Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Linus Torvalds Says AI Bug Reports Have Made Linux Security
May 18, 2026
Malicious npm Packages Steal SSH, Cloud & Crypto Four Keys
May 18, 2026
CISA Warns: Microsoft Exchange Vulnerability Exploited
May 18, 2026
Home/Threats/Bloody Wolf Hackers Deploy NetSupport RAT for Remote
Threats

Bloody Wolf Hackers Deploy NetSupport RAT for Remote

A sophisticated wave of targeted attacks has struck organizations across Russia and Uzbekistan, attributed to the cybercriminal group Stan Ghouls, also known as Bloody Wolf. Active since at least...

Sarah simpson
Sarah simpson
February 10, 2026 2 Min Read
7 0

A sophisticated wave of targeted attacks has struck organizations across Russia and Uzbekistan, attributed to the cybercriminal group Stan Ghouls, also known as Bloody Wolf.

Active since at least 2023, the group focuses heavily on the manufacturing, finance, and IT sectors. While they previously favored the STRRAT remote access trojan, their recent campaigns demonstrate a tactical shift toward misusing legitimate software.

By deploying the NetSupport Manager, a valid remote administration tool, they aim to blend in with authorized administrative activity, making detection significantly harder for defenders.

The attack chain invariably begins with highly targeted spear-phishing emails written in local languages like Uzbek. These communications masquerade as official government or legal notices to instill urgency.

Spear-phishing email from the latest campaign (Source - Securelist)
Spear-phishing email from the latest campaign (Source – Securelist)

Attached to these emails are malicious PDF files that contain links to the next stage of the attack. When victims click these links, they unknowingly initiate the download of a custom Java-based loader.

This loader acts as the bridge, fetching the final payload and establishing the attackers’ foothold within the compromised network.

Following the initial discovery of these intrusions, Securelist analysts identified distinct patterns in the group’s infrastructure.

The researchers noted that Bloody Wolf frequently refreshes its command-and-control domains, registering new ones for each specific campaign to evade blocklists.

This rapid rotation of infrastructure allows them to maintain a high rate of successful infections, with nearly sixty distinct victims identified in the latest wave alone.

The Infection Mechanism and Persistence

The most distinct aspect of this campaign is the behavior of the malicious loader once executed. To distract the victim, the malware immediately displays a fabricated error window.

Fake error message (Source - Securelist)
Fake error message (Source – Securelist)

The message falsely claims the application cannot run on the current operating system, tricking the user into believing the file was simply broken.

In reality, the loader is silently checking the environment and downloading the NetSupport RAT components from a remote server.

It even includes a check to terminate if it has failed to install three times, avoiding analysis by security sandboxes.

Once the files are in place, the malware aggressively establishes persistence using three redundant methods.

It drops a batch script named SoliqUZ_Run.bat into the Windows Startup folder, adds a launch command to the Registry’s Run key, and creates a scheduled task.

These mechanisms ensure the remote access tool executes automatically every time the user logs in.

To mitigate these threats, organizations must monitor for unauthorized remote desktop tools and scrutinize process executions from the Startup folder.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackHackerMalwarephishingSecurityThreat

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Augustus: Open-Source LLM Scanner Detects Vulnerability With

Next Post

AI Chat App Exposes 300 Million Messages from 25 Million Users

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Windows ‘MiniPlasma’ Zero-Day Grants SYSTEM Access
May 18, 2026
Critical WordPress Plugin Flaw Allows Authentication Bypass Attacks
May 18, 2026
Fast16 Malware Sabotaged Nuclear Weapons Simulation Data
May 18, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us