News