New ForumTroll Phishing Attacks Target Russian Scholars Using Fake eLibrary Emails
嗯,用户让我总结这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我得通读一下文章,抓住主要信息。 文章讲的是Kaspersky发现了一个新的网络攻击活动,这个活动和Operation ForumTroll有关。攻击目标是俄罗斯的学者,特别是政治学、国际关系和全球经济学领域的人士。攻击者使用了钓鱼邮件,伪装成eLibrary的邮件,诱导受害者下载恶意软件。 恶意软件利用了Google Chrome的一个零日漏洞,下载后会执行PowerShell脚本,最终植入间谍软件Tuoni。攻击者还用了个性化策略,比如用受害者的姓名来命名文件,提高成功率。 此外,文章还提到其他两个威胁集群QuietCrabs和Thor的活动,他们利用不同的漏洞进行攻击。但用户可能主要关注的是Operation ForumTroll的部分。 所以,在总结时要涵盖:Kaspersky发现新钓鱼攻击、目标是俄罗斯学者、利用eLibrary伪装、植入间谍软件Tuoni、个性化策略以及持续的威胁。 现在把这些信息浓缩到100字以内。确保每个关键点都涵盖到:谁(Kaspersky)、什么(新钓鱼攻击)、目标(俄罗斯学者)、手段(eLibrary邮件、零日漏洞)、结果(植入Tuoni)、个性化策略、持续性。 最后检查一下字数是否符合要求,并且没有使用任何开头的模板。 </think> 卡巴斯基发现新的钓鱼攻击活动针对俄罗斯学者,利用伪装成eLibrary的邮件诱导下载恶意软件。该活动与Operation ForumTroll相关,通过零日漏洞植入间谍软件Tuoni,并采用个性化策略提高成功率。 2025-12-17 14:54:0 Author: thehackernews.com(查看原文) 阅读量:6 收藏

The threat actor linked to Operation ForumTroll has been attributed to a fresh set of phishing attacks targeting individuals within Russia, according to Kaspersky.

The Russian cybersecurity vendor said it detected the new activity in October 2025. The origins of the threat actor are presently unknown.

"While the spring cyberattacks focused on organizations, the fall campaign honed in on specific individuals: scholars in the field of political science, international relations, and global economics, working at major Russian universities and research institutions," security researcher Georgy Kucherin said.

Operation ForumTroll refers to a series of sophisticated phishing attacks exploiting a then-zero-day vulnerability in Google Chrome (CVE-2025-2783) to deliver the LeetAgent backdoor and a spyware implant known as Dante.

The latest attack wave also commences with emails that claimed to be from eLibrary, a Russian scientific electronic library, with the messages sent from the address "support@e-library[.]wiki." The domain was registered in March 2025, six months before the start of the campaign, suggesting that preparations for the attack had been underway for some time.

Cybersecurity

Kaspersky said the strategic domain aging was done to avoid raising any red flags typically associated with sending emails from a freshly registered domain. In addition, the attackers also hosted a copy of the legitimate eLibrary homepage ("elibrary[.]ru") on the bogus domain to maintain the ruse.

The emails instruct prospective targets to click on an embedded link pointing to the malicious site to download a plagiarism report. Should a victim follow through, a ZIP archive with the naming pattern "<LastName>_<FirstName>_<Patronymic>.zip" is downloaded to their machine.

What's more, these links are designed for one-time use, meaning any subsequent attempts to navigate to the URL cause it to display a Russian language message stating "Download failed, please try again later." In the event, the download is attempted from a platform other than Windows, the user is prompted to "try again later on a Windows computer."

"The attackers also carefully personalized the phishing emails for their targets, specific professionals in the field," the company said. "The downloaded archive was named with the victim's last name, first name, and patronymic."

The archive contains a Windows shortcut (LNK) with the same name, which, when executed, runs a PowerShell script to download and launch a PowerShell-based payload from a remote server. The payload then contacts a URL to fetch a final-stage DLL and persist it using COM hijacking. It also downloads and displays a decoy PDF to the victim.

The final payload is a command-and-control (C2) and red teaming framework known as Tuoni, enabling the threat actors to gain remote access to the victim's Windows device.

"ForumTroll has been targeting organizations and individuals in Russia and Belarus since at least 2022," Kaspersky said. "Given this lengthy timeline, it is likely this APT group will continue to target entities and individuals of interest within these two countries."

The disclosure comes as Positive Technologies detailed the activities of two threat clusters, QuietCrabs – a suspected Chinese hacking group also tracked as UTA0178 and UNC5221 – and Thor, which appears to be involved in ransomware attacks since May 2025.

Cybersecurity

These intrusion sets have been found to leverage security flaws in Microsoft SharePoint (CVE-2025-53770), Ivanti Endpoint Manager Mobile (CVE-2025-4427 and CVE-2025-4428), Ivanti Connect Secure (CVE-2024-21887), and Ivanti Sentry (CVE-2023-38035).

Attacks carried out by QuietCrabs take advantage of the initial access to deploy an ASPX web shell and use it to deliver a JSP loader that's capable of downloading and executing KrustyLoader, which then drops the Sliver implant.

"Thor is a threat group first observed in attacks against Russian companies in 2025," researchers Alexander Badayev, Klimentiy Galkin, and Vladislav Lunin said. "As final payloads, the attackers use LockBit and Babuk ransomware, as well as Tactical RMM and MeshAgent to maintain persistence."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2025/12/new-forumtroll-phishing-attacks-target.html
如有侵权请联系:admin#unsafe.sh