Hackers send fake subpoenas to Russians with a trojan

Hackers send fake subpoenas to Russians with a trojan

This material (information) was produced, distributed and (or) sent by a foreign agent of RS-Balt JSC or relates to the activities of a foreign agent of RS-Balt JSC. 18+

In most regions of Russia, hackers have organized a mass mailing of spam emails masquerading as a subpoena for military training. According to RBC, residents of Yekaterinburg and Voronezh have already paid attention to such letters.

On the eve of Vladimir Putin, he signed a decree on calling up reserve men for military training in 2023. This is a scheduled event that takes place every year. In the public part of the decree, there is no data on the timing of these fees and the number of people who will be called up for them.

Such letters come from addresses that imitate real ones (for example, mail@voenkomat-mil.ru, the sender is “Main Directorate of the Military Commissariat of the Ministry of Defense of the Russian Federation”). Inside it says that the recipient of the letter must appear at the military registration and enlistment office by a certain time to receive a mobilization order and registration. Attached to the email is a ZIP archive containing malicious software.

The cybersecurity company FAC.C.T. previously reported that the malicious emails it intercepted contain archives with names like “Mobilization order No. 5010421409-VVK dated 05/10/2023.zip” and an .exe file inside. These files turned out to be the DarkWatchman RAT remote access trojan. This Trojan was previously used by the Hive0117 hacker group, which was created in February 2022 and specializes in sending malware. Previously, they had already disguised their mailings as official messages from the Federal Bailiff Service.

Similar cyberattacks were carried out last fall, during the period of mobilization in Russia. The distribution of “summons” by e-mail with a virus was recorded by Kaspersky Lab.

Source: Rosbalt

You may also like

Immediate Access Pro