Restless Spirit: New Attacks on Russian Companies
PhantomCore, a hacking group targeting Russian and Belarusian companies since 2022, launched a new wave of malicious email campaigns on January 19 and 21, 2026. The attacks targeted various sectors including utilities, finance, urban infrastructure, aerospace, consumer digital services, chemical industry, construction, consumer goods manufacturing, and e-commerce. The campaign used phishing emails with malicious attachments, leveraging compromised legitimate email addresses. The malware operates in multiple stages, including downloading decoy documents, executing PowerShell scripts, and establishing persistence through scheduled tasks. The second stage malware, similar to previously known PhantomCore.PollDL, communicates with command and control servers to receive and execute commands.
AI Analysis
Technical Summary
The Restless Spirit campaign represents a renewed wave of cyberattacks by the PhantomCore threat actor, which has been targeting Russian and Belarusian companies since 2022. In January 2026, PhantomCore deployed phishing emails containing malicious attachments sent from compromised legitimate email addresses, increasing the likelihood of successful delivery and user trust. The attack is multi-staged: initially, the malware downloads decoy documents to distract or mislead victims, then executes PowerShell scripts to perform malicious actions. Persistence is achieved through scheduled tasks (MITRE ATT&CK technique T1053.005), allowing the malware to maintain foothold even after reboots. The second stage malware resembles PhantomCore.PollDL, a known downloader that communicates with command and control (C2) servers to receive instructions and additional payloads, enabling flexible post-compromise operations. The campaign targets a broad range of sectors including utilities, finance, urban infrastructure, aerospace, consumer digital services, chemical industry, construction, consumer goods manufacturing, and e-commerce, indicating a strategic intent to disrupt critical and commercial infrastructure. Indicators of compromise include multiple file hashes, IP addresses, domains, and URLs associated with the malware infrastructure. The attack leverages common techniques such as phishing (T1566), PowerShell execution (T1059.001), scheduled tasks for persistence (T1053.005), and C2 communications (T1071). Despite the sophistication, no CVE or known exploits beyond phishing are reported, and the campaign is assessed as medium severity due to its targeted scope and reliance on user interaction.
Potential Impact
For European organizations, the direct impact of this campaign is currently limited as the primary targets are Russian and Belarusian companies. However, European entities with business relationships, supply chains, or digital interconnections to these regions could face collateral risks such as phishing emails leveraging compromised legitimate addresses or secondary infections via shared infrastructure. The sectors targeted—utilities, finance, aerospace, urban infrastructure, and manufacturing—are critical to economic stability and national security, and any successful compromise could lead to data theft, operational disruption, or espionage. The use of multi-stage malware with persistence mechanisms increases the difficulty of detection and eradication, potentially allowing attackers prolonged access to sensitive systems. Additionally, the campaign’s use of legitimate email accounts for phishing increases the risk of successful social engineering attacks in Europe if the threat actor expands targeting. The medium severity suggests moderate risk, but the evolving tactics and potential for lateral movement warrant vigilance among European organizations connected to the affected sectors or regions.
Mitigation Recommendations
European organizations should implement targeted defenses against phishing and multi-stage malware campaigns. Specifically, enhance email security by deploying advanced anti-phishing solutions capable of detecting spoofed or compromised legitimate addresses and malicious attachments. Employ strict attachment sandboxing and content disarm and reconstruction (CDR) technologies to neutralize embedded threats. Monitor and restrict PowerShell usage through application whitelisting and logging to detect anomalous script execution. Audit scheduled tasks regularly to identify unauthorized persistence mechanisms, and implement endpoint detection and response (EDR) tools to correlate suspicious behaviors such as decoy document downloads and C2 communications. Network segmentation and strict egress filtering can limit malware communication with external C2 servers. Conduct targeted user awareness training focusing on spear-phishing risks, especially regarding emails appearing from trusted internal or partner addresses. Finally, maintain up-to-date threat intelligence feeds to recognize indicators of compromise such as known hashes, IPs, and domains associated with PhantomCore campaigns.
Affected Countries
Russia, Belarus
Indicators of Compromise
- hash: c5ab1e0e94ed5bd12bac9ab35a8b67c1
- hash: 408fc048529e49cb30b0f912c8cb25e878f70b50
- hash: 8c6f238a7f94b510ba803506e8d128fa28dd89ca
- hash: b11ba850524c608df62b0e1b192d829975811ee9
- hash: be0340e41d580084221b75435c2f6390965c4b12
- hash: cbcfd3c45d91c5d0959f140d38f7902646a537aa
- hash: e1ac97a9f7c8fe460610321bb67445d7919dd50b
- hash: 81091ae754af253612f9d90329ec304568b5a1bad4083982449e9dadb2c630c2
- ip: 217.60.1.46
- ip: 217.60.5.116
- ip: 217.60.5.249
- ip: 217.60.60.18
- url: https://spareline.ru/wp‑includes/widgets/class‑wp‑widget‑index.html
- domain: metelkova.ru
- domain: mistralkorea.ru
- domain: nppntt.ru
- domain: shibargan.ru
- domain: spareline.ru
- domain: skbkp.tarusa.ru
- domain: npocable-s.ru
- domain: satnet-spb.ru
- domain: tk-luch.ru
- domain: ink-master.ru
- domain: www.act-print.ru
- domain: act-automation.ru
Restless Spirit: New Attacks on Russian Companies
Description
PhantomCore, a hacking group targeting Russian and Belarusian companies since 2022, launched a new wave of malicious email campaigns on January 19 and 21, 2026. The attacks targeted various sectors including utilities, finance, urban infrastructure, aerospace, consumer digital services, chemical industry, construction, consumer goods manufacturing, and e-commerce. The campaign used phishing emails with malicious attachments, leveraging compromised legitimate email addresses. The malware operates in multiple stages, including downloading decoy documents, executing PowerShell scripts, and establishing persistence through scheduled tasks. The second stage malware, similar to previously known PhantomCore.PollDL, communicates with command and control servers to receive and execute commands.
AI-Powered Analysis
Technical Analysis
The Restless Spirit campaign represents a renewed wave of cyberattacks by the PhantomCore threat actor, which has been targeting Russian and Belarusian companies since 2022. In January 2026, PhantomCore deployed phishing emails containing malicious attachments sent from compromised legitimate email addresses, increasing the likelihood of successful delivery and user trust. The attack is multi-staged: initially, the malware downloads decoy documents to distract or mislead victims, then executes PowerShell scripts to perform malicious actions. Persistence is achieved through scheduled tasks (MITRE ATT&CK technique T1053.005), allowing the malware to maintain foothold even after reboots. The second stage malware resembles PhantomCore.PollDL, a known downloader that communicates with command and control (C2) servers to receive instructions and additional payloads, enabling flexible post-compromise operations. The campaign targets a broad range of sectors including utilities, finance, urban infrastructure, aerospace, consumer digital services, chemical industry, construction, consumer goods manufacturing, and e-commerce, indicating a strategic intent to disrupt critical and commercial infrastructure. Indicators of compromise include multiple file hashes, IP addresses, domains, and URLs associated with the malware infrastructure. The attack leverages common techniques such as phishing (T1566), PowerShell execution (T1059.001), scheduled tasks for persistence (T1053.005), and C2 communications (T1071). Despite the sophistication, no CVE or known exploits beyond phishing are reported, and the campaign is assessed as medium severity due to its targeted scope and reliance on user interaction.
Potential Impact
For European organizations, the direct impact of this campaign is currently limited as the primary targets are Russian and Belarusian companies. However, European entities with business relationships, supply chains, or digital interconnections to these regions could face collateral risks such as phishing emails leveraging compromised legitimate addresses or secondary infections via shared infrastructure. The sectors targeted—utilities, finance, aerospace, urban infrastructure, and manufacturing—are critical to economic stability and national security, and any successful compromise could lead to data theft, operational disruption, or espionage. The use of multi-stage malware with persistence mechanisms increases the difficulty of detection and eradication, potentially allowing attackers prolonged access to sensitive systems. Additionally, the campaign’s use of legitimate email accounts for phishing increases the risk of successful social engineering attacks in Europe if the threat actor expands targeting. The medium severity suggests moderate risk, but the evolving tactics and potential for lateral movement warrant vigilance among European organizations connected to the affected sectors or regions.
Mitigation Recommendations
European organizations should implement targeted defenses against phishing and multi-stage malware campaigns. Specifically, enhance email security by deploying advanced anti-phishing solutions capable of detecting spoofed or compromised legitimate addresses and malicious attachments. Employ strict attachment sandboxing and content disarm and reconstruction (CDR) technologies to neutralize embedded threats. Monitor and restrict PowerShell usage through application whitelisting and logging to detect anomalous script execution. Audit scheduled tasks regularly to identify unauthorized persistence mechanisms, and implement endpoint detection and response (EDR) tools to correlate suspicious behaviors such as decoy document downloads and C2 communications. Network segmentation and strict egress filtering can limit malware communication with external C2 servers. Conduct targeted user awareness training focusing on spear-phishing risks, especially regarding emails appearing from trusted internal or partner addresses. Finally, maintain up-to-date threat intelligence feeds to recognize indicators of compromise such as known hashes, IPs, and domains associated with PhantomCore campaigns.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://habr.com/ru/companies/F6/articles/987734/"]
- Adversary
- PhantomCore
- Pulse Id
- 697349701703321b49a6437b
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashc5ab1e0e94ed5bd12bac9ab35a8b67c1 | — | |
hash408fc048529e49cb30b0f912c8cb25e878f70b50 | — | |
hash8c6f238a7f94b510ba803506e8d128fa28dd89ca | — | |
hashb11ba850524c608df62b0e1b192d829975811ee9 | — | |
hashbe0340e41d580084221b75435c2f6390965c4b12 | — | |
hashcbcfd3c45d91c5d0959f140d38f7902646a537aa | — | |
hashe1ac97a9f7c8fe460610321bb67445d7919dd50b | — | |
hash81091ae754af253612f9d90329ec304568b5a1bad4083982449e9dadb2c630c2 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip217.60.1.46 | — | |
ip217.60.5.116 | — | |
ip217.60.5.249 | — | |
ip217.60.60.18 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://spareline.ru/wp‑includes/widgets/class‑wp‑widget‑index.html | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainmetelkova.ru | — | |
domainmistralkorea.ru | — | |
domainnppntt.ru | — | |
domainshibargan.ru | — | |
domainspareline.ru | — | |
domainskbkp.tarusa.ru | — | |
domainnpocable-s.ru | — | |
domainsatnet-spb.ru | — | |
domaintk-luch.ru | — | |
domainink-master.ru | — | |
domainwww.act-print.ru | — | |
domainact-automation.ru | — |
Threat ID: 697352904623b1157c321206
Added to database: 1/23/2026, 10:50:56 AM
Last enriched: 1/23/2026, 11:05:20 AM
Last updated: 1/24/2026, 5:21:32 AM
Views: 22
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-01-23
MediumWatering Hole Attack Targets EmEditor Users With Information-Stealing Malware
MediumPhishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
MediumIn Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice
MediumTracking the VS Code Tasks Infection Vector
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.