Tuesday, May 13, 2025
Homecyber securityOperation HollowQuill - Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov...

Operation HollowQuill – Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov & Military Networks

Published on

SIEM as a Service

Follow Us on Google News

In a recent revelation by SEQRITE Labs, a highly sophisticated cyber-espionage campaign, dubbed Operation HollowQuill, has been uncovered.

The operation targets academic, governmental, and defense-related networks in Russia using weaponized decoy PDFs to deliver Cobalt Strike malware implants.

The campaign appears to focus on infiltrating critical institutions such as the Baltic State Technical University (BSTU “VOENMEKH”) a key contributor to Russia’s military-industrial complex.

- Advertisement - Google News
Cobalt Strike Malware
Infection Chain.

Technical Exploitation Chain

The infection chain begins with a malicious RAR archive containing a .NET-based malware dropper disguised as official research invitations from the Ministry of Science and Higher Education of Russia.

This archive includes multiple components:

  1. A legitimate OneDrive executable.
  2. A Golang-based shellcode loader.
  3. A decoy PDF document that serves as a lure for the targeted entities.

Upon execution, the .NET dropper deploys the shellcode loader, injects malicious code into the OneDrive process, and spawns the decoy PDF to avoid suspicion.

The shellcode loader employs advanced techniques such as APC injection to execute the payload in memory stealthily.

Decoy Document Analysis

The decoy PDF mimics official communication regarding state-assigned research projects for the 2026–2028 budget cycle.

It includes detailed guidelines for submitting proposals within Russia’s Unified State Information System for Scientific Research and Technological Projects (ЕГИСУ НИОКТР).

Signed by high-ranking officials, including A.E. Shashurin, acting rector of BSTU “VOENMEKH,” the document enhances credibility and increases the likelihood of user engagement.

The final stage involves deploying a Cobalt Strike beacon a widely used penetration testing tool often repurposed for malicious activities.

The beacon connects to a command-and-control (C2) server hosted on domains such as phpsymfony[.]com.

It uses standard HTTP GET requests with encoded data to communicate covertly with the attacker infrastructure.

Key artifacts extracted from the shellcode reveal advanced anti-analysis techniques, such as time-based evasion mechanisms and memory injection processes, ensuring minimal detection by security systems.

Cobalt Strike Malware
malicious shellcode 

Analysis of the campaign’s infrastructure shows operational security lapses by the attackers, including exposed Go build IDs and rotating C2 domains across multiple ASN services globally.

These identifiers have enabled researchers to trace similar payloads and associated malicious binaries distributed through other campaigns.

Operation HollowQuill highlights an alarming trend in cyber warfare targeting critical research and defense networks through sophisticated phishing tactics and advanced malware delivery mechanisms.

By leveraging legitimate applications like OneDrive and employing in-memory execution techniques, the attackers have demonstrated a high level of technical expertise aimed at evading detection while compromising sensitive systems.

This campaign underscores the need for robust cybersecurity measures across government and military sectors to mitigate risks posed by increasingly sophisticated threat actors.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in...

Researchers Introduce Mythic Framework Agent to Enhance Pentesting Tool Performance

Penetration testing is still essential for upholding strong security procedures in a time when...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Ivanti Released Security Updates to Fix for the Mutiple RCE Vulnerabilities – Patch Now

Ivanti, a leading enterprise software provider, has released critical security updates addressing vulnerabilities across...

Fortinet FortiVoice Zero-day Vulnerability Actively Exploited in The Wild

A critical stack-based buffer overflow vulnerability (CWE-121) has been discovered in multiple Fortinet products,...

Ransomware Attacks Surge by 123% Amid Evolving Tactics and Strategies

The 2025 Third-Party Breach Report from Black Kite highlights a staggering 123% surge in...