Bloody Wolf Targets Uzbekistan and Russia with NetSupport RAT
A recent spear-phishing campaign has been uncovered, targeting organizations in Uzbekistan and Russia. The threat actor, known as Bloody Wolf, has been linked to the campaign, which aims to infect systems with the NetSupport RAT (Remote Access Trojan).
Cybersecurity vendor Kaspersky has been tracking the activity, referring to it as Stan Ghouls. The threat actor has been active since at least 2023, orchestrating targeted attacks against various industries, including manufacturing, finance, and IT.
- The campaign involves spear-phishing emails designed to trick victims into downloading and installing the NetSupport RAT.
- Once installed, the RAT allows the attackers to gain remote access to the infected system, enabling them to steal sensitive data and perform other malicious activities.
- The targeting of Uzbekistan and Russia suggests that the threat actor may be seeking to exploit vulnerabilities in these regions or gain access to specific industries or organizations.
Organizations in the affected regions are advised to exercise caution when receiving unsolicited emails and to implement robust security measures to prevent such attacks. This includes educating employees on the dangers of spear-phishing, implementing email filters, and using anti-virus software to detect and remove malware.
Your skill is your best firewall; let us help you build it.






Recent Comments
No comments on this post yet. Be the first to comment 🙂