Bloody Wolf APT Expands to Central Asia, Deploys NetSupport RAT via Custom Java Droppers and Geo-Fencing

Bloody Wolf APT Expands to Central Asia, Deploys NetSupport RAT via Custom Java Droppers and Geo-Fencing

Bloody Wolf, an advanced persistent threat group, has expanded its operations across Central Asia, employing legitimate remote management tools to evade detection. Their sophisticated attack techniques include spear-phishing with official-looking documents and custom Java loaders to infect networks. #BloodyWolf #NetSupportRAT

Keypoints

  • Bloody Wolf has extended its cyber espionage activities to Kyrgyzstan and Uzbekistan.
  • The group now uses legitimate tools like NetSupport Manager to hide malicious activities.
  • Spear-phishing emails impersonate government agencies to deceive targets.
  • The attack infrastructure includes custom-made Java files and geo-fenced redirections.
  • Organizations should monitor for unauthorized use of remote administration software.

Read More: https://securityonline.info/bloody-wolf-apt-expands-to-central-asia-deploys-netsupport-rat-via-custom-java-droppers-and-geo-fencing/