Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

French Football Federation Suffers Data Breach

November 28, 2025

Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year

November 28, 2025

What parents should know to protect their children from doxxing

November 28, 2025
Facebook X (Twitter) Instagram
Friday, November 28
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Bloody Wolf Threat Actor Expands Activity Across Central Asia
News

Bloody Wolf Threat Actor Expands Activity Across Central Asia

Team-CWDBy Team-CWDNovember 28, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A widening cyber campaign using legitimate remote-access software to infiltrate government targets has been identified by cybersecurity researchers.

The operation, discovered by Group-IB and UKUK and carried out by the Bloody Wolf advanced persistent threat (APT) group, shows a shift from traditional malware to a streamlined Java-based delivery method that deploys the NetSupport remote administration tool (RAT).

The firms noted that, since it became active late in 2023, the Bloody Wolf group has continued to refine its techniques.

Activity Spreads Beyond Initial Targets

Advisories published this week report the discovery of a sustained campaign operated by Bloody Wolf in Kyrgyzstan since at least June 2025, before extending its reach to Uzbekistan by early October.

Analysts observed that the group continues to impersonate the country’s Ministry of Justice through convincing PDF documents, spoofed domains and instructions urging victims to install Java to view supposed case materials. Short messages embedded in the lures help the attackers preserve a sense of legitimacy.

Read more on remote administration tools: How Forgotten Remote Access Tools Are Putting Organizations at Risk 

The researchers attributed the findings to a joint investigation drawing on threat intelligence data and analysis of the threat group’s infrastructure.

They noted that the Uzbekistan infrastructure was configured with geofencing, redirecting anyone outside the country to a legitimate government site while serving malicious JAR downloads to local users.

How the Infection Chain Works

Once a victim opens the downloaded JAR file, the loader retrieves additional components and ultimately installs NetSupport RAT for remote control. The loaders, built using Java 8, contain a single class and no obfuscation. Although small, they automate several tasks:

  • Fetching NetSupport binaries over HTTP

  • Adding persistence via autorun entries

  • Creating scheduled tasks

  • Displaying fake error messages to distract users

These loaders also include a launch-limit counter set to 3, stored in the user profile directory, meaning the malware will run only a limited number of times before stopping to reduce the chance of drawing attention.

Analysts also said the group leverages a custom JAR generator to mass-produce samples with varying download paths, registry entries and error messages.

While the actors previously used STRRAT, they now rely on an older 2013 version of NetSupport Manager, likely sourced from publicly available licenses.

The report concludes that this mixture of social engineering and low-cost tools allows Bloody Wolf to maintain a steady operational tempo across Central Asia.

“This combination of social engineering and accessible tooling allows Bloody Wolf to remain effective while keeping a low operational profile. Its shift from traditional malware to legitimate remote-administration software indicates an ongoing evolution of tactics aimed at evading detection and blending into normal IT activity,” Group-IB wrote.

“Given the group’s adaptability and persistence, organizations in Central Asia should remain vigilant for expected continued spear-phishing activity and evolving infection chains in the near future.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleLearn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale
Next Article What parents should know to protect their children from doxxing
Team-CWD
  • Website

Related Posts

News

French Football Federation Suffers Data Breach

November 28, 2025
News

Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year

November 28, 2025
News

Learn How Leading Companies Secure Cloud Workloads and Infrastructure at Scale

November 28, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

It’s all fun and games until someone gets hacked

September 26, 2025

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.