Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Punishing Owl Attacks Russia: A New Owl in the Hacktivists' Forest

0
Medium
Published: Wed Feb 04 2026 (02/04/2026, 15:26:42 UTC)
Source: AlienVault OTX General

Description

A new hacking group called Punishing Owl has emerged, targeting Russian critical infrastructure. Their first attack on December 12, 2025, compromised a Russian state security agency, leaking internal documents. The group used DNS manipulation, created fake subdomains, and sent phishing emails to the victim's partners. They employed a PowerShell stealer called ZipWhisper to exfiltrate browser data. Punishing Owl's attacks are politically motivated and focus exclusively on Russian targets, including government agencies, scientific institutions, and IT organizations. The group has established a presence on cybercriminal forums and social media, likely operating from Kazakhstan. Experts predict this group will continue to be a persistent threat in the Russian cyberspace.

AI-Powered Analysis

AILast updated: 02/04/2026, 21:15:40 UTC

Technical Analysis

Punishing Owl is a newly identified hacktivist group that surfaced with an attack on December 12, 2025, targeting Russian critical infrastructure. Their first known operation compromised a Russian state security agency, resulting in the leak of internal documents. The group employs a multi-faceted attack chain beginning with DNS manipulation techniques, including the creation of fake subdomains to deceive victims and their partners. They conduct phishing campaigns targeting partners of their primary victims to gain initial access. Once inside, they deploy a PowerShell-based stealer malware called ZipWhisper, designed to exfiltrate sensitive browser data such as credentials, cookies, and session tokens. The attack techniques align with MITRE ATT&CK tactics including T1132.001 (Data from Information Repositories), T1204.002 (User Execution: Malicious File), T1566.002 and T1566.001 (Phishing), T1071 (Application Layer Protocol), T1005 (Data from Local System), T1555 (Credentials from Password Stores), T1589 (Gather Victim Identity Information), T1074 (Data Staged), T1584 (Compromise Infrastructure), T1102 (Web Service), and T1059.001 (PowerShell). The group appears politically motivated, focusing exclusively on Russian targets, and is likely operating from Kazakhstan based on their online footprint. They have established presence on cybercriminal forums and social media, indicating intent to remain persistent in the Russian cyber domain. There are no known public exploits or CVEs linked to their tools or techniques, and the threat is currently rated medium severity. Indicators of compromise include multiple file hashes related to their malware and tools. While the direct target is Russia, the use of phishing and DNS manipulation could pose indirect risks to European organizations connected to Russian entities or supply chains.

Potential Impact

For European organizations, the direct impact of Punishing Owl is currently limited as their operations focus exclusively on Russian targets. However, European entities with business relationships, partnerships, or supply chain connections to Russian government agencies, scientific institutions, or IT organizations could face indirect risks. These risks include phishing emails impersonating trusted partners, DNS manipulation affecting domain name resolution, and potential data leakage if compromised partners share sensitive information. Additionally, the use of PowerShell-based stealers like ZipWhisper highlights the risk of credential theft and session hijacking, which could be leveraged to pivot attacks into European networks if initial access is gained. The political motivation and persistence of the group suggest ongoing cyber espionage and disruption efforts that could escalate, especially in countries with strategic interests in Russian affairs or with significant Russian diaspora and business ties. The threat also underscores the importance of securing email and DNS infrastructure to prevent supply chain or partner-targeted attacks that could cascade into European organizations.

Mitigation Recommendations

European organizations should implement advanced DNS security measures such as DNSSEC to prevent DNS manipulation and spoofing. Monitoring DNS traffic for anomalies and unauthorized subdomain creation is critical. Strengthening email security by deploying robust anti-phishing solutions, including DMARC, DKIM, and SPF, will help detect and block phishing attempts impersonating partners. User awareness training focused on recognizing sophisticated phishing and social engineering tactics is essential. Deploy endpoint detection and response (EDR) solutions capable of detecting PowerShell abuse and anomalous script execution to identify and block tools like ZipWhisper. Implement strict credential management policies, including multi-factor authentication (MFA) for all remote and partner access, and monitor for unusual authentication patterns. Regularly audit and restrict PowerShell usage to only authorized administrators and scripts. Establish strong network segmentation to limit lateral movement if compromise occurs. Collaborate with partners and supply chain entities to share threat intelligence and ensure their security posture aligns with best practices. Finally, maintain up-to-date incident response plans that include scenarios involving DNS manipulation and credential theft.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://habr.com/ru/companies/pt/articles/990374"]
Adversary
Punishing Owl
Pulse Id
698365328fd4c9202353787c
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash07807a7da277184539e35126f1ab3bae
hash33c78c7126ae56040f04de4df4139acb
hash5db00ab3e6875c14cf550b1e7c664310
hash8027ca72007f5b4a270ab8230c7b5bf5
hash99ed9a3126f72ec70975a3d6246130e0
hashb72c550737ef4fbf74b529d1a1b33569
hashbbf0b95372c89eada433b41eeef5f761
hash64f1a24f2f81632329e84a30b15ca8a74b5478c3
hash83fdfe08206a05c85833873576653d0802883d9e
hash85a8d1b54b294a01089948573fce7c0059b8b2b1
hash8deffa9765915a57e9679f4481dac43dabbbcecd
hasha82eb95e60f084c261f88d60aff1cee30602552f
hashd10818d99a616720f6d061b95659d34bbc575821
hashd24e8f21cbe4dcd573aaa914c41df8609c5d3f47
hash09636fbca343f268ee7c0c033e37a9b007fe40ce914c4273ed961d84b52bed17
hash37f307b378c028afa67a236a05224e367ed486ab3ab2f7c3e13518d0823e137d
hash6aa09062a755775e1b11dfd5fa80981fa50e1ecf4ba3f1ae41b2ed8b671e0f6a
hash94b93f4540f01956895a74d2c0b54e502f2be299e4d2ea0a3cc639619377f229
hashb1782f8f3440ce4b184f27c4047439aa998058ec17319a5b08031eda545d5a50
hashdfd49ea1911fb7e800440c82b6518828ec7fa7c595d7ea6baabec29e5d9cecec
hashf25506f5a7f3580edae159bbdbca3f8d17dfeeaadcc548c8202a764399550778

Threat ID: 6983b358f9fa50a62fac6fac

Added to database: 2/4/2026, 9:00:08 PM

Last enriched: 2/4/2026, 9:15:40 PM

Last updated: 2/5/2026, 9:08:57 PM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats