'Cavalry Werewolf' APT Targets Russian Critical Infrastructure with Custom Malware

APT Group Cavalry Werewolf (YoroTrooper) Targets Russian Public Sector and Critical Industries with Custom Malware and SOCKS5 Proxying

HIGH
October 21, 2025
5m read
Threat ActorCyberattackMalware

Related Entities

Threat Actors

Cavalry WerewolfYoroTrooperSilent Lynx

Other

FoalShellStallionRATReverseSocks5Agent

Full Report

Executive Summary

Between May and August 2025, the threat actor group Cavalry Werewolf (also known as YoroTrooper and Silent Lynx) launched a cyber-espionage campaign targeting Russian organizations. The campaign focused on the public sector and critical industries, including energy, mining, and manufacturing. The group used spear-phishing as its primary initial access vector to deliver custom malware like FoalShell and StallionRAT. The attackers established persistence by modifying Windows Registry run keys and conducted extensive network reconnaissance. For command-and-control (C2), the group employed SOCKS5 proxying tools to tunnel traffic through specific IP addresses, including 96.9.125.168 and 78.128.112.209.

Threat Overview

Cavalry Werewolf's campaign was characterized by its targeted nature and focus on stealthy persistence. The attack began with spear-phishing emails crafted to look like official government correspondence, luring victims into executing the malicious payload. Once inside the network, the group's malware established a foothold. A key post-compromise technique was modifying the HKCU\Software\Microsoft\Windows\CurrentVersion\Run registry key to ensure the malware would execute automatically upon system startup. The attackers then systematically mapped the victim's network using standard reconnaissance commands (ipconfig, netstat, whoami). To exfiltrate data and maintain C2, the group used the ReverseSocks5Agent tool to proxy their traffic, making it harder to trace back to its origin. Artifacts found on compromised systems suggest the group may be expanding its targeting to include Tajikistan and the Middle East.

Technical Analysis

The TTPs used by Cavalry Werewolf are indicative of a resourceful espionage-focused group:

Impact Assessment

The compromise of critical infrastructure and public sector organizations in Russia could provide the threat actor's sponsors with valuable intelligence on Russia's industrial capacity, energy production, and government operations. The reconnaissance activities suggest the attackers are not conducting a smash-and-grab attack but are carefully mapping networks for long-term espionage or to identify high-value targets for further exploitation. The potential expansion of operations to Tajikistan and the Middle East indicates that Cavalry Werewolf is an active and evolving threat with broad strategic interests.

IOCs

Type Value Description
ip_address_v4 96.9.125.168 C2 server IP address.
destination_port 443 C2 communication port associated with 96.9.125.168.
ip_address_v4 78.128.112.209 C2 server IP address.
destination_port 10443 C2 communication port associated with 78.128.112.209.

Cyber Observables for Detection

Type Value Description
registry_key HKCU\Software\Microsoft\Windows\CurrentVersion\Run Monitor for any new or unauthorized programs being added to this key.
process_name ReverseSocks5Agent.exe Hunt for the execution of this specific proxy tool.
command_line_pattern netstat -an While a legitimate command, its execution by an unusual process or user can be an indicator of reconnaissance.

Detection & Response

  1. Network Traffic Filtering: Block outbound traffic to the known C2 IPs (96.9.125.168, 78.128.112.209) at the network perimeter. This is a direct application of D3-OTF: Outbound Traffic Filtering.
  2. Registry Monitoring: Use an EDR or FIM solution to monitor for and alert on any changes to the CurrentVersion\Run registry keys. This can provide early detection of the group's persistence mechanism. This falls under D3-SFA: System File Analysis (conceptually applied to registry).
  3. Process Monitoring: Correlate process execution with network activity. Create a detection rule that alerts when a process spawned from an email attachment (e.g., outlook.exe -> winword.exe -> cmd.exe) executes discovery commands like ipconfig or netstat. This is a form of D3-PA: Process Analysis.

Mitigation

  • User Training: Train users to be suspicious of unsolicited emails, even those that appear to be from official sources, and to report them to the security team (M1017 - User Training).
  • Email Security: Implement an email security gateway that can scan attachments for malware and block emails from suspicious sources.
  • Attack Surface Reduction (ASR): Use ASR rules to block Office applications from creating child processes, which would prevent the initial execution of the malware from a malicious document.
  • Egress Filtering: Implement strict egress filtering policies to block outbound connections on all ports except those that are explicitly required for business purposes. This can prevent the SOCKS5 proxy from connecting to its C2 server.

Timeline of Events

1
May 1, 2025
Start of the Cavalry Werewolf campaign targeting Russian entities.
2
August 31, 2025
End of the observed Cavalry Werewolf campaign period.
3
October 21, 2025
This article was published

MITRE ATT&CK Mitigations

Educate users to identify and report spear-phishing emails, which serve as the initial access vector for this threat actor.

Implement egress filtering to block connections to known malicious IPs and ports used by the SOCKS5 proxy C2.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Enable logging of process creation and registry modifications to detect the reconnaissance and persistence techniques used by Cavalry Werewolf.

D3FEND Defensive Countermeasures

To directly counter Cavalry Werewolf's C2 method, implement a strict outbound traffic filtering policy at the network edge. First, add the known malicious IPs (96.9.125.168 and 78.128.112.209) to a denylist. More strategically, adopt a default-deny egress policy, only allowing outbound traffic to known-good destinations on standard ports. Since the attackers used both standard (443) and non-standard (10443) ports, this policy would block the non-standard port communication and allow for closer inspection of the traffic on port 443, disrupting the SOCKS5 proxy C2 channel.

Deploy an EDR to monitor for the specific post-compromise behaviors of Cavalry Werewolf. Create detection rules that correlate process lineage with command-line execution. For example, an alert should be generated if a process originating from an email client (e.g., outlook.exe) spawns a shell that then executes a sequence of discovery commands like ipconfig, netstat, and whoami. This behavioral chain is a strong indicator of the reconnaissance phase of this specific attack and can provide early warning of a breach.

The attacker's use of the HKCU\...\CurrentVersion\Run key for persistence is a classic and detectable technique. Configure your EDR or a dedicated File/Registry Integrity Monitoring tool to generate a high-priority alert for any modification to this specific registry path. While legitimate installers sometimes write to this key, any changes on a user's machine outside of a managed software deployment should be investigated immediately. This provides a reliable method for detecting the malware's attempt to establish a persistent foothold on the compromised system.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CavalryWerewolfYoroTrooperAPTRussiaCriticalInfrastructureSpearphishingSOCKS5

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading