By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware
Computing

Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware

News Room
Last updated: 2025/02/27 at 9:21 AM
News Room Published 27 February 2025
Share
SHARE

Feb 27, 2025Ravie LakshmananMalware / Network Security

The threat actor known as Space Pirates has been linked to a malicious campaign targeting Russian information technology (IT) organizations with a previously undocumented malware called LuckyStrike Agent.

The activity was detected in November 2024 by Solar, the cybersecurity arm of Russian state-owned telecom company Rostelecom. It’s tracking the activity under the name Erudite Mogwai.

The attacks are also characterized by the use of other tools like Deed RAT, also called ShadowPad Light, and a customized version of proxy utility named Stowaway, which has been previously used by other China-linked hacking groups.

Cybersecurity

“Erudite Mogwai is one of the active APT groups specializing in the theft of confidential information and espionage,” Solar researchers said. “Since at least 2017, the group has been attacking government agencies, IT departments of various organizations, as well as enterprises related to high-tech industries such as aerospace and electric power.”

The threat actor was first publicly documented by Positive Technologies in 2022, detailing its exclusive use of the Deed RAT malware. The group is believed to share tactical overlaps with another hacking group called Webworm. It’s known to target organizations in Russia, Georgia, and Mongolia.

In one of the attacks targeting a government sector customer, Solar said it discovered the attacker deploying various tools to facilitate reconnaissance, while also dropping LuckyStrike Agent, a multi-functional .NET backdoor that uses Microsoft OneDrive for command-and-control (C2).

“The attackers gained access to the infrastructure by compromising a publicly accessible web service no later than March 2023, and then began looking for ‘low-hanging fruit’ in the infrastructure,” Solar said. “Over the course of 19 months, the attackers slowly spread across the customer’s systems until they reached the network segments connected to monitoring in November 2024.”

Cybersecurity

Also noteworthy is the use of a modified version of Stowaway to retain only its proxy functionality, alongside using LZ4 as a compression algorithm, incorporating XXTEA as an encryption algorithm, and adding support for the QUIC transport protocol.

“Erudite Mogwai began their journey in modifying this utility by cutting down the functionality they didn’t need,” Solar said. “They continued with minor edits, such as renaming functions and changing the sizes of structures (probably to knock down existing detection signatures). At the moment, the version of Stowaway used by this group can be called a full-fledged fork.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article What ‘wooden’ Keir MUST do to win over Trump revealed by May & Rishi staff
Next Article One Tech Tip: Getting a lot of unwanted phone calls? Here are ways to stop them
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

What is Li-Fi? Internet Access Through Light-Based Technology Explained
News
Protect Your Inbox With This Mail Backup Tool for $49.99
News
Google I/O 2025: What to expect with Gemini, Android 16, and Project Astra
News
Google Using AI to Combat Scams in Chrome
News

You Might also Like

Computing

The HackerNoon Newsletter: Nurses Are Being Hired Like Ubers (5/11/2025) | HackerNoon

3 Min Read
Computing

Range Over Function Types: The New Feature in the Go 1.23 Release | HackerNoon

32 Min Read
Computing

Godot XR Update: The Top 5 Entries of the Godot XR Game Jam – March 2025 | HackerNoon

5 Min Read
Computing

Crowdsales in Crypto: Initial (Something) Offerings and Their Regulations | HackerNoon

10 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?