Hackers posing as Kyrgyz officials target Russian agencies in cyber espionage campaign

A hacker group known as Cavalry Werewolf has launched a months-long cyber espionage campaign against Russian government agencies and industrial firms, using phishing emails disguised as Kyrgyz government correspondence, researchers said.

Between May and August 2025, the group — also tracked as YoroTrooper and Silent Lynx — targeted Russia’s public sector as well as energy, mining and manufacturing companies, according to a report by the Turkish cybersecurity firm Picus Security released this week.

The attackers sent spear-phishing emails that appeared to come from Kyrgyz ministries, including the Ministry of Economy and Commerce and the Ministry of Transport and Communications, sometimes using compromised government email accounts. The messages contained malicious RAR files that installed custom malware dubbed FoalShell and StallionRAT.

Once deployed, FoalShell gave attackers remote access to infected computers, while StallionRAT used the Telegram messaging app as a command-and-control channel, allowing hackers to execute commands, steal files and exfiltrate data.

The emails used convincing file names such as “three-month results of joint operations” or “shortlist of employees to receive bonuses” to trick victims into opening them.

While the latest wave of attacks primarily focused on Russia, researchers said the group is likely broadening its reach. A Tajik-language file found on an infected system points to possible interest in Tajikistan, while Arabic-named files suggest reconnaissance in the Middle East.

“This expansion, coupled with testing of additional tools like AsyncRAT, highlights a rapidly evolving and ambitious threat actor,” Picus researchers said.

Picus did not attribute the group to any nation-state, but previous research by Cisco Talos said Cavalry Werewolf is likely based in Kazakhstan, citing the use of Kazakh currency, fluency in Kazakh and Russian, and the group’s regional focus.

Active since June 2022, the hackers have previously targeted a European Union healthcare agency, the World Intellectual Property Organization (WIPO) and several embassies in Turkmenistan and Azerbaijan, according to Cisco Talos.

Russian cybersecurity firm Bi.Zone also reported earlier this year that YoroTrooper carried out phishing attacks on Russian institutions using Kyrgyz government lures. Researchers also noted that the geography of the group’s attacks appears to be “quite broad” and is not limited to Russia or other countries of the Commonwealth of Independent States (CIS) region.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets

Next Post

Trump pardons former Binance CEO after guilty plea in letting cybercrime proceeds flow through platform

Related Posts

OpenAI Disrupts Russian, North Korean, and Chinese Hackers Misusing ChatGPT for Cyberattacks

OpenAI on Tuesday said it disrupted three activity clusters for misusing its ChatGPT artificial intelligence (AI) tool to facilitate malware development. This includes a Russian‑language threat actor, who is said to have used the chatbot to help develop and refine a remote access trojan (RAT), a credential stealer with an aim to evade detection. The operator also used several ChatGPT accounts to
Read More

North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware

The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry with 197 more malicious packages since last month. According to Socket, these packages have been downloaded over 31,000 times, and are designed to deliver a variant of OtterCookie that brings together the features of BeaverTail and prior versions of OtterCookie. Some of the
Read More