• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
TechTrendFeed
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT
No Result
View All Result
TechTrendFeed
No Result
View All Result

Noisy Bear Targets Kazakhstan Vitality Sector With BarrelFire Phishing Marketing campaign

Admin by Admin
September 7, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


A risk actor probably of Russian origin has been attributed to a brand new set of assaults concentrating on the power sector in Kazakhstan.

The exercise, codenamed Operation BarrelFire, is tied to a brand new risk group tracked by Seqrite Labs as Noisy Bear. The risk actor has been lively since a minimum of April 2025.

“The marketing campaign is focused in direction of workers of KazMunaiGas or KMG the place the risk entity delivered a faux doc associated to the KMG IT division, mimicking official inside communication and leveraging themes corresponding to coverage updates, inside certification procedures, and wage changes,” safety researcher Subhajeet Singha stated.

The an infection chain begins with a phishing electronic mail containing a ZIP attachment, which features a Home windows shortcut (LNK) downloader, a decoy doc associated to KazMunaiGas, and a README.txt file with directions written in each Russian and Kazakh to run a program named “KazMunayGaz_Viewer.”

The e-mail, per the cybersecurity firm, was despatched from a compromised electronic mail deal with of a person working within the finance division of KazMunaiGas and focused different workers of the agency in Might 2025.

The LNK file payload is designed to drop further payloads, together with a malicious batch script that paves the best way for a PowerShell loader dubbed DOWNSHELL. The assaults culminate with the deployment of a DLL-based implant, a 64-bit binary that may run shellcode to launch a reverse shell.

Audit and Beyond

Additional evaluation of the risk actor’s infrastructure has revealed that it is hosted on the Russia-based bulletproof internet hosting (BPH) service supplier Aeza Group, which was sanctioned by the U.S. in July 2025 for enabling malicious actions.

The event comes as HarfangLab linked a Belarus-aligned risk actor generally known as Ghostwriter (aka FrostyNeighbor or UNC1151) to campaigns concentrating on Ukraine and Poland since April 2025 with rogue ZIP and RAR archives which are geared toward gathering details about compromised programs and deploying implants for additional exploitation.

“These archives comprise XLS spreadsheets with a VBA macro that drops and hundreds a DLL,” the French cybersecurity firm stated. “The latter is answerable for gathering details about the compromised system and retrieving next-stage malware from a command-and-control (C2) server.”

Subsequent iterations of the marketing campaign have been discovered to jot down a Microsoft Cupboard (CAB) file together with the LNK shortcut to extract and run the DLL from the archive. The DLL then proceeds to conduct preliminary reconnaissance earlier than dropping the next-stage malware from the exterior server.

The assaults concentrating on Poland, however, tweak the assault chain to make use of Slack as a beaconing mechanism and knowledge exfiltration channel, downloading in return a second-stage payload that establishes contact with the area pesthacks[.]icu.

At the very least in a single occasion, the DLL dropped via the macro-laced Excel spreadsheet is used to load a Cobalt Strike Beacon to facilitate additional post-exploitation exercise.

“These minor modifications counsel that UAC-0057 could also be exploring options, in a possible try to work round detection, however prioritizes the continuity or improvement of its operations over stealthiness and class,” HarfangLab stated.

Cyber Assaults Reported Towards Russia

The findings come amid OldGremlin’s renewed extortion assaults on Russian corporations within the first half of 2025, concentrating on as many as eight massive home industrial enterprises utilizing phishing electronic mail campaigns.

The intrusions, per Kaspersky, concerned the usage of the convey your individual susceptible driver (BYOVD) approach to disable safety options on victims’ computer systems and the official Node.js interpreter to execute malicious scripts.

Phishing assaults geared toward Russia have additionally delivered a brand new info stealer referred to as Phantom Stealer, which relies on an open-source stealer codenamed Stealerium, to gather a variety of delicate info utilizing electronic mail baits associated to grownup content material and funds. It additionally shares overlaps with one other Stealerium offshoot generally known as Warp Stealer.

In response to F6, Phantom Stealer additionally inherits Stealerium’s “PornDetector” module that captures webcam screenshots when customers go to pornographic web sites by holding tabs on the lively browser window and whether or not the title features a configurable record of phrases like porn, and intercourse, amongst others.

CIS Build Kits

“That is doubtless later used for ‘sextortion,'” Proofpoint stated in its personal evaluation of the malware. “Whereas this function shouldn’t be novel amongst cybercrime malware, it’s not typically noticed.”

In current months, Russian organizations have additionally been on the receiving finish of assaults perpetrated by hacking teams tracked as Cloud Atlas, PhantomCore, and Scaly Wolf to reap delicate info and ship further payloads utilizing malware households corresponding to VBShower, PhantomRAT, and PhantomRShell.

One other cluster of exercise includes a brand new Android malware that masquerades as an antivirus instrument created by Russia’s Federal Safety Providers company (FSB) to single out representatives of Russian companies. The apps carry names like SECURITY_FSB, ФСБ (Russian for FSB), and GuardCB, the final of which is an try to go off because the Central Financial institution of the Russian Federation.

First found in January 2025, the malware exfiltrates knowledge from messenger and browser apps, stream from the telephone’s digicam, and log keystrokes by searching for intensive permissions to entry SMS messages, location, audio, digicam. It additionally requests for operating within the background, machine administrator rights, and accessibility companies.

“The app’s interface supplies just one language – Russian,” Physician Net stated. “Thus, the malware is totally centered on Russian customers. The backdoor additionally makes use of accessibility companies to guard itself from being deleted if it receives the corresponding command from the risk actors.”

Tags: BarrelFireBearCampaignenergyKazakhstanNoisyPhishingsectortargets
Admin

Admin

Next Post
One-Dimension-Suits-All: Why Bringing Your Information Sources Collectively Unlocks Higher Worth, Productiveness, & Progress

One-Dimension-Suits-All: Why Bringing Your Information Sources Collectively Unlocks Higher Worth, Productiveness, & Progress

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Trending.

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

Safety Amplified: Audio’s Affect Speaks Volumes About Preventive Safety

May 18, 2025
Reconeyez Launches New Web site | SDM Journal

Reconeyez Launches New Web site | SDM Journal

May 15, 2025
Apollo joins the Works With House Assistant Program

Apollo joins the Works With House Assistant Program

May 17, 2025
Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

Discover Vibrant Spring 2025 Kitchen Decor Colours and Equipment – Chefio

May 17, 2025
Flip Your Toilet Right into a Good Oasis

Flip Your Toilet Right into a Good Oasis

May 15, 2025

TechTrendFeed

Welcome to TechTrendFeed, your go-to source for the latest news and insights from the world of technology. Our mission is to bring you the most relevant and up-to-date information on everything tech-related, from machine learning and artificial intelligence to cybersecurity, gaming, and the exciting world of smart home technology and IoT.

Categories

  • Cybersecurity
  • Gaming
  • Machine Learning
  • Smart Home & IoT
  • Software
  • Tech News

Recent News

Streamline entry to ISO-rating content material modifications with Verisk ranking insights and Amazon Bedrock

Streamline entry to ISO-rating content material modifications with Verisk ranking insights and Amazon Bedrock

September 17, 2025
New Shai-hulud Worm Infecting npm Packages With Hundreds of thousands of Downloads

New Shai-hulud Worm Infecting npm Packages With Hundreds of thousands of Downloads

September 17, 2025
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://techtrendfeed.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Tech News
  • Cybersecurity
  • Software
  • Gaming
  • Machine Learning
  • Smart Home & IoT

© 2025 https://techtrendfeed.com/ - All Rights Reserved