By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors
Computing

Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors

News Room
Last updated: 2025/04/11 at 9:47 AM
News Room Published 11 April 2025
Share
SHARE

The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant called PowerModul.

The activity, which took place between July and December 2024, singled out organizations in the mass media, telecommunications, construction, government entities, and energy sectors, Kaspersky said in a new report published Thursday.

Paper Werewolf, also known as GOFFEE, is assessed to have conducted at least seven campaigns since 2022, according to BI.ZONE, with the attacks mainly aimed at government, energy, financial, media, and other organizations.

Attack chains mounted by the threat actor have also been observed incorporating a disruptive component, wherein the intrusions go beyond distributing malware for espionage purposes to also change passwords belonging to employee accounts.

The attacks themselves are initiated via phishing emails that contain a macro-laced lure document, which, upon opening and enabling macros, paves the way for the deployment of a PowerShell-based remote access trojan known as PowerRAT.

Cybersecurity

The malware is designed to deliver a next-stage payload, often a custom version of the Mythic framework agent known as PowerTaskel and QwakMyAgent. Another tool in the threat actor’s arsenal is a malicious IIS module called Owowa, which is used for retrieving Microsoft Outlook credentials entered by users on the web client.

The latest set of attacks documented by Kaspersky starts with a malicious RAR archive attachment containing an executable that masquerades as a PDF or a Word document using a double extension (i.e., *.pdf.exe or *.doc.exe). When the executable is launched, the decoy file is downloaded from a remote server and shown to the user, while the infection proceeds to the next stage in the background.

“The file itself is a Windows system file (explorer.exe or xpsrchvw.exe), with part of its code patched with a malicious shellcode,” it said. “The shellcode is similar to what we saw in earlier attacks, but in addition contains an obfuscated Mythic agent, which immediately begins communicating with the command-and-control (C2) server.”

Paper Werewolf Deploys PowerModul Implant

The alternate attack sequence is a lot more elaborate, using a RAR archive embedding a Microsoft Office document with a macro that acts as a dropper to deploy and launch PowerModul, a PowerShell script capable of receiving and executing additional PowerShell scripts from the C2 server.

The backdoor is said to have been used since the start of 2024, with the threat actors initially using it to download and execute PowerTaskel on compromised hosts. Some of the other payloads dropped by PowerModul are listed below –

  • FlashFileGrabber, which is used to steal files from removable media, such as flash drives, and exfiltrate them to the C2 server
  • FlashFileGrabberOffline, a variant of FlashFileGrabber that searches removable media for files with specific extensions, and when found, copies them to the local disk within the “%TEMP%CacheStoreconnect” folder
  • USB Worm, which is capable of infecting removable media with a copy of PowerModul

PowerTaskel is functionally similar to PowerModul in that it’s also designed to run PowerShell scripts sent by the C2 server. But in addition, it can send information about the targeted environment in the form of a “checkin” message, as well as execute other commands received from the C2 server as tasks. It’s also equipped to escalate privileges using the PsExec utility.

Cybersecurity

In at least one instance, PowerTaskel has been found to receive a script with a FolderFileGrabber component that, besides replicating the features of FlashFileGrabber, includes the ability to gather files from remote systems via a hardcoded network path using the SMB protocol.

“For the first time, they employed Word documents with malicious VBA scripts for initial infection,” Kaspersky said. “Recently, we have observed that GOFFEE is increasingly abandoning the use of PowerTaskel in favor of the binary Mythic agent during lateral movement.”

The development comes as BI.ZONE attributed another threat group called Sapphire Werewolf to a phishing campaign that distributes an updated version of the open-source Amethyst Stealer.

The stealer retrieves “credentials from Telegram and various browsers, including Chrome, Opera, Yandex, Brave, Orbitum, Atom, Kometa, and Edge Chromium, as well as FileZilla and SSH configuration files,” the Russian company said, adding it can also grab documents, including those stored on removable media.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Asus Proart Pa27ucge, a professional monitor with calibrator
Next Article How the tech world is responding to tariff chaos
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Whoop under fire after ending free hardware upgrade promise
Gadget
Costco employee reveals her top 9 things to buy after working at warehouse
News
The HackerNoon Newsletter: If Youre an Amazon Ring Owner, You May Be an Accidental Spy (5/9/2025) | HackerNoon
Computing
NBA Playoffs 2025: TV Channel, Game Times and How to Watch or Stream Today's Games
News

You Might also Like

Computing

The HackerNoon Newsletter: If Youre an Amazon Ring Owner, You May Be an Accidental Spy (5/9/2025) | HackerNoon

2 Min Read

New Purpose-Built Blockchain T-Rex Raises $17 Million to Transform Attention Layer In Web3 | HackerNoon

8 Min Read
Computing

Ninja Deep Research: The AI Agent Everyone Can Actually Start Using Now | HackerNoon

10 Min Read
Computing

If You’re an Amazon Ring Owner, You May Be an Accidental Spy | HackerNoon

21 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?