Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hugging Face Repo with 200k Downloads Inst Trending Repository
May 11, 2026
GhostLock Attack Locks Files Via Windows Sharing Like Ransom
May 11, 2026
Hackers Deploy Trojanized ScreenConnect via Malicious JPEG
May 11, 2026
Home/Threats/Punishing Owl Hacker Group Targets Russian Security Agency
Threats

Punishing Owl Hacker Group Targets Russian Security Agency

A previously unknown hacktivist group, Punishing Owl, has launched sophisticated cyberattacks targeting Russian government security agencies. The group first surfaced on December 12, 2025, when it...

Sarah simpson
Sarah simpson
February 2, 2026 3 Min Read
4 0

A previously unknown hacktivist group, Punishing Owl, has launched sophisticated cyberattacks targeting Russian government security agencies.

The group first surfaced on December 12, 2025, when it announced the successful breach of a Russian government security agency’s network.

The attackers published stolen internal documents on a data leak site and duplicated the files on a Mega.nz repository, demonstrating their intention to maximize public exposure of the compromise.

The group employed multiple attack methods to amplify the impact of their operation. After gaining access to the victim’s DNS configuration, Punishing Owl created a subdomain and modified DNS records to redirect traffic to a server located in Brazil.

This server hosted the stolen files along with a political manifesto explaining their motives.

The attackers strategically chose Friday evening at 6:37 PM to announce the breach, timing calculated to delay response efforts and ensure maximum visibility of their activities.

The group's social media post (Source - Habr)
The group’s social media post (Source – Habr)

Following the initial breach, the group launched business email compromise attacks against the victim’s partners and contractors.

Habr analysts identified that Punishing Owl sent emails from a Brazilian server using addresses created within the victim’s email domain.

These messages falsely claimed to confirm the network compromise and included urgent requests to review attached documents.

The attack infrastructure revealed technical sophistication despite the group’s recent emergence.

DLS resource with victim files (Source - Habr)
DLS resource with victim files (Source – Habr)

Punishing Owl configured fake TLS certificates, established IMAP and SMTP services for email operations, and deployed the ZipWhisper PowerShell stealer to harvest browser credentials from infected systems.

The malicious emails contained password-protected ZIP archives with disguised LNK files that executed PowerShell commands, downloading the stealer from a command-and-control server at bloggoversikten[.]com.

Infection Mechanism and Credential Theft

The ZipWhisper stealer operates through a multi-stage infection process designed to extract sensitive browser data from compromised hosts.

When victims open the disguised LNK file, it silently executes PowerShell commands that download the stealer payload from the attacker’s infrastructure.

The malware then collects files containing web browser credentials, cookies, and saved passwords, packaging them into ZIP archives with specific naming patterns that include the username and chunk numbers.

Group manifesto (Source - Habr)
Group manifesto (Source – Habr)

These archives are stored temporarily in the AppData/Local/Temp directory before being uploaded to the command-and-control server through a customized endpoint structure.

Mimicry of the C2 domain (Source - Habr)
Mimicry of the C2 domain (Source – Habr)

Analysis of the stealer’s code revealed comments suggesting the possible use of AI tools to generate portions of the malicious script, indicating the group may be leveraging modern development techniques to accelerate their operations against Russian critical infrastructure targets.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachHackerMalwareSecurity

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Hackers Exploit Microsoft Office 0-day Exploiting Vulnerability

Next Post

DynoWiper Malware Wipes Data from Energy Companies

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Vidar Malware Steals Browser Credentials, Wallets &
May 11, 2026
JDownloader Hacked to Infect Users with New Python RAT
May 11, 2026
Top 10 Best Interactive Malware Analysis Tools for
May 11, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us