Monday, April 14, 2025
Homecyber securityOperation HollowQuill - Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov...

Operation HollowQuill – Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov & Military Networks

Published on

SIEM as a Service

Follow Us on Google News

In a recent revelation by SEQRITE Labs, a highly sophisticated cyber-espionage campaign, dubbed Operation HollowQuill, has been uncovered.

The operation targets academic, governmental, and defense-related networks in Russia using weaponized decoy PDFs to deliver Cobalt Strike malware implants.

The campaign appears to focus on infiltrating critical institutions such as the Baltic State Technical University (BSTU “VOENMEKH”) a key contributor to Russia’s military-industrial complex.

- Advertisement - Google News
Cobalt Strike Malware
Infection Chain.

Technical Exploitation Chain

The infection chain begins with a malicious RAR archive containing a .NET-based malware dropper disguised as official research invitations from the Ministry of Science and Higher Education of Russia.

This archive includes multiple components:

  1. A legitimate OneDrive executable.
  2. A Golang-based shellcode loader.
  3. A decoy PDF document that serves as a lure for the targeted entities.

Upon execution, the .NET dropper deploys the shellcode loader, injects malicious code into the OneDrive process, and spawns the decoy PDF to avoid suspicion.

The shellcode loader employs advanced techniques such as APC injection to execute the payload in memory stealthily.

Decoy Document Analysis

The decoy PDF mimics official communication regarding state-assigned research projects for the 2026–2028 budget cycle.

It includes detailed guidelines for submitting proposals within Russia’s Unified State Information System for Scientific Research and Technological Projects (ЕГИСУ НИОКТР).

Signed by high-ranking officials, including A.E. Shashurin, acting rector of BSTU “VOENMEKH,” the document enhances credibility and increases the likelihood of user engagement.

The final stage involves deploying a Cobalt Strike beacon a widely used penetration testing tool often repurposed for malicious activities.

The beacon connects to a command-and-control (C2) server hosted on domains such as phpsymfony[.]com.

It uses standard HTTP GET requests with encoded data to communicate covertly with the attacker infrastructure.

Key artifacts extracted from the shellcode reveal advanced anti-analysis techniques, such as time-based evasion mechanisms and memory injection processes, ensuring minimal detection by security systems.

Cobalt Strike Malware
malicious shellcode 

Analysis of the campaign’s infrastructure shows operational security lapses by the attackers, including exposed Go build IDs and rotating C2 domains across multiple ASN services globally.

These identifiers have enabled researchers to trace similar payloads and associated malicious binaries distributed through other campaigns.

Operation HollowQuill highlights an alarming trend in cyber warfare targeting critical research and defense networks through sophisticated phishing tactics and advanced malware delivery mechanisms.

By leveraging legitimate applications like OneDrive and employing in-memory execution techniques, the attackers have demonstrated a high level of technical expertise aimed at evading detection while compromising sensitive systems.

This campaign underscores the need for robust cybersecurity measures across government and military sectors to mitigate risks posed by increasingly sophisticated threat actors.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Smishing Campaign Hits Toll Road Users with $5 Payment Scam

Cybersecurity researchers at Cisco Talos have uncovered a large-scale smishing campaign targeting toll road...

IBM Aspera Faspex Flaw Allows Injection of Malicious JavaScript in Web UI

A significant security vulnerability has been identified in IBM Aspera Faspex 5, a popular...

Chinese APT Group Targets Ivanti VPN Vulnerabilities to Breach Networks

In a concerning report from cybersecurity firm TeamT5, it has been revealed that a...

VMware ESXi 8.0 Update 3e Is Now Free — Here’s What’s New

VMware has announced that ESXi 8.0 Update 3e, the latest version of its industry-leading hypervisor,...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Smishing Campaign Hits Toll Road Users with $5 Payment Scam

Cybersecurity researchers at Cisco Talos have uncovered a large-scale smishing campaign targeting toll road...

IBM Aspera Faspex Flaw Allows Injection of Malicious JavaScript in Web UI

A significant security vulnerability has been identified in IBM Aspera Faspex 5, a popular...

Chinese APT Group Targets Ivanti VPN Vulnerabilities to Breach Networks

In a concerning report from cybersecurity firm TeamT5, it has been revealed that a...