By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
Computing

Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan

News Room
Last updated: 2025/11/27 at 1:50 PM
News Room Published 27 November 2025
Share
Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
SHARE

Nov 27, 2025Ravie LakshmananMalware / Social Engineering

The threat actor known as Bloody Wolf has been attributed to a cyber attack campaign that has targeted Kyrgyzstan since at least June 2025 with the goal of delivering NetSupport RAT.

As of October 2025, the activity has expanded to also single out Uzbekistan, Group-IB researchers Amirbek Kurbanov and Volen Kayo said in a report published in collaboration with Ukuk, a state enterprise under the Prosecutor General’s office of the Kyrgyz Republic. The attacks have targeted finance, government, and information technology (IT) sectors.

“Those threat actors would impersonate the [Kyrgyzstan’s] Ministry of Justice through official looking PDF documents and domain names, which in turn hosted malicious Java Archive (JAR) files designed to deploy the NetSupport RAT,” the Singapore-headquartered company said.

“This combination of social engineering and accessible tooling allows Bloody Wolf to remain effective while keeping a low operational profile.”

DFIR Retainer Services

Bloody Wolf is the name assigned to a hacking group of unknown provenance that has used spear-phishing attacks to target entities in Kazakhstan and Russia using tools like STRRAT and NetSupport. The group is assessed to be active since at least late 2023.

The targeting of Kyrgyzstan and Uzbekistan using similar initial access techniques marks an expansion of the threat actor’s operations in Central Asia, primarily impersonating trusted government ministries in phishing emails to distribute weaponized links or attachments.

The attack chains more or less follow the same approach in that the message recipients are tricked into clicking on links that download malicious Java archive (JAR) loader files along with instructions to install Java Runtime.

While the email claims the installation is necessary to view the documents, the reality is that it’s used to execute the loader. Once launched, the loader then proceeds to fetch the next-stage payload (i.e., NetSupport RAT) from infrastructure that’s under the attacker’s control and set up persistence in three ways –

  • Creating a scheduled task
  • Adding a Windows Registry value
  • Dropping a batch script to the folder “%APPDATA%MicrosoftWindowsStart MenuProgramsStartup”
CIS Build Kits

The Uzbekistan phase of the campaign is notable for incorporating geofencing restrictions, thereby causing requests originating outside of the country to be redirected to the legitimate data.egov[.]uz website. Requests from within Uzbekistan have been found to trigger the download of the JAR file from an embedded link within the PDF attachment.

Group-IB said the JAR loaders observed in the campaigns are built with Java 8, which was released in March 2014. It’s believed that the attackers are using a bespoke JAR generator or template to spawn these artifacts. The NetSupport RAT payload is a old version of NetSupport Manager from October 2013.

“Bloody Wolf has demonstrated how low-cost, commercially available tools can be weaponized into sophisticated, regionally targeted cyber operations,” it said. “By exploiting trust in government institutions and leveraging simple JAR-based loaders, the group continues to maintain a strong foothold across the Central Asian threat landscape.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Let’s play roulette: Samsung Galaxy S25 Ultra showing different awesome deals for different people! Let’s play roulette: Samsung Galaxy S25 Ultra showing different awesome deals for different people!
Next Article Solar Panels Are Actually Saving Lives – Here’s How – BGR Solar Panels Are Actually Saving Lives – Here’s How – BGR
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

The Ray-Ban Meta smart glasses are at their best-ever price for Black Friday
The Ray-Ban Meta smart glasses are at their best-ever price for Black Friday
News
Is iOS Actually Safer Than Android? – BGR
Is iOS Actually Safer Than Android? – BGR
News
Bitso Supercharges Its On-Chain Strategy: Perps Aggregator Coming + Token Launch in 2026
Bitso Supercharges Its On-Chain Strategy: Perps Aggregator Coming + Token Launch in 2026
Gadget
Why AI Companies Are Racing to Control Their Supply Chains | HackerNoon
Why AI Companies Are Racing to Control Their Supply Chains | HackerNoon
Computing

You Might also Like

Why AI Companies Are Racing to Control Their Supply Chains | HackerNoon
Computing

Why AI Companies Are Racing to Control Their Supply Chains | HackerNoon

9 Min Read
What the Heck is dbc? | HackerNoon
Computing

What the Heck is dbc? | HackerNoon

0 Min Read
Can AI Agents Pay Each Other? How Cronos Is Testing the Next Frontier with x402 PayTech Hackathon | HackerNoon
Computing

Can AI Agents Pay Each Other? How Cronos Is Testing the Next Frontier with x402 PayTech Hackathon | HackerNoon

5 Min Read
Can Antitrust Regulations Keep Up With AI? Researchers Warn of Growing Structural Tensions | HackerNoon
Computing

Can Antitrust Regulations Keep Up With AI? Researchers Warn of Growing Structural Tensions | HackerNoon

35 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?