Cavalry Werewolf hacker group attacks Russian state institutions
A Russian government organization was targeted by the Cavalry Werewolf hacker group, aiming to collect confidential information and network data. The attack began with phishing emails containing malware disguised as documents. The group utilized various tools including backdoors, trojans, and modified legitimate programs. They employed open-source software, reverse-shell backdoors, and Telegram API for control. The attackers focused on information gathering, network configuration, and establishing persistence in compromised systems. Their tactics included using Windows built-in tools, modifying the registry, and exploiting public directories for malware deployment. The group's sophisticated approach and diverse toolset highlight the evolving threat landscape for government institutions.
AI Analysis
Technical Summary
The Cavalry Werewolf hacker group conducted a targeted cyberattack against a Russian government organization aiming to exfiltrate confidential information and network data. The initial attack vector was phishing emails containing malicious documents designed to deploy malware. The group’s toolset is diverse and sophisticated, including various backdoors (reverse-shell, tunnel, proxy), trojans, and modified legitimate programs, many leveraging open-source software components. Command and control communications were conducted via the Telegram API, allowing covert control of compromised systems. The attackers utilized Windows built-in tools and techniques such as registry modifications to establish persistence and evade detection. They exploited public directories for malware deployment, indicating a focus on stealth and lateral movement within the network. The tactics align with MITRE ATT&CK techniques such as T1566.001 (phishing), T1547.001 (registry run keys), T1090.002 (proxy), and T1059 (command-line interface). The attack’s primary goal was information gathering and network infiltration rather than immediate disruption. No known public exploits are currently associated with this campaign, suggesting a custom or targeted approach. The medium severity rating reflects the moderate impact potential and the requirement for user interaction via phishing. The evolving sophistication of the group’s methods underscores the increasing threat to government institutions and critical infrastructure, with potential implications for similar organizations in Europe that share comparable technology stacks or geopolitical profiles.
Potential Impact
For European organizations, especially government agencies and critical infrastructure providers, the Cavalry Werewolf attack demonstrates a significant risk of targeted espionage and data theft. The use of phishing as an initial vector means that organizations with large user bases and complex networks are vulnerable to credential compromise and malware deployment. The attackers’ ability to establish persistence and conduct network reconnaissance can lead to prolonged undetected presence, increasing the risk of sensitive data exfiltration and potential lateral movement to other critical systems. The use of legitimate tools and open-source software complicates detection, potentially allowing attackers to bypass traditional security controls. European entities involved in geopolitical matters related to Russia or those using similar Windows-based infrastructure could face increased targeting. The impact includes loss of confidentiality, potential integrity compromises if attackers modify system configurations, and availability risks if attackers deploy disruptive payloads later. The threat also raises concerns about supply chain security and insider threats if attackers leverage compromised credentials. Overall, the attack could undermine trust in government digital services and disrupt critical operations if not mitigated effectively.
Mitigation Recommendations
European organizations should implement advanced phishing defense mechanisms including user training focused on recognizing sophisticated phishing attempts and sandboxing of email attachments. Deploy endpoint detection and response (EDR) solutions capable of identifying unusual registry modifications and the execution of uncommon Windows built-in tools. Network monitoring should focus on detecting anomalous outbound connections, particularly those involving Telegram API or reverse-shell communications. Restrict use of public directories for executable deployment and enforce strict access controls and application whitelisting to prevent unauthorized software execution. Regularly audit and harden registry run keys and scheduled tasks to detect persistence mechanisms. Employ threat hunting to identify indicators of compromise related to backdoors and trojans associated with this group. Incident response plans should include procedures for isolating infected systems and forensic analysis to understand attacker lateral movement. Collaboration with national cybersecurity agencies and sharing threat intelligence can improve detection and response capabilities. Finally, ensure all systems are updated with the latest security patches and consider network segmentation to limit attacker movement.
Affected Countries
Russia, Germany, France, United Kingdom, Poland, Ukraine, Estonia
Indicators of Compromise
- ip: 188.127.231.136
- ip: 94.198.52.210
- ip: 96.9.125.168
- hash: 078be0065d0277935cdcf7e3e9db4679
- hash: 087743415e1f6cc961e9d2bb6dfd6d51
- hash: 0f955d7844e146f2bd756c9ca8711263
- hash: 2195b5377ed94ac2ff6c3740b3cdefc3
- hash: 536a48917f823595b990f5b14b46e676
- hash: 9316dbdd91661e8eb8acf7b593bebab6
- hash: 9cb1af6b7f771011151747b34e617eb9
- hash: 9ea699b9854dde15babf260bed30efcc
- hash: b5cff6498b1ca4f8ddc98a9472a6216e
- hash: bfcb08bb5ac5196bc5d34f1d43079328
- hash: c14224290e43ce576c012dbf8cb037a9
- hash: c26e318f38dfd17a233b23a3ff80b5f4
- hash: c75665e77ffb3692c2400c3c8dd8276b
- hash: c8786d341ced4d4d5473d48681679492
- hash: cd46316aebc41e36790686f1ec1c39f0
- hash: cfc986362cccaf76288bddd94337cf2d
- hash: da487346483a0e208a16945a3f234e48
- hash: 1957fb36537df5d1a29fb7383bc7cde00cd88c77
- hash: 22641dea0dbe58e71f93615c208610f79d661228
- hash: 29ee3910d05e248cfb3ff62bd2e85e9c76db44a5
- hash: 451cfa10538bc572d9fd3d09758eb945ac1b9437
- hash: 5684972ded765b0b08b290c85c8fac8ed3fea273
- hash: 633885f16ef1e848a2e057169ab45d363f3f8c57
- hash: 653ffc8c3ec85c6210a416b92d828a28b2353c17
- hash: 6ec8a10a71518563e012f4d24499b12586128c55
- hash: 8279ad4a8ad20bf7bbca0fc54428d6cdc136b776
- hash: 93000d43d5c54b07b52efbdad3012e232bdb49cc
- hash: a2326011368d994e99509388cb3dc132d7c2053f
- hash: a5e7e75ee5c0fb82e4dc2f7617c1fe3240f21db2
- hash: b05c5fe8b206fb0d168f3a1fc91b0ed548eb46f5
- hash: b4d0d2bbcfc5a52ed8b05c756cfbfa96838af231
- hash: b52e1c9484ab694720dc62d501deca2aa922a078
- hash: baab225a50502a156222fcc234a87c09bc2b1647
- hash: bbe3a5ef79e996d9411c8320b879c5e31369921e
- hash: c89c1ed4b6dda8a00af54a0ab6dca0630eb45d81
- hash: c96beb026dc871256e86eca01e1f5ba2247a0df6
- hash: ce4912e5cd46fae58916c9ed49459c9232955302
- hash: d2106c8dfd0c681c27483a21cc72d746b2e5c18c
- hash: d2a7bcbf908507af3d7d3b0ae9dbaadd141810a4
- hash: dcd374105a5542ef5100f6034c805878153b1205
- hash: dd98dcf6807a7281e102307d61c71b7954b93032
- hash: e51a65f50b8bb3abf1b7f2f9217a24acfb3de618
- hash: e840c521ec436915da71eb9b0cfd56990f4e53e5
- hash: e8ab26b3141fbb410522b2cbabdc7e00a9a55251
- hash: f546861adc7c8ca88e3b302d274e6fffb63de9b0
- hash: 056e34ad8ed1e219fb29e04b8c17d72b6f2fbe4bc9d7c8e82f4a8a3249462cbc
- hash: 148a42ccaa97c2e2352dbb207f07932141d5290d4c3b57f61a780f9168783eda
- hash: 19bd1cee3800defcb8ca40e0187a160c1243a1c282084f9bd1e5c979b4729431
- hash: 22ba8c24f1aefc864490f70f503f709d2d980b9bc18fece4187152a1d9ca5fab
- hash: 3820a65ea7d478ffdcebf25a0413025e5d4a098024039d66e75e8cf14267ec2a
- hash: 484ab26ddb26d551147f293c8f4d9188a59c007d48a318933fd1171d10e6dd23
- hash: 4f17a7f8d2cec5c2206c3cba92967b4b499f0d223748d3b34f9ec4981461d288
- hash: 537c632851ba7bda9927062c592ec70eeafa3b089cafee539e5baff0d2e49e6f
- hash: 6b290953441b1c53f63f98863aae75bd8ea32996ab07976e498bad111d535252
- hash: 7084f06f2d8613dfe418b242c43060ae578e7166ce5aeed2904a8327cd98dbdf
- hash: a3ec2992e6416a3af54b3aca3417cf4a109866a07df7b5ec0ace7bd1bf73f3c6
- hash: ab0ad77a341b12cfc719d10e0fc45a6613f41b2b3f6ea963ee6572cf02b41f4d
- hash: af3d740c5b09c9a6237d5d54d78b5227cdaf60be89f48284b3386a3aadeb0283
- hash: cc84bfdb6e996b67d8bc812cf08674e8eca6906b53c98df195ed99ac5ec14a06
- hash: d59577c808e5fc0c67cfaf17fb64cd92c2ed4cb3b6c6bd7110836c8b4b856170
- hash: e695eafb035d9a54bf6b22bc27dbaad4c02cb4cd3011952e0ca77eb78e7c688c
- hash: fbf1bae3c576a6fcfa86db7c36a06c2530423d487441ad2c684cfeda5cd19685
- ip: 168.100.10.73
- ip: 185.173.37.67
- ip: 64.95.11.202
- ip: 77.232.42.107
- ip: 78.128.112.209
- ip: 89.22.161.133
- domain: sss.qwadx.com
Cavalry Werewolf hacker group attacks Russian state institutions
Description
A Russian government organization was targeted by the Cavalry Werewolf hacker group, aiming to collect confidential information and network data. The attack began with phishing emails containing malware disguised as documents. The group utilized various tools including backdoors, trojans, and modified legitimate programs. They employed open-source software, reverse-shell backdoors, and Telegram API for control. The attackers focused on information gathering, network configuration, and establishing persistence in compromised systems. Their tactics included using Windows built-in tools, modifying the registry, and exploiting public directories for malware deployment. The group's sophisticated approach and diverse toolset highlight the evolving threat landscape for government institutions.
AI-Powered Analysis
Technical Analysis
The Cavalry Werewolf hacker group conducted a targeted cyberattack against a Russian government organization aiming to exfiltrate confidential information and network data. The initial attack vector was phishing emails containing malicious documents designed to deploy malware. The group’s toolset is diverse and sophisticated, including various backdoors (reverse-shell, tunnel, proxy), trojans, and modified legitimate programs, many leveraging open-source software components. Command and control communications were conducted via the Telegram API, allowing covert control of compromised systems. The attackers utilized Windows built-in tools and techniques such as registry modifications to establish persistence and evade detection. They exploited public directories for malware deployment, indicating a focus on stealth and lateral movement within the network. The tactics align with MITRE ATT&CK techniques such as T1566.001 (phishing), T1547.001 (registry run keys), T1090.002 (proxy), and T1059 (command-line interface). The attack’s primary goal was information gathering and network infiltration rather than immediate disruption. No known public exploits are currently associated with this campaign, suggesting a custom or targeted approach. The medium severity rating reflects the moderate impact potential and the requirement for user interaction via phishing. The evolving sophistication of the group’s methods underscores the increasing threat to government institutions and critical infrastructure, with potential implications for similar organizations in Europe that share comparable technology stacks or geopolitical profiles.
Potential Impact
For European organizations, especially government agencies and critical infrastructure providers, the Cavalry Werewolf attack demonstrates a significant risk of targeted espionage and data theft. The use of phishing as an initial vector means that organizations with large user bases and complex networks are vulnerable to credential compromise and malware deployment. The attackers’ ability to establish persistence and conduct network reconnaissance can lead to prolonged undetected presence, increasing the risk of sensitive data exfiltration and potential lateral movement to other critical systems. The use of legitimate tools and open-source software complicates detection, potentially allowing attackers to bypass traditional security controls. European entities involved in geopolitical matters related to Russia or those using similar Windows-based infrastructure could face increased targeting. The impact includes loss of confidentiality, potential integrity compromises if attackers modify system configurations, and availability risks if attackers deploy disruptive payloads later. The threat also raises concerns about supply chain security and insider threats if attackers leverage compromised credentials. Overall, the attack could undermine trust in government digital services and disrupt critical operations if not mitigated effectively.
Mitigation Recommendations
European organizations should implement advanced phishing defense mechanisms including user training focused on recognizing sophisticated phishing attempts and sandboxing of email attachments. Deploy endpoint detection and response (EDR) solutions capable of identifying unusual registry modifications and the execution of uncommon Windows built-in tools. Network monitoring should focus on detecting anomalous outbound connections, particularly those involving Telegram API or reverse-shell communications. Restrict use of public directories for executable deployment and enforce strict access controls and application whitelisting to prevent unauthorized software execution. Regularly audit and harden registry run keys and scheduled tasks to detect persistence mechanisms. Employ threat hunting to identify indicators of compromise related to backdoors and trojans associated with this group. Incident response plans should include procedures for isolating infected systems and forensic analysis to understand attacker lateral movement. Collaboration with national cybersecurity agencies and sharing threat intelligence can improve detection and response capabilities. Finally, ensure all systems are updated with the latest security patches and consider network segmentation to limit attacker movement.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://news.drweb.com/show/?i=15078&lng=en&c=5"]
- Adversary
- Cavalry Werewolf
- Pulse Id
- 690db6c3db213f06f2b53533
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip188.127.231.136 | — | |
ip94.198.52.210 | — | |
ip96.9.125.168 | — | |
ip168.100.10.73 | — | |
ip185.173.37.67 | — | |
ip64.95.11.202 | — | |
ip77.232.42.107 | — | |
ip78.128.112.209 | — | |
ip89.22.161.133 | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash078be0065d0277935cdcf7e3e9db4679 | — | |
hash087743415e1f6cc961e9d2bb6dfd6d51 | — | |
hash0f955d7844e146f2bd756c9ca8711263 | — | |
hash2195b5377ed94ac2ff6c3740b3cdefc3 | — | |
hash536a48917f823595b990f5b14b46e676 | — | |
hash9316dbdd91661e8eb8acf7b593bebab6 | — | |
hash9cb1af6b7f771011151747b34e617eb9 | — | |
hash9ea699b9854dde15babf260bed30efcc | — | |
hashb5cff6498b1ca4f8ddc98a9472a6216e | — | |
hashbfcb08bb5ac5196bc5d34f1d43079328 | — | |
hashc14224290e43ce576c012dbf8cb037a9 | — | |
hashc26e318f38dfd17a233b23a3ff80b5f4 | — | |
hashc75665e77ffb3692c2400c3c8dd8276b | — | |
hashc8786d341ced4d4d5473d48681679492 | — | |
hashcd46316aebc41e36790686f1ec1c39f0 | — | |
hashcfc986362cccaf76288bddd94337cf2d | — | |
hashda487346483a0e208a16945a3f234e48 | — | |
hash1957fb36537df5d1a29fb7383bc7cde00cd88c77 | — | |
hash22641dea0dbe58e71f93615c208610f79d661228 | — | |
hash29ee3910d05e248cfb3ff62bd2e85e9c76db44a5 | — | |
hash451cfa10538bc572d9fd3d09758eb945ac1b9437 | — | |
hash5684972ded765b0b08b290c85c8fac8ed3fea273 | — | |
hash633885f16ef1e848a2e057169ab45d363f3f8c57 | — | |
hash653ffc8c3ec85c6210a416b92d828a28b2353c17 | — | |
hash6ec8a10a71518563e012f4d24499b12586128c55 | — | |
hash8279ad4a8ad20bf7bbca0fc54428d6cdc136b776 | — | |
hash93000d43d5c54b07b52efbdad3012e232bdb49cc | — | |
hasha2326011368d994e99509388cb3dc132d7c2053f | — | |
hasha5e7e75ee5c0fb82e4dc2f7617c1fe3240f21db2 | — | |
hashb05c5fe8b206fb0d168f3a1fc91b0ed548eb46f5 | — | |
hashb4d0d2bbcfc5a52ed8b05c756cfbfa96838af231 | — | |
hashb52e1c9484ab694720dc62d501deca2aa922a078 | — | |
hashbaab225a50502a156222fcc234a87c09bc2b1647 | — | |
hashbbe3a5ef79e996d9411c8320b879c5e31369921e | — | |
hashc89c1ed4b6dda8a00af54a0ab6dca0630eb45d81 | — | |
hashc96beb026dc871256e86eca01e1f5ba2247a0df6 | — | |
hashce4912e5cd46fae58916c9ed49459c9232955302 | — | |
hashd2106c8dfd0c681c27483a21cc72d746b2e5c18c | — | |
hashd2a7bcbf908507af3d7d3b0ae9dbaadd141810a4 | — | |
hashdcd374105a5542ef5100f6034c805878153b1205 | — | |
hashdd98dcf6807a7281e102307d61c71b7954b93032 | — | |
hashe51a65f50b8bb3abf1b7f2f9217a24acfb3de618 | — | |
hashe840c521ec436915da71eb9b0cfd56990f4e53e5 | — | |
hashe8ab26b3141fbb410522b2cbabdc7e00a9a55251 | — | |
hashf546861adc7c8ca88e3b302d274e6fffb63de9b0 | — | |
hash056e34ad8ed1e219fb29e04b8c17d72b6f2fbe4bc9d7c8e82f4a8a3249462cbc | — | |
hash148a42ccaa97c2e2352dbb207f07932141d5290d4c3b57f61a780f9168783eda | — | |
hash19bd1cee3800defcb8ca40e0187a160c1243a1c282084f9bd1e5c979b4729431 | — | |
hash22ba8c24f1aefc864490f70f503f709d2d980b9bc18fece4187152a1d9ca5fab | — | |
hash3820a65ea7d478ffdcebf25a0413025e5d4a098024039d66e75e8cf14267ec2a | — | |
hash484ab26ddb26d551147f293c8f4d9188a59c007d48a318933fd1171d10e6dd23 | — | |
hash4f17a7f8d2cec5c2206c3cba92967b4b499f0d223748d3b34f9ec4981461d288 | — | |
hash537c632851ba7bda9927062c592ec70eeafa3b089cafee539e5baff0d2e49e6f | — | |
hash6b290953441b1c53f63f98863aae75bd8ea32996ab07976e498bad111d535252 | — | |
hash7084f06f2d8613dfe418b242c43060ae578e7166ce5aeed2904a8327cd98dbdf | — | |
hasha3ec2992e6416a3af54b3aca3417cf4a109866a07df7b5ec0ace7bd1bf73f3c6 | — | |
hashab0ad77a341b12cfc719d10e0fc45a6613f41b2b3f6ea963ee6572cf02b41f4d | — | |
hashaf3d740c5b09c9a6237d5d54d78b5227cdaf60be89f48284b3386a3aadeb0283 | — | |
hashcc84bfdb6e996b67d8bc812cf08674e8eca6906b53c98df195ed99ac5ec14a06 | — | |
hashd59577c808e5fc0c67cfaf17fb64cd92c2ed4cb3b6c6bd7110836c8b4b856170 | — | |
hashe695eafb035d9a54bf6b22bc27dbaad4c02cb4cd3011952e0ca77eb78e7c688c | — | |
hashfbf1bae3c576a6fcfa86db7c36a06c2530423d487441ad2c684cfeda5cd19685 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainsss.qwadx.com | — |
Threat ID: 690dba651280f279b842fd52
Added to database: 11/7/2025, 9:22:45 AM
Last enriched: 11/7/2025, 9:23:48 AM
Last updated: 12/24/2025, 11:03:54 AM
Views: 197
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2025-12-23
MediumDissecting a Multi-Stage macOS Infostealer
MediumNew MacSync Stealer Disguised as Trusted Mac App Hunts Your Saved Passwords
Medium2025 Holiday Scams: Docusign Phishing Meets Loan Spam
MediumRansomware Hits Romanian Water Authority, 1000 Systems Knocked Offline
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.