Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Restless Spirit: New Attacks on Russian Companies

0
Medium
Published: Fri Jan 23 2026 (01/23/2026, 10:12:00 UTC)
Source: AlienVault OTX General

Description

PhantomCore, a hacking group targeting Russian and Belarusian companies since 2022, launched a new wave of malicious email campaigns on January 19 and 21, 2026. The attacks targeted various sectors including utilities, finance, urban infrastructure, aerospace, consumer digital services, chemical industry, construction, consumer goods manufacturing, and e-commerce. The campaign used phishing emails with malicious attachments, leveraging compromised legitimate email addresses. The malware operates in multiple stages, including downloading decoy documents, executing PowerShell scripts, and establishing persistence through scheduled tasks. The second stage malware, similar to previously known PhantomCore.PollDL, communicates with command and control servers to receive and execute commands.

AI-Powered Analysis

AILast updated: 01/23/2026, 11:05:20 UTC

Technical Analysis

The Restless Spirit campaign represents a renewed wave of cyberattacks by the PhantomCore threat actor, which has been targeting Russian and Belarusian companies since 2022. In January 2026, PhantomCore deployed phishing emails containing malicious attachments sent from compromised legitimate email addresses, increasing the likelihood of successful delivery and user trust. The attack is multi-staged: initially, the malware downloads decoy documents to distract or mislead victims, then executes PowerShell scripts to perform malicious actions. Persistence is achieved through scheduled tasks (MITRE ATT&CK technique T1053.005), allowing the malware to maintain foothold even after reboots. The second stage malware resembles PhantomCore.PollDL, a known downloader that communicates with command and control (C2) servers to receive instructions and additional payloads, enabling flexible post-compromise operations. The campaign targets a broad range of sectors including utilities, finance, urban infrastructure, aerospace, consumer digital services, chemical industry, construction, consumer goods manufacturing, and e-commerce, indicating a strategic intent to disrupt critical and commercial infrastructure. Indicators of compromise include multiple file hashes, IP addresses, domains, and URLs associated with the malware infrastructure. The attack leverages common techniques such as phishing (T1566), PowerShell execution (T1059.001), scheduled tasks for persistence (T1053.005), and C2 communications (T1071). Despite the sophistication, no CVE or known exploits beyond phishing are reported, and the campaign is assessed as medium severity due to its targeted scope and reliance on user interaction.

Potential Impact

For European organizations, the direct impact of this campaign is currently limited as the primary targets are Russian and Belarusian companies. However, European entities with business relationships, supply chains, or digital interconnections to these regions could face collateral risks such as phishing emails leveraging compromised legitimate addresses or secondary infections via shared infrastructure. The sectors targeted—utilities, finance, aerospace, urban infrastructure, and manufacturing—are critical to economic stability and national security, and any successful compromise could lead to data theft, operational disruption, or espionage. The use of multi-stage malware with persistence mechanisms increases the difficulty of detection and eradication, potentially allowing attackers prolonged access to sensitive systems. Additionally, the campaign’s use of legitimate email accounts for phishing increases the risk of successful social engineering attacks in Europe if the threat actor expands targeting. The medium severity suggests moderate risk, but the evolving tactics and potential for lateral movement warrant vigilance among European organizations connected to the affected sectors or regions.

Mitigation Recommendations

European organizations should implement targeted defenses against phishing and multi-stage malware campaigns. Specifically, enhance email security by deploying advanced anti-phishing solutions capable of detecting spoofed or compromised legitimate addresses and malicious attachments. Employ strict attachment sandboxing and content disarm and reconstruction (CDR) technologies to neutralize embedded threats. Monitor and restrict PowerShell usage through application whitelisting and logging to detect anomalous script execution. Audit scheduled tasks regularly to identify unauthorized persistence mechanisms, and implement endpoint detection and response (EDR) tools to correlate suspicious behaviors such as decoy document downloads and C2 communications. Network segmentation and strict egress filtering can limit malware communication with external C2 servers. Conduct targeted user awareness training focusing on spear-phishing risks, especially regarding emails appearing from trusted internal or partner addresses. Finally, maintain up-to-date threat intelligence feeds to recognize indicators of compromise such as known hashes, IPs, and domains associated with PhantomCore campaigns.

Affected Countries

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://habr.com/ru/companies/F6/articles/987734/"]
Adversary
PhantomCore
Pulse Id
697349701703321b49a6437b
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashc5ab1e0e94ed5bd12bac9ab35a8b67c1
hash408fc048529e49cb30b0f912c8cb25e878f70b50
hash8c6f238a7f94b510ba803506e8d128fa28dd89ca
hashb11ba850524c608df62b0e1b192d829975811ee9
hashbe0340e41d580084221b75435c2f6390965c4b12
hashcbcfd3c45d91c5d0959f140d38f7902646a537aa
hashe1ac97a9f7c8fe460610321bb67445d7919dd50b
hash81091ae754af253612f9d90329ec304568b5a1bad4083982449e9dadb2c630c2

Ip

ValueDescriptionCopy
ip217.60.1.46
ip217.60.5.116
ip217.60.5.249
ip217.60.60.18

Url

ValueDescriptionCopy
urlhttps://spareline.ru/wp‑includes/widgets/class‑wp‑widget‑index.html

Domain

ValueDescriptionCopy
domainmetelkova.ru
domainmistralkorea.ru
domainnppntt.ru
domainshibargan.ru
domainspareline.ru
domainskbkp.tarusa.ru
domainnpocable-s.ru
domainsatnet-spb.ru
domaintk-luch.ru
domainink-master.ru
domainwww.act-print.ru
domainact-automation.ru

Threat ID: 697352904623b1157c321206

Added to database: 1/23/2026, 10:50:56 AM

Last enriched: 1/23/2026, 11:05:20 AM

Last updated: 1/24/2026, 5:21:32 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats