Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Grafana Labs Security Breach: Hackers Accessed GitHub Code
May 17, 2026
First Public macOS M5 Kernel Exploit Developed Apple Prepared
May 17, 2026
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
Home/Threats/Vortex Werewolf Attacking Organizations to Gain Tor-Enabled Remote
Threats

Vortex Werewolf Attacking Organizations to Gain Tor-Enabled Remote

A new cyber espionage cluster has recently emerged, aggressively targeting Russian government and defense organizations. Active since at least December 2025, the group, designated as Vortex Werewolf,...

David kimber
David kimber
February 9, 2026 3 Min Read
6 0

A new cyber espionage cluster has recently emerged, aggressively targeting Russian government and defense organizations.

Active since at least December 2025, the group, designated as Vortex Werewolf, employs a combination of social engineering and legitimate software utilities to breach secure networks.

Their primary objective appears to be establishing persistent, covert remote access to sensitive systems using anonymized protocols.

The attacks typically commence with phishing emails that deceive recipients into interacting with malicious links.

These lures mimic legitimate file-sharing notifications, often disguised as Telegram or other trusted services.

Once a victim engages with the bait, the infection chain initiates, leading to the deployment of tools designed to bypass standard network defenses.

The malware facilitates unauthorized control by configuring remote desktop and file transfer protocols to route traffic through the Tor network.

BI.ZONE researchers identified this activity cluster in early 2026, highlighting the group’s unique operational methods.

While sharing some behavioral similarities with other threat actors like Core Werewolf, this adversary utilizes specific obfuscation bridges for command and control communications.

Confirmation code prompt on phishing page (Source - Medium)
Confirmation code prompt on phishing page (Source – Medium)

The impact of a successful breach is significant, as it grants attackers the ability to execute commands and transfer files via RDP, SMB, SFTP, and SSH, all while remaining hidden behind Tor Hidden Services.

To maintain their foothold within compromised environments, the attackers implement persistence mechanisms that survive system reboots.

The malware creates scheduled tasks within the Windows operating system to ensure that the Tor client and the SSH server launch automatically.

This setup allows the threat actors to retain long-term access to the victim’s infrastructure, enabling them to exfiltrate data or pivot to other critical systems at will without triggering immediate alarms.

Infection Mechanism and Phishing Tactics

The infection process is characterized by a high degree of social engineering sophistication designed to steal user credentials before delivering the payload.

HTML code of phishing page (Source - Medium)
HTML code of phishing page (Source – Medium)

When a user clicks the initial phishing link, they are directed to a fraudulent webpage that convincingly replicates the interface of a Telegram file download portal.

This site prompts the victim to enter their phone number and the subsequent login confirmation code, effectively hijacking their active session.

Upon successfully capturing the victim’s session data, the phishing page redirects the user to a legitimate file hosting service, such as Dropbox, to download a malicious ZIP archive.

Successful user authentication and file download notice (Source - Medium)
Successful user authentication and file download notice (Source – Medium)

This archive contains a deceptive LNK file which, when executed, triggers a PowerShell script. This script performs checks to evade sandbox environments before installing the Tor and OpenSSH components required for the encrypted command tunnel.

Organizations are advised to implement robust email filtering solutions that utilize machine learning to detect spoofed links and phishing anomalies.

Security teams should strictly verify the destination of all incoming URLs and block traffic to known malicious domains.

Furthermore, continuous monitoring of network logs for unauthorized Tor or SSH connections is essential for early threat detection.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachMalwarephishingSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Critical FortiClientEMS Flaw Allows Remote Code Execution

Next Post

RecoverIt Exploits Windows Service Recovery to Execute Payload

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
May 16, 2026
Google Project Zero Reveals Pixel 10 Zero- Discloses Zero-Click
May 16, 2026
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us