Monday, April 28, 2025
Homecyber securityOperation HollowQuill Uses Malicious PDFs to Target Academic and Government Networks

Operation HollowQuill Uses Malicious PDFs to Target Academic and Government Networks

Published on

SIEM as a Service

Follow Us on Google News

A newly uncovered cyber-espionage campaign, dubbed Operation HollowQuill, has been identified as targeting academic, governmental, and defense-related networks in Russia using weaponized PDF documents.

The operation, tracked by SEQRITE Labs APT-Team, leverages decoy research invitations to infiltrate systems associated with the Baltic State Technical University (BSTU “VOENMEKH”), a key institution for defense and aerospace research supporting Russia’s military-industrial complex.

Malware Infection Chain: From Decoy PDFs to Cobalt Strike Payloads

The infection chain begins with a malicious RAR archive containing a .NET malware dropper disguised as an official research document.

- Advertisement - Google News

This dropper deploys multiple payloads, including a legitimate OneDrive application, a Golang-based shellcode loader, and a decoy PDF file.

The final payload is a Cobalt Strike beacon, a well-known penetration testing tool often repurposed for malicious activities.

The decoy PDF appears to be an official communication from the Russian Ministry of Science and Higher Education.

It outlines guidelines for state-assigned research projects under the 2026–2028 budget cycle, providing detailed instructions for submitting proposals through the Unified State Information System for Scientific Research and Technological Projects (ЕГИСУ НИОКТР).

The document is signed by A.E. Shashurin, acting rector of BSTU “VOENMEKH,” adding authenticity to the lure.

Operation HollowQuill
Infection Chain.

Technical Analysis: Multi-Stage Malware Deployment

The malware deployment involves four distinct stages:

  1. Malicious RAR File: The archive contains a .NET executable named “Outgoing No. 3548,” which acts as the initial dropper.
  2. Malicious .NET Dropper: This executable copies the decoy PDF and legitimate OneDrive application to specific directories while deploying a shortcut file (.lnk) in the Windows Startup folder to ensure persistence. It also injects shellcode into the OneDrive process using advanced techniques like Asynchronous Procedure Call (APC).
  3. Golang Shellcode Loader: The loader decrypts embedded shellcode using a hardcoded key and injects it into the memory of the suspended OneDrive process. This step includes anti-analysis measures such as time-based evasion.
  4. Shellcode Execution: The shellcode loads a Cobalt Strike beacon in memory, connecting to a command-and-control (C2) server hosted at phpsymfony[.]com.
Operation HollowQuill
Shellcode overview.

Analysis of the campaign revealed operational security (OPSEC) errors by the threat actor, such as leaving Go-build IDs in the Golang injector binary.

This enabled researchers to identify similar payloads linked to the same actor.

The C2 server has been rotating across multiple ASN services globally, including Cloudflare Net in the United States and UCLOUD-HK-AS-AP in Hong Kong.

Additionally, HTTP titles like “Coming Soon – pariaturzzphy.makebelievercorp[.]com” were repeatedly observed across hosts serving malicious binaries such as ASyncRAT.

Operation HollowQuill highlights the increasing sophistication of cyber-espionage campaigns targeting critical research institutions.

By exploiting authentic-looking documents and advanced malware techniques, threat actors aim to compromise sensitive information related to defense and aerospace technologies.

SEQRITE Labs recommends robust endpoint protection measures against identified threats such as Trojan.Ghanarava variants and vigilance against phishing attempts involving malicious attachments.

Indicators of Compromise (IOCs):

  • MD5 Hashes:
  • ab310ddf9267ed5d613bcc0e52c71a08 (Malicious RAR file)
  • fad1ddfb40a8786c1dd2b50dc9615275 (SystemUpdaters.exe)
  • cac4db5c6ecfffe984d5d1df1bc73fdb (OneDrives_v2_1.exe)
  • C2 Domain:
  • phpsymfony[.]com

MITRE ATT&CK Techniques:

  • Initial Access: T1566.001 (Spear phishing attachment)
  • Persistence: T1547.001 (Startup folder)
  • Defense Evasion: T1055.004 (Asynchronous Procedure Call)

This campaign serves as a stark reminder of evolving cyber threats targeting critical sectors worldwide.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Viasat Modems Zero-Day Vulnerabilities Let Attackers Execute Remote Code

A severe zero-day vulnerability has been uncovered in multiple Viasat satellite modem models, including...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...