DarkWatchman cybercrime malware returns on Russian networks

Avatar

A financially motivated hacker group has targeted Russian companies across several industries in a new phishing campaign using a modified version of the DarkWatchman malware, researchers have found.

The group, known as Hive0117, has attacked firms in sectors including media, tourism, biotechnology, finance, energy and telecommunications, according to Russian cybersecurity firm F6. 

In 2023, Western researchers spotted the group spoofing Russian government communications and sending phishing emails disguised as military conscription notices. DarkWatchman was part of that campaign. 

The recent activity detailed by F6 involved phishing emails containing password-protected malicious archives. Once opened, the malware infected systems, allowing the hackers to record keystrokes, collect data and deploy additional payloads.

It is unclear whether the latest attacks were successful or caused any financial damage. The group’s activity, which dates back to at least February 2022, does not appear to be linked to the ongoing cyber conflict between Russia and Ukraine, researchers previously said. Hive0117’s origins remain unknown.

In previous operations, the hackers impersonated legitimate organizations and targeted entities in Russia, Belarus, Lithuania, Estonia and Kazakhstan.

Earlier this week, Russian media reported that scammers in Russia are increasingly using artificial intelligence and social engineering to defraud local users. Posing as potential partners on dating apps or social media, the fraudsters build trust before soliciting money for fake investments or business schemes, according to the reports.

CybercrimeNewsNews BriefsMalware
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Polish police dismantle cybercrime gang accused of impersonation scams, arrest nine suspects

Next Post

Researchers Demonstrate How MCP Prompt Injection Can Be Used for Both Attack and Defense

Related Posts

Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell

A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently disclosed security flaw in SAP NetWeaver. Forescout Vedere Labs, in a report published Thursday, said it uncovered a malicious infrastructure likely associated with the hacking group weaponizing CVE-2025-31324 (CVSS score: 10.0) since April 29, 2025. CVE-2025-31324 refers to a critical SAP NetWeaver flaw
Avatar
Read More