New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails
The threat actor linked to Operation ForumTroll has been attributed to a fresh set of phishing attacks targeting individuals within Russia, according to Kaspersky. The Russian cybersecurity vendor said it detected the new activity in October 2025. The origins of the threat actor are presently unknown. "While the spring cyberattacks focused on organizations, the fall campaign honed in on
AI Analysis
Technical Summary
The ForumTroll threat actor has launched a new phishing campaign detected in October 2025, targeting Russian scholars specializing in political science, international relations, and global economics at major Russian universities and research institutions. The attackers impersonate the Russian scientific electronic library eLibrary by registering a similar domain (e-library.wiki) six months prior to the campaign to avoid suspicion. They send personalized phishing emails from this domain, instructing recipients to download a plagiarism report via a one-time-use link. The downloaded ZIP archive is named with the victim's full name and contains a Windows shortcut (LNK) file that executes a PowerShell script. This script downloads and launches a PowerShell-based payload from a remote server, which then fetches a final-stage DLL payload. The DLL is persisted on the victim’s system using COM hijacking, a technique that hijacks Component Object Model registrations to maintain persistence stealthily. The payload, known as Tuoni, is a command-and-control and red teaming framework that provides remote access to the infected Windows device. The attackers also display a decoy PDF to avoid suspicion. This campaign follows earlier ForumTroll attacks that exploited a zero-day vulnerability in Google Chrome (CVE-2025-2783) to deliver the LeetAgent backdoor and Dante spyware implants. The current campaign focuses on individuals rather than organizations and demonstrates careful operational security, including domain aging and personalized targeting. The threat actor's origins remain unknown, but the group has been active since at least 2022, primarily targeting Russia and Belarus. The campaign's sophistication and targeting of academia suggest a strategic intelligence-gathering motive. Additionally, the report references other threat groups active in the region, such as QuietCrabs and Thor, which employ different tactics including ransomware and web shells, highlighting a complex threat landscape.
Potential Impact
For European organizations, particularly academic and research institutions with collaborations or connections to Russian scholars or institutions, this campaign poses a significant risk of espionage and intellectual property theft. The use of personalized phishing emails and sophisticated persistence mechanisms like COM hijacking increases the likelihood of successful compromise. Once infected, attackers gain remote access to victim machines, enabling data exfiltration, surveillance, and potential lateral movement within networks. The targeting of political science and international relations scholars could lead to the compromise of sensitive research and policy-related information. Although the campaign currently focuses on Russian and Belarusian targets, European entities with overlapping research interests or partnerships could be targeted in future iterations or related campaigns. The attack also demonstrates advanced social engineering and operational security, complicating detection and response efforts. The medium severity reflects the targeted nature and complexity, but the potential for significant confidentiality breaches and espionage impact is notable.
Mitigation Recommendations
European organizations should implement targeted user awareness training emphasizing the risks of spear-phishing, especially emails purporting to come from trusted academic or scientific sources. Monitoring for suspicious domains mimicking legitimate institutions (e.g., domain lookalikes) should be integrated into threat intelligence and email security solutions. Endpoint detection and response (EDR) tools must be tuned to detect unusual PowerShell activity, especially scripts launched via LNK files, and persistence techniques such as COM hijacking. Network monitoring should focus on detecting anomalous outbound connections to unknown command-and-control servers. Implement application whitelisting to restrict execution of unauthorized scripts and binaries. Multi-factor authentication (MFA) should be enforced on all remote access points to limit attacker lateral movement post-compromise. Incident response plans should include procedures for rapid containment and forensic analysis of phishing incidents. Collaboration with national cybersecurity centers and sharing of threat intelligence related to ForumTroll and similar APT groups will enhance preparedness. Finally, organizations should verify the authenticity of emails requesting downloads or sensitive actions by direct communication with the purported sender.
Affected Countries
Russia, Belarus, Germany, France, United Kingdom, Poland, Italy
New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails
Description
The threat actor linked to Operation ForumTroll has been attributed to a fresh set of phishing attacks targeting individuals within Russia, according to Kaspersky. The Russian cybersecurity vendor said it detected the new activity in October 2025. The origins of the threat actor are presently unknown. "While the spring cyberattacks focused on organizations, the fall campaign honed in on
AI-Powered Analysis
Technical Analysis
The ForumTroll threat actor has launched a new phishing campaign detected in October 2025, targeting Russian scholars specializing in political science, international relations, and global economics at major Russian universities and research institutions. The attackers impersonate the Russian scientific electronic library eLibrary by registering a similar domain (e-library.wiki) six months prior to the campaign to avoid suspicion. They send personalized phishing emails from this domain, instructing recipients to download a plagiarism report via a one-time-use link. The downloaded ZIP archive is named with the victim's full name and contains a Windows shortcut (LNK) file that executes a PowerShell script. This script downloads and launches a PowerShell-based payload from a remote server, which then fetches a final-stage DLL payload. The DLL is persisted on the victim’s system using COM hijacking, a technique that hijacks Component Object Model registrations to maintain persistence stealthily. The payload, known as Tuoni, is a command-and-control and red teaming framework that provides remote access to the infected Windows device. The attackers also display a decoy PDF to avoid suspicion. This campaign follows earlier ForumTroll attacks that exploited a zero-day vulnerability in Google Chrome (CVE-2025-2783) to deliver the LeetAgent backdoor and Dante spyware implants. The current campaign focuses on individuals rather than organizations and demonstrates careful operational security, including domain aging and personalized targeting. The threat actor's origins remain unknown, but the group has been active since at least 2022, primarily targeting Russia and Belarus. The campaign's sophistication and targeting of academia suggest a strategic intelligence-gathering motive. Additionally, the report references other threat groups active in the region, such as QuietCrabs and Thor, which employ different tactics including ransomware and web shells, highlighting a complex threat landscape.
Potential Impact
For European organizations, particularly academic and research institutions with collaborations or connections to Russian scholars or institutions, this campaign poses a significant risk of espionage and intellectual property theft. The use of personalized phishing emails and sophisticated persistence mechanisms like COM hijacking increases the likelihood of successful compromise. Once infected, attackers gain remote access to victim machines, enabling data exfiltration, surveillance, and potential lateral movement within networks. The targeting of political science and international relations scholars could lead to the compromise of sensitive research and policy-related information. Although the campaign currently focuses on Russian and Belarusian targets, European entities with overlapping research interests or partnerships could be targeted in future iterations or related campaigns. The attack also demonstrates advanced social engineering and operational security, complicating detection and response efforts. The medium severity reflects the targeted nature and complexity, but the potential for significant confidentiality breaches and espionage impact is notable.
Mitigation Recommendations
European organizations should implement targeted user awareness training emphasizing the risks of spear-phishing, especially emails purporting to come from trusted academic or scientific sources. Monitoring for suspicious domains mimicking legitimate institutions (e.g., domain lookalikes) should be integrated into threat intelligence and email security solutions. Endpoint detection and response (EDR) tools must be tuned to detect unusual PowerShell activity, especially scripts launched via LNK files, and persistence techniques such as COM hijacking. Network monitoring should focus on detecting anomalous outbound connections to unknown command-and-control servers. Implement application whitelisting to restrict execution of unauthorized scripts and binaries. Multi-factor authentication (MFA) should be enforced on all remote access points to limit attacker lateral movement post-compromise. Incident response plans should include procedures for rapid containment and forensic analysis of phishing incidents. Collaboration with national cybersecurity centers and sharing of threat intelligence related to ForumTroll and similar APT groups will enhance preparedness. Finally, organizations should verify the authenticity of emails requesting downloads or sensitive actions by direct communication with the purported sender.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/12/new-forumtroll-phishing-attacks-target.html","fetched":true,"fetchedAt":"2025-12-17T16:20:33.370Z","wordCount":1225}
Threat ID: 6942d853b2cbfb3efaac9c3c
Added to database: 12/17/2025, 4:20:35 PM
Last enriched: 12/17/2025, 4:21:09 PM
Last updated: 12/18/2025, 10:47:56 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign
MediumPhishing in Telegram Mini Apps: how to avoid taking the bait | Kaspersky official blog
MediumPhantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector
MediumNew Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
MediumWhere does the data stolen in a phishing attack go? | Kaspersky official blog
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.