Cloud Atlas hackers target Russian agriculture sector ahead of industry forum

A Russia-based cybersecurity firm has uncovered another cyber-espionage campaign by the state-backed threat actor Cloud Atlas, which targeted the country’s agricultural sector using lures tied to an upcoming industry forum. 

The attack, which is the second time the group has hit Russia’s agro industrial firms in recent months, coincided with preparations for the Russian agriculture forum scheduled for the end of the month in Moscow. According to researchers at F6, the hackers sent phishing emails disguised as the event’s official program, containing a malicious file that exploited an old Microsoft Office flaw — CVE-2017-11882, a vulnerability patched in 2017 but still widely abused by cybercriminals.

The same flaw was exploited back in 2023, when Cloud Atlas targeted a Russian agro-industrial enterprise and a state-owned research company with phishing emails related to Russia’s war in Ukraine.

The exploit allows attackers to execute malicious code and potentially take full control of the system, giving them the ability to install software, alter or delete data and create new user accounts.

Researchers noted that Cloud Atlas — also tracked as Inception — has shown increased activity throughout 2025, particularly against Russian and Belarusian targets. F6 also found indications that a defense enterprise was among the group’s October targets, though they did not provide technical details.

According to the report, Cloud Atlas continues to refine its tools and delivery methods, experimenting with different payloads while maintaining long-used infection chains.

“Cloud Atlas’s continued use of the same tactics and exploitation of long-known vulnerabilities suggests its attacks remain effective — largely due to unprotected or poorly maintained systems and the human factor,” researchers said.

Cloud Atlas — active since at least 2014 — is a state-sponsored espionage group known for attacks on organizations in Russia, Belarus, Azerbaijan, Turkey and Slovenia. Its operations focus on data theft and surveillance, though the exact country behind it remains unclear.

The hackers typically rely on multi-stage phishing campaigns, sending emails that mimic government correspondence, business offers or media materials. Their malware often employs custom-built loaders and encrypted communications to remain undetected and exfiltrate stolen data.

“These factors make Cloud Atlas a highly capable and persistent threat to organizational cybersecurity,” researchers added.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

More than 10 million impacted by breach of government contractor Conduent

Next Post

Former Trenchant exec pleads guilty to selling cyber exploits to Russian broker

Related Posts

LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer

LastPass is warning of an ongoing, widespread information stealer campaign targeting Apple macOS users through fake GitHub repositories that distribute malware-laced programs masquerading as legitimate tools. "In the case of LastPass, the fraudulent repositories redirected potential victims to a repository that downloads the Atomic infostealer malware," researchers Alex Cox, Mike Kosak, and
Read More

Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious ICS Files

A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day earlier this year in cyber attacks targeting the Brazilian military. Tracked as CVE-2025-27915 (CVSS score: 5.4), the vulnerability is a stored cross-site scripting (XSS) vulnerability in the Classic Web Client that arises as a result of insufficient sanitization of HTML content in ICS calendar files,
Read More