Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails

0
Medium
Phishing
Published: Wed Dec 17 2025 (12/17/2025, 14:54:00 UTC)
Source: The Hacker News

Description

The threat actor linked to Operation ForumTroll has been attributed to a fresh set of phishing attacks targeting individuals within Russia, according to Kaspersky. The Russian cybersecurity vendor said it detected the new activity in October 2025. The origins of the threat actor are presently unknown. "While the spring cyberattacks focused on organizations, the fall campaign honed in on

AI-Powered Analysis

AILast updated: 12/17/2025, 16:21:09 UTC

Technical Analysis

The ForumTroll threat actor has launched a new phishing campaign detected in October 2025, targeting Russian scholars specializing in political science, international relations, and global economics at major Russian universities and research institutions. The attackers impersonate the Russian scientific electronic library eLibrary by registering a similar domain (e-library.wiki) six months prior to the campaign to avoid suspicion. They send personalized phishing emails from this domain, instructing recipients to download a plagiarism report via a one-time-use link. The downloaded ZIP archive is named with the victim's full name and contains a Windows shortcut (LNK) file that executes a PowerShell script. This script downloads and launches a PowerShell-based payload from a remote server, which then fetches a final-stage DLL payload. The DLL is persisted on the victim’s system using COM hijacking, a technique that hijacks Component Object Model registrations to maintain persistence stealthily. The payload, known as Tuoni, is a command-and-control and red teaming framework that provides remote access to the infected Windows device. The attackers also display a decoy PDF to avoid suspicion. This campaign follows earlier ForumTroll attacks that exploited a zero-day vulnerability in Google Chrome (CVE-2025-2783) to deliver the LeetAgent backdoor and Dante spyware implants. The current campaign focuses on individuals rather than organizations and demonstrates careful operational security, including domain aging and personalized targeting. The threat actor's origins remain unknown, but the group has been active since at least 2022, primarily targeting Russia and Belarus. The campaign's sophistication and targeting of academia suggest a strategic intelligence-gathering motive. Additionally, the report references other threat groups active in the region, such as QuietCrabs and Thor, which employ different tactics including ransomware and web shells, highlighting a complex threat landscape.

Potential Impact

For European organizations, particularly academic and research institutions with collaborations or connections to Russian scholars or institutions, this campaign poses a significant risk of espionage and intellectual property theft. The use of personalized phishing emails and sophisticated persistence mechanisms like COM hijacking increases the likelihood of successful compromise. Once infected, attackers gain remote access to victim machines, enabling data exfiltration, surveillance, and potential lateral movement within networks. The targeting of political science and international relations scholars could lead to the compromise of sensitive research and policy-related information. Although the campaign currently focuses on Russian and Belarusian targets, European entities with overlapping research interests or partnerships could be targeted in future iterations or related campaigns. The attack also demonstrates advanced social engineering and operational security, complicating detection and response efforts. The medium severity reflects the targeted nature and complexity, but the potential for significant confidentiality breaches and espionage impact is notable.

Mitigation Recommendations

European organizations should implement targeted user awareness training emphasizing the risks of spear-phishing, especially emails purporting to come from trusted academic or scientific sources. Monitoring for suspicious domains mimicking legitimate institutions (e.g., domain lookalikes) should be integrated into threat intelligence and email security solutions. Endpoint detection and response (EDR) tools must be tuned to detect unusual PowerShell activity, especially scripts launched via LNK files, and persistence techniques such as COM hijacking. Network monitoring should focus on detecting anomalous outbound connections to unknown command-and-control servers. Implement application whitelisting to restrict execution of unauthorized scripts and binaries. Multi-factor authentication (MFA) should be enforced on all remote access points to limit attacker lateral movement post-compromise. Incident response plans should include procedures for rapid containment and forensic analysis of phishing incidents. Collaboration with national cybersecurity centers and sharing of threat intelligence related to ForumTroll and similar APT groups will enhance preparedness. Finally, organizations should verify the authenticity of emails requesting downloads or sensitive actions by direct communication with the purported sender.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://thehackernews.com/2025/12/new-forumtroll-phishing-attacks-target.html","fetched":true,"fetchedAt":"2025-12-17T16:20:33.370Z","wordCount":1225}

Threat ID: 6942d853b2cbfb3efaac9c3c

Added to database: 12/17/2025, 4:20:35 PM

Last enriched: 12/17/2025, 4:21:09 PM

Last updated: 12/18/2025, 10:47:56 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats