Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

0
Medium
Malwareremote
Published: Mon Feb 09 2026 (02/09/2026, 10:58:00 UTC)
Source: The Hacker News

Description

The threat actor known as Bloody Wolf has been linked to a campaign targeting Uzbekistan and Russia to infect systems with a remote access trojan known as NetSupport RAT. Cybersecurity vendor Kaspersky is tracking the activity under the moniker Stan Ghouls. The threat actor is known to be active since at least 2023, orchestrating spear-phishing attacks against manufacturing, finance, and IT

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/09/2026, 11:06:50 UTC

Technical Analysis

Bloody Wolf is a threat actor active since at least 2023, recently observed conducting spear-phishing campaigns targeting Uzbekistan and Russia, with collateral impacts in Kazakhstan, Turkey, Serbia, and Belarus. The primary malware used is NetSupport RAT, a legitimate remote administration tool abused to establish persistent remote access on compromised systems. Infection vectors involve spear-phishing emails containing malicious PDF attachments embedding links that download a multi-function loader. This loader enforces infection limits to avoid detection, displays fake error messages, downloads NetSupport RAT from external domains, and establishes persistence via autorun scripts, registry modifications, and scheduled tasks. The campaign targets diverse sectors including manufacturing, finance, IT, government, logistics, medical, and education, indicating broad strategic interest. Kaspersky’s tracking under the moniker Stan Ghouls highlights the actor’s focus on financial institutions, suggesting financial gain motives, but the heavy use of RATs also implies espionage objectives. Additionally, infrastructure linked to Bloody Wolf hosts Mirai botnet payloads, indicating potential IoT device exploitation. The group has shifted tactics from exploiting 1-day vulnerabilities to targeting contractors for initial access, reflecting increased operational sophistication. The campaign’s scale—over 60 victims—is notable for a targeted operation, underscoring significant resource investment. The threat actor’s activities coincide with other campaigns targeting Russian entities, involving credential theft, backdoors, rootkits, and ransomware, illustrating a complex threat landscape. The use of legitimate tools like NetSupport RAT complicates detection and response efforts.

Potential Impact

European organizations, particularly those with economic or political ties to Central Asia and Russia, may face indirect or direct risks from this campaign. The use of NetSupport RAT enables attackers to exfiltrate sensitive data, conduct espionage, and maintain long-term access, threatening confidentiality and integrity. Persistence mechanisms and multi-stage infection increase the difficulty of detection and remediation, potentially impacting availability through system manipulation or secondary payload deployment. The targeting of sectors such as finance, manufacturing, IT, government, and healthcare aligns with critical infrastructure and economic interests in Europe, raising concerns about supply chain and contractor-related vulnerabilities. The presence of Mirai botnet payloads suggests potential future attacks on IoT devices within European networks, which could disrupt operations or be leveraged in broader botnet activities. The campaign’s spear-phishing vector exploits human factors, making organizations with less mature security awareness programs particularly vulnerable. The evolving tactics of targeting contractors may expose European companies indirectly involved in supply chains or partnerships with affected regions. Overall, the threat poses a significant risk to data confidentiality, operational integrity, and network availability within European contexts.

Mitigation Recommendations

1. Implement advanced email security solutions capable of detecting and blocking spear-phishing emails, including sandboxing of PDF attachments and URL rewriting to prevent malicious link execution. 2. Conduct targeted security awareness training focusing on spear-phishing recognition, especially for employees in finance, manufacturing, IT, and contractor-facing roles. 3. Enforce strict application whitelisting and endpoint detection and response (EDR) solutions to identify and block unauthorized execution of NetSupport RAT and associated loaders. 4. Monitor for persistence mechanisms such as autorun scripts, registry autorun keys, and scheduled tasks related to NetSupport RAT and unusual batch script executions. 5. Conduct thorough security assessments and audits of contractors and third-party vendors to ensure they follow robust cybersecurity practices, reducing supply chain risks. 6. Deploy network segmentation to limit lateral movement in case of compromise and monitor outbound traffic for connections to known malicious domains associated with the campaign. 7. Regularly update and patch systems to reduce exposure to other vulnerabilities that could be exploited in conjunction with phishing attacks. 8. Utilize threat intelligence feeds to stay informed on indicators of compromise (IOCs) related to Bloody Wolf and NetSupport RAT campaigns. 9. Prepare incident response plans that include rapid containment and eradication procedures for RAT infections. 10. Investigate and secure IoT devices within the network to mitigate risks from Mirai botnet payloads potentially linked to the threat actor.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/bloody-wolf-targets-uzbekistan-russia.html","fetched":true,"fetchedAt":"2026-02-09T11:06:21.170Z","wordCount":1385}

Threat ID: 6989bfb04b57a58fa1460075

Added to database: 2/9/2026, 11:06:24 AM

Last enriched: 2/9/2026, 11:06:50 AM

Last updated: 3/27/2026, 4:44:53 AM

Views: 177

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses