🔥 Gate Post Ambassador Exclusive Posting Reward Task Round 4 Is Live!
Not yet a Gate Post Ambassador? Apply now 👉 https://www.gate.com/questionnaire/4937
Join the Ambassador Task and post daily from June 9 to June 15, get your posts rated, and share a $300 prize pool based on your ratings!
🎁 Reward Details:
S-Level Weekly Ranking Reward
Post every day for 7 days with an overall quality score above 90 to qualify for S-Level.
2 outstanding ambassadors will each receive a $50 trading fee rebate voucher.
A/B-Level Tiered Rewards
Based on the number of posts and their quality, ambassadors will
Rare Werewolf APT Hits Russia With Crypto Mining, Data Theft Attacks
HomeNews* An advanced cyber group called Rare Werewolf has carried out attacks in Russia and the Commonwealth of Independent States (CIS), mainly targeting industrial and educational sectors.
Once inside the victim’s system, the attackers installed software like 4t Tray Minimizer, which hides running apps in the system tray. They also deployed tools to disable antivirus software and send stolen data to attacker-controlled email accounts using the legitimate program Blat. The team used AnyDesk remote desktop software and scheduled scripts to maintain access during specific hours. "All of the malicious functionality still relies on the installer, command, and PowerShell scripts," said Kaspersky.
Rare Werewolf—also known as Librarian Ghouls and Rezet—has previously targeted organizations in Russia and Ukraine, with notable activity since 2019. Their strategy involves leveraging well-known utilities to make detection and attribution more difficult.
In a separate development, Positive Technologies reported that the financially motivated group DarkGaboon has been targeting Russian organizations since mid-2023. The group uses phishing emails carrying archive files or Windows screensaver files to activate LockBit 3.0 ransomware and other remote access trojans, such as XWorm and Revenge RAT. As noted by Positive Technologies‘ researcher Victor Kazakov, "DarkGaboon is not a client of the LockBit RaaS service and acts independently…" The group uses public versions of LockBit and threatens to leak stolen data online.
These activities highlight ongoing threats to organizations in Russia and surrounding regions, with attackers relying on common, legitimate software tools to evade detection and complicate attribution.
Previous Articles: