Cloud Atlas hackers target Russian agriculture sector ahead of industry forum

A Russia-based cybersecurity firm has uncovered another cyber-espionage campaign by the state-backed threat actor Cloud Atlas, which targeted the country’s agricultural sector using lures tied to an upcoming industry forum. 

The attack, which is the second time the group has hit Russia’s agro industrial firms in recent months, coincided with preparations for the Russian agriculture forum scheduled for the end of the month in Moscow. According to researchers at F6, the hackers sent phishing emails disguised as the event’s official program, containing a malicious file that exploited an old Microsoft Office flaw — CVE-2017-11882, a vulnerability patched in 2017 but still widely abused by cybercriminals.

The same flaw was exploited back in 2023, when Cloud Atlas targeted a Russian agro-industrial enterprise and a state-owned research company with phishing emails related to Russia’s war in Ukraine.

The exploit allows attackers to execute malicious code and potentially take full control of the system, giving them the ability to install software, alter or delete data and create new user accounts.

Researchers noted that Cloud Atlas — also tracked as Inception — has shown increased activity throughout 2025, particularly against Russian and Belarusian targets. F6 also found indications that a defense enterprise was among the group’s October targets, though they did not provide technical details.

According to the report, Cloud Atlas continues to refine its tools and delivery methods, experimenting with different payloads while maintaining long-used infection chains.

“Cloud Atlas’s continued use of the same tactics and exploitation of long-known vulnerabilities suggests its attacks remain effective — largely due to unprotected or poorly maintained systems and the human factor,” researchers said.

Cloud Atlas — active since at least 2014 — is a state-sponsored espionage group known for attacks on organizations in Russia, Belarus, Azerbaijan, Turkey and Slovenia. Its operations focus on data theft and surveillance, though the exact country behind it remains unclear.

The hackers typically rely on multi-stage phishing campaigns, sending emails that mimic government correspondence, business offers or media materials. Their malware often employs custom-built loaders and encrypted communications to remain undetected and exfiltrate stolen data.

“These factors make Cloud Atlas a highly capable and persistent threat to organizational cybersecurity,” researchers added.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

More than 10 million impacted by breach of government contractor Conduent

Next Post

Former Trenchant exec pleads guilty to selling cyber exploits to Russian broker

Related Posts

New FileFix Variant Delivers StealC Malware Through Multilingual Phishing Site

Cybersecurity researchers have warned of a new campaign that's leveraging a variant of the FileFix social engineering tactic to deliver the StealC information stealer malware. "The observed campaign uses a highly convincing, multilingual phishing site (e.g., fake Facebook Security page), with anti-analysis techniques and advanced obfuscation to evade detection," Acronis security researcher Eliad
Read More

Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email Security

Microsoft is calling attention to a new phishing campaign primarily aimed at U.S.-based organizations that has likely utilized code generated using large language models (LLMs) to obfuscate payloads and evade security defenses. "Appearing to be aided by a large language model (LLM), the activity obfuscated its behavior within an SVG file, leveraging business terminology and a synthetic structure
Read More