InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Bloody Wolf expands Java-based NetSupport RAT attacks in Kyrgyzstan and Uzbekistan
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Bloody Wolf expands Java-based NetSupport RAT attacks in Kyrgyzstan and Uzbekistan
Technology

Bloody Wolf expands Java-based NetSupport RAT attacks in Kyrgyzstan and Uzbekistan

November 27, 2025 3 Min Read
Share
Bloody Wolf expands Java-based NetSupport RAT attacks in Kyrgyzstan and Uzbekistan
SHARE

threat actor known as bloody wolf It is believed to be the result of a cyber attack campaign targeting Kyrgyzstan for the purpose of delivering the NetSupport RAT since at least June 2025.

As of October 2025, the operation has expanded to include Uzbekistan, Group IB researchers Amirbek Kurbanov and Volen Kayo said in a joint report with Ukuk, a state-owned company affiliated with the Kyrgyz Republic Prosecutor General’s Office. The attacks targeted the financial, government, and information technology (IT) sectors.

“These attackers impersonate the (Kyrgyzstan) Ministry of Justice through official-looking PDF documents and domain names. These documents host malicious Java Archive (JAR) files designed to deploy the NetSupport RAT,” the Singapore-based company said.

“A combination of social engineering and easily accessible tools will allow Bloody Wolf to remain effective while keeping its operational profile low.”

Bloody Wolf is the name assigned to a group of hackers of unknown origin that conducted spear-phishing attacks targeting organizations in Kazakhstan and Russia using tools such as STRRAT and NetSupport. This group is estimated to have been active since at least late 2023.

Targeting Kyrgyzstan and Uzbekistan using similar early access techniques indicates the threat actor’s growing activity in Central Asia, primarily crafting phishing emails impersonating trusted government ministries and distributing weaponized links and attachments.

This attack chain follows more or less the same approach in that it tricks the message recipient into clicking a link that downloads a malicious Java Archive (JAR) loader file along with Java runtime installation instructions.

Although the email claims that installation is required to view the documentation, it is actually used to run the loader. Once launched, the loader retrieves the next stage payload (i.e. the NetSupport RAT) from infrastructure under the attacker’s control and sets persistence in three ways:

  • Creating a scheduled task
  • Adding Windows registry values
  • Drop the batch script into the folder “%APPDATA%MicrosoftWindowsStart MenuProgramsStartup”.

The Uzbekistan phase of the campaign is notable for incorporating geofencing restrictions. This redirects requests from abroad to the legitimate data.egov(.)uz website. Requests from within Uzbekistan were found to trigger downloads of JAR files from embedded links within PDF attachments.

See also  comicform and sectorJ149 hacker deploys form book malware in Eurasian cyberattack

According to Group-IB, the JAR loader observed in the campaign is built on Java 8, which was released in March 2014. The attackers are believed to be using custom JAR generators or templates to generate these artifacts. The NetSupport RAT payload is an older version of NetSupport Manager from October 2013.

“Bloody Wolf has demonstrated that low-cost, commercially available tools can be armed with sophisticated, regionally targeted cyber operations.” “By leveraging trust in government agencies and leveraging simple JAR-based loaders, the group continues to maintain a strong foothold across Central Asian threats.”

Share This Article
Twitter Copy Link
Previous Article Diablo 4 Challenger Last Epoch confirms arrival of paid DLC classes, Steam review hits hard Diablo 4 Challenger Last Epoch confirms arrival of paid DLC classes, Steam review hits hard
Next Article Pew poll reveals that U.S. Latinos remain dissatisfied with President Trump's policies Pew poll reveals that U.S. Latinos remain dissatisfied with President Trump’s policies

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Hackers are actively exploiting the 7-Zip symbolic link-based RCE vulnerability (CVE-2025-11001)
Technology

Hackers are actively exploiting the 7-Zip symbolic link-based RCE vulnerability (CVE-2025-11001)

2 Min Read
Samsung zero-click vulnerability exploited to deploy LANDFALL Android spyware via WhatsApp
Technology

Samsung zero-click vulnerability exploited to deploy LANDFALL Android spyware via WhatsApp

4 Min Read
Evolution of UTA0388 espionage malware
Technology

Evolution of UTA0388 espionage malware

5 Min Read
China-linked APT31 launches stealth cyber attack on Russian IT using cloud services
Technology

China-linked APT31 launches stealth cyber attack on Russian IT using cloud services

5 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?