Cloud Atlas hackers target Russian agriculture sector ahead of industry forum

A Russia-based cybersecurity firm has uncovered another cyber-espionage campaign by the state-backed threat actor Cloud Atlas, which targeted the country’s agricultural sector using lures tied to an upcoming industry forum. 

The attack, which is the second time the group has hit Russia’s agro industrial firms in recent months, coincided with preparations for the Russian agriculture forum scheduled for the end of the month in Moscow. According to researchers at F6, the hackers sent phishing emails disguised as the event’s official program, containing a malicious file that exploited an old Microsoft Office flaw — CVE-2017-11882, a vulnerability patched in 2017 but still widely abused by cybercriminals.

The same flaw was exploited back in 2023, when Cloud Atlas targeted a Russian agro-industrial enterprise and a state-owned research company with phishing emails related to Russia’s war in Ukraine.

The exploit allows attackers to execute malicious code and potentially take full control of the system, giving them the ability to install software, alter or delete data and create new user accounts.

Researchers noted that Cloud Atlas — also tracked as Inception — has shown increased activity throughout 2025, particularly against Russian and Belarusian targets. F6 also found indications that a defense enterprise was among the group’s October targets, though they did not provide technical details.

According to the report, Cloud Atlas continues to refine its tools and delivery methods, experimenting with different payloads while maintaining long-used infection chains.

“Cloud Atlas’s continued use of the same tactics and exploitation of long-known vulnerabilities suggests its attacks remain effective — largely due to unprotected or poorly maintained systems and the human factor,” researchers said.

Cloud Atlas — active since at least 2014 — is a state-sponsored espionage group known for attacks on organizations in Russia, Belarus, Azerbaijan, Turkey and Slovenia. Its operations focus on data theft and surveillance, though the exact country behind it remains unclear.

The hackers typically rely on multi-stage phishing campaigns, sending emails that mimic government correspondence, business offers or media materials. Their malware often employs custom-built loaders and encrypted communications to remain undetected and exfiltrate stolen data.

“These factors make Cloud Atlas a highly capable and persistent threat to organizational cybersecurity,” researchers added.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

More than 10 million impacted by breach of government contractor Conduent

Next Post

Former Trenchant exec pleads guilty to selling cyber exploits to Russian broker

Related Posts

The Case for Dynamic AI-SaaS Security as Copilots Scale

Within the past year, artificial intelligence copilots and agents have quietly permeated the SaaS applications businesses use every day. Tools like Zoom, Slack, Microsoft 365, Salesforce, and ServiceNow now come with built-in AI assistants or agent-like features. Virtually every major SaaS vendor has rushed to embed AI into their offerings. The result is an explosion of AI capabilities across
Read More

Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media

The fraudulent investment scheme known as Nomani has witnessed an increase by 62%, according to data from ESET, as campaigns distributing the threat have also expanded beyond Facebook to include other social media platforms, such as YouTube. The Slovak cybersecurity company said it blocked over 64,000 unique URLs associated with the threat this year. A majority of the detections originated from
Read More

Microsoft Fixes 114 Windows Flaws in January 2026 Patch, One Actively Exploited

Microsoft on Tuesday rolled out its first security update for 2026, addressing 114 security flaws, including one vulnerability that it said has been actively exploited in the wild. Of the 114 flaws, eight are rated Critical, and 106 are rated Important in severity. As many as 58 vulnerabilities have been classified as privilege escalation, followed by 22 information disclosure, 21 remote code
Read More