A newly uncovered cyber-espionage campaign, dubbed Operation HollowQuill, has been identified as targeting academic, governmental, and defense-related networks in Russia using weaponized PDF documents.
The operation, tracked by SEQRITE Labs APT-Team, leverages decoy research invitations to infiltrate systems associated with the Baltic State Technical University (BSTU “VOENMEKH”), a key institution for defense and aerospace research supporting Russia’s military-industrial complex.
The infection chain begins with a malicious RAR archive containing a .NET malware dropper disguised as an official research document.
This dropper deploys multiple payloads, including a legitimate OneDrive application, a Golang-based shellcode loader, and a decoy PDF file.
The final payload is a Cobalt Strike beacon, a well-known penetration testing tool often repurposed for malicious activities.
The decoy PDF appears to be an official communication from the Russian Ministry of Science and Higher Education.
It outlines guidelines for state-assigned research projects under the 2026–2028 budget cycle, providing detailed instructions for submitting proposals through the Unified State Information System for Scientific Research and Technological Projects (ЕГИСУ НИОКТР).
The document is signed by A.E. Shashurin, acting rector of BSTU “VOENMEKH,” adding authenticity to the lure.
The malware deployment involves four distinct stages:
Analysis of the campaign revealed operational security (OPSEC) errors by the threat actor, such as leaving Go-build IDs in the Golang injector binary.
This enabled researchers to identify similar payloads linked to the same actor.
The C2 server has been rotating across multiple ASN services globally, including Cloudflare Net in the United States and UCLOUD-HK-AS-AP in Hong Kong.
Additionally, HTTP titles like “Coming Soon – pariaturzzphy.makebelievercorp[.]com” were repeatedly observed across hosts serving malicious binaries such as ASyncRAT.
Operation HollowQuill highlights the increasing sophistication of cyber-espionage campaigns targeting critical research institutions.
By exploiting authentic-looking documents and advanced malware techniques, threat actors aim to compromise sensitive information related to defense and aerospace technologies.
SEQRITE Labs recommends robust endpoint protection measures against identified threats such as Trojan.Ghanarava variants and vigilance against phishing attempts involving malicious attachments.
This campaign serves as a stark reminder of evolving cyber threats targeting critical sectors worldwide.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
Cybersecurity researchers are raising alarms about Cable, a potent open-source post-exploitation toolkit designed to exploit Active…
A critical security vulnerability has been discovered in the Langflow AI Builder, a popular tool…
A hacker operating under the alias “Satanic” has claimed responsibility for a massive data breach…
A critical vulnerability has been discovered in TP-Link’s Smart Hub, potentially exposing users’ Wi-Fi credentials…
Southeast Asian Advanced Persistent Threat (APT) group OceanLotus, also known as APT32, has been identified…
AkiraBot, identified by SentinelLABS, represents a sophisticated spam bot framework that targets website chats and…