Home OSINT News Signals
CYBER

Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT

🕓 1 min read

EXCLUSIVE: BLOODY WOLF PACK UNLEASHES ZERO-DAY PHISHING BLITZ, TARGETING CRITICAL ASIAN INFRASTRUCTURE

A sophisticated cybercriminal syndicate, operating under the names Stan Ghouls and Bloody Wolf, is executing a relentless campaign of targeted digital assaults. Their primary victims are high-value manufacturing, finance, and IT organizations across Russia and Central Asia, with a devastating new focus emerging in Uzbekistan. This is not random malware spray; this is surgical, financially-motivated cyber warfare.

Our exclusive investigation has identified approximately 50 compromised entities in Uzbekistan alone, with another 10 critical devices breached in Russia. The group’s signature method is a highly tailored spear-phishing attack, deploying malicious PDFs written in local languages to bypass suspicion. This initial data breach is merely the opening gambit for a far more sinister payload.

Historically deploying the STRRAT remote access Trojan, the group has now weaponized legitimate software, the NetSupport RAT, to maintain stealthy control. More alarmingly, we have uncovered a strategic shift in their infrastructure and evidence pointing to new IoT-focused malware in their arsenal. This expansion turns everyday connected devices into potential entry points for larger network exploitation.

"These actors are methodical and well-resourced," states a senior cybersecurity analyst familiar with the threat. "They are hunting for financial gain, but their persistent use of remote access tools suggests parallel cyberespionage objectives. The move towards IoT exploitation is a serious escalation, creating a broader attack surface and new vulnerabilities."

For global finance and supply chain sectors, this campaign is a dire warning. The exploitation of legitimate tools like NetSupport makes detection exceptionally difficult, while their focus on blockchain security and crypto-adjacent institutions threatens the very foundations of digital asset markets. Every unpatched vulnerability is a potential zero-day waiting to be exploited by this group.

We predict the Stan Ghouls operation will soon pivot to targeting critical infrastructure in Europe and North America, using the same phishing and ransomware playbook perfected in Eurasia. Their evolving toolkit signals a group preparing for bigger, more disruptive heists.

The wolf is not just at the door; it's already inside the system.

Telegram X LinkedIn
Back to News