Skip to content

Cyber-Espionage Campaign Targets Russia's Aerospace Defense

Discover the exposed cyber-espionage campaign targeting Russia's aerospace and defense sectors. Learn about the advanced malware and techniques used.

In this picture, we see the missiles. At the bottom, we see the boards in white color. In the left...
In this picture, we see the missiles. At the bottom, we see the boards in white color. In the left bottom, we see a poster in red and grey color is pasted on the board. We see some text printed on the poster. At the top, it looks like the roof and it is in white color.

Cyber-Espionage Campaign Targets Russia's Aerospace Defense

A cyber-espionage campaign, Operation CargoTalon, has been exposed, targeting Russia's aerospace and defense sectors. The campaign, attributed to a threat cluster known as UNG0901, demonstrates a well-structured and persistent threat operation. The campaign was first publicly disclosed on 26 May 2023 by SEQRITE Labs, a part of Quick Heal Technologies.

The campaign specifically targets the Voronezh Aircraft Production Association (VASO). It uses spear-phishing emails with disguised ZIP files containing malicious LNK shortcuts and DLL implants named EAGLET. The EAGLET implant collects system information, creates a hidden directory, and connects to a command-and-control server via HTTP. The malware supports remote shell access, file download, and data exfiltration. The attackers also use malicious TTN (товарно-транспортная накладная) documents to initiate the attack. The campaign is similar to others using the EAGLET backdoor, which have been observed targeting the Russian military. The campaign demonstrates functional parallels with PhantomDL, a Go-based backdoor.

The campaign was observed in the months leading up to its public disclosure, with the full report including technical details, indicators, and recommendations available on the SEQRITE Labs blog. The campaign targeted logistics and transportation companies in the Middle East, using fake Microsoft Word documents with macros to install a custom backdoor called CargoTor.

Operation CargoTalon, a sophisticated cyber-espionage campaign, has been exposed. It targets Russia's aerospace and defense sectors, with a specific focus on VASO. The campaign uses advanced malware and spear-phishing techniques to gain unauthorized access and exfiltrate data. The full report, published by SEQRITE Labs, provides detailed information to help organizations protect against similar threats.

Read also:

Latest