Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

ForumTroll targets political scientists | Kaspersky official blog

0
Medium
Vulnerability
Published: Wed Dec 17 2025 (12/17/2025, 10:58:51 UTC)
Source: Kaspersky Security Blog

Description

The ForumTroll APT group is sending malicious emails to political scientists, imitating reports of plagiarism.

AI-Powered Analysis

AILast updated: 01/10/2026, 00:25:59 UTC

Technical Analysis

The ForumTroll APT group has launched a targeted spear-phishing campaign aimed at political scientists and researchers, particularly those affiliated with Russian universities and institutions specializing in political science, international relations, and global economics. The attackers send emails from a spoofed domain (support@e-library.wiki) mimicking the legitimate Russian scientific electronic library elibrary.ru. These emails contain personalized links to purported plagiarism reports, designed to entice recipients to download an archive file. The archive includes a malicious .lnk shortcut file and a .Thumbs directory with images to evade security detection. When the victim clicks the .lnk file on a Windows machine, a PowerShell script executes, initiating a multi-stage infection. The payload installs the commercial Tuoni red team framework, which provides attackers with remote access capabilities and persistence through COM hijacking. A decoy PDF report, vaguely related to plagiarism detection, is displayed to distract the victim. The attackers also serve a near-identical copy of the legitimate e-library website to increase the email's credibility. The campaign leverages social engineering by personalizing filenames and email content with the victim's full name. The malware is currently detected and blocked by Kaspersky security products, and no known exploits are reported in the wild beyond this campaign. The attack requires user interaction (clicking the malicious link) and targets a narrow group of individuals, indicating a focused espionage or intelligence-gathering motive. The campaign demonstrates advanced evasion and persistence techniques, including COM hijacking and decoy document display, to maintain stealth and prolonged access.

Potential Impact

For European organizations, especially academic and research institutions involved in political science, international relations, or global economics, this threat poses a significant risk of espionage and intellectual property theft. Successful compromise could lead to unauthorized remote access, data exfiltration, and manipulation of sensitive research data. The use of personalized social engineering tactics increases the likelihood of successful infection among targeted individuals. Persistent access via COM hijacking complicates detection and remediation efforts. Although the campaign currently targets Russian institutions, the tactics and malware framework could be adapted to target European researchers, potentially impacting confidentiality and integrity of sensitive political research. The attack could also undermine trust in academic communications and electronic libraries. Additionally, if attackers pivot from compromised machines, they could threaten broader organizational networks. The medium severity reflects the targeted nature and requirement for user interaction but acknowledges the potential for significant damage if successful.

Mitigation Recommendations

European organizations should implement multi-layered defenses tailored to targeted spear-phishing threats. Specifically, deploy advanced email security gateways capable of detecting and blocking spoofed domains and malicious attachments, including .lnk files and archives with embedded scripts. Enforce strict attachment filtering policies and disable execution of PowerShell scripts from email downloads unless explicitly required and monitored. Employ endpoint detection and response (EDR) solutions with behavioral analysis to identify and quarantine suspicious activities such as COM hijacking and unauthorized remote access framework installations. Conduct targeted user awareness training for researchers and staff on recognizing spear-phishing attempts, especially those involving personalized content and academic themes like plagiarism reports. Regularly audit and restrict PowerShell usage and script execution policies on endpoints. Maintain up-to-date threat intelligence feeds to detect emerging APT tactics and indicators of compromise related to ForumTroll. Finally, implement network segmentation to limit lateral movement from compromised hosts and ensure robust incident response plans are in place to quickly isolate and remediate infections.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://www.kaspersky.com/blog/forumtroll-hunts-for-political-scientists/55052/","fetched":true,"fetchedAt":"2025-12-17T11:06:48.402Z","wordCount":884}

Threat ID: 69428ec8034dcf49503b045e

Added to database: 12/17/2025, 11:06:48 AM

Last enriched: 1/10/2026, 12:25:59 AM

Last updated: 2/7/2026, 7:33:17 AM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats