Mysterious Werewolf develops a backdoor to strike Russian defense industry targets
The Mysterious Werewolf cluster was first detected in 2023 and has since undertaken at least three campaigns against Russian defense enterprises.
To compromise the target infrastructures, the threat actors use phishing emails and exploit the CVE‑2023‑38831 vulnerability in WinRAR. The emails contain an archive with a decoy document posing as an official government agency letter and a malicious CMD file. Opening the decoy with WinRAR automatically runs the malicious file.
Thus, the victim’s device is infected with RingSpy, an original remote access backdoor that enables the adversaries to execute commands on the compromised computer and download files from it. The attackers manage the backdoor through a Telegram bot.
You can ensure early attack detection and prevent escalation with BI.ZONE TDR. Meanwhile, latest insights from the BI.ZONE Threat Intelligence platform allow you to learn about new methods of threat actors and improve the effectiveness of your defenses.