
Espionage clusters disguise themselves as Kyrgyz state officials
All summer long, Cavalry Werewolf attacked Russian organizations, posing as Kyrgyz government officials. The targets of the summer campaign were state agencies, as well as energy, mining, and manufacturing enterprises. The cluster’s motive is espionage.
Posing as officials from various Kyrgyz ministries, the attackers disseminated malicious emails containing seemingly important documents. In actual fact, the emails were laced with RAR archives, which concealed malware. This was not commercial wide‑spread malware purchasable on underground resources. The adversaries relied on the malware of its own design: FoalShell reverse shells and StallionRAT controlled via Telegram. These tools allowed them to remotely control a compromised device.
For the mailing campaigns, the threat actors typically created email accounts that resembled real addresses of government officials. However, in some cases, the email address used was in fact a real address that had been compromised earlier. It was listed as a contact address on the website of one of the republic’s government agencies.
BI.ZONE Threat Intelligence has also discovered files with names in Tajik and Arabic created by the cluster, which suggests that they may be preparing attacks against Tajikistan and countries in the Middle East. The cluster continues to modify its arsenal and test new malware, in particular the AsyncRAT remote access trojan. Unlike the proprietary tools that the cluster used in its summer campaign against Russian organizations, this trojan is free and available on a popular developer platform. Though, the attackers, rather than choosing the basic C# version of the program, went with a modified version rewritten in Rust.
Previously, BI.ZONE Threat Intelligence reported that the share of attacks motivated by espionage continues to grow. In 2023, this figure stood at 15% of all incidents, by the end of 2024 it had risen to 21%, and by the end of the first half of 2025 it had reached a record high of 36%.
Most cyberattacks on organizations in Russia and other CIS countries begin with phishing emails. You can leverage dedicated services such as BI.ZONE Mail Security to filter out unwanted messages and protect your communications. Its mechanism allows for illegitimate emails to be blocked, while secure emails continue to be delivered without delay. Portals such as BI.ZONE Threat Intelligence, help build proactive protection for companies and accelerate response to incidents by providing detailed information about current attacks, threat actors, their tactics, techniques, tools, and information from underground resources.