Between May and August 2025, the threat actor group Cavalry Werewolf (also known as YoroTrooper and Silent Lynx) launched a cyber-espionage campaign targeting Russian organizations. The campaign focused on the public sector and critical industries, including energy, mining, and manufacturing. The group used spear-phishing as its primary initial access vector to deliver custom malware like FoalShell and StallionRAT. The attackers established persistence by modifying Windows Registry run keys and conducted extensive network reconnaissance. For command-and-control (C2), the group employed SOCKS5 proxying tools to tunnel traffic through specific IP addresses, including 96.9.125.168 and 78.128.112.209.
Cavalry Werewolf's campaign was characterized by its targeted nature and focus on stealthy persistence. The attack began with spear-phishing emails crafted to look like official government correspondence, luring victims into executing the malicious payload. Once inside the network, the group's malware established a foothold. A key post-compromise technique was modifying the HKCU\Software\Microsoft\Windows\CurrentVersion\Run registry key to ensure the malware would execute automatically upon system startup. The attackers then systematically mapped the victim's network using standard reconnaissance commands (ipconfig, netstat, whoami). To exfiltrate data and maintain C2, the group used the ReverseSocks5Agent tool to proxy their traffic, making it harder to trace back to its origin. Artifacts found on compromised systems suggest the group may be expanding its targeting to include Tajikistan and the Middle East.
The TTPs used by Cavalry Werewolf are indicative of a resourceful espionage-focused group:
T1566.001 - Spearphishing Attachment. The use of targeted emails with malicious attachments disguised as official documents is a classic APT tactic.T1547.001 - Registry Run Keys / Startup Folder. Modifying this registry key is one of the most common and effective methods for achieving persistence on Windows systems.ipconfig (T1016 - System Network Configuration Discovery), netstat (T1049 - System Network Connections Discovery), and whoami (T1033 - System Owner/User Discovery) shows a systematic approach to understanding the compromised environment before deciding on the next action.T1090.002 - External Proxy. Using a SOCKS5 proxy like ReverseSocks5Agent allows the attacker to tunnel various types of traffic (e.g., RDP, SMB) through the C2 channel and obfuscate the true destination of exfiltrated data.The compromise of critical infrastructure and public sector organizations in Russia could provide the threat actor's sponsors with valuable intelligence on Russia's industrial capacity, energy production, and government operations. The reconnaissance activities suggest the attackers are not conducting a smash-and-grab attack but are carefully mapping networks for long-term espionage or to identify high-value targets for further exploitation. The potential expansion of operations to Tajikistan and the Middle East indicates that Cavalry Werewolf is an active and evolving threat with broad strategic interests.
| Type | Value | Description |
|---|---|---|
ip_address_v4 |
96.9.125.168 |
C2 server IP address. |
destination_port |
443 |
C2 communication port associated with 96.9.125.168. |
ip_address_v4 |
78.128.112.209 |
C2 server IP address. |
destination_port |
10443 |
C2 communication port associated with 78.128.112.209. |
| Type | Value | Description |
|---|---|---|
registry_key |
HKCU\Software\Microsoft\Windows\CurrentVersion\Run |
Monitor for any new or unauthorized programs being added to this key. |
process_name |
ReverseSocks5Agent.exe |
Hunt for the execution of this specific proxy tool. |
command_line_pattern |
netstat -an |
While a legitimate command, its execution by an unusual process or user can be an indicator of reconnaissance. |
96.9.125.168, 78.128.112.209) at the network perimeter. This is a direct application of D3-OTF: Outbound Traffic Filtering.CurrentVersion\Run registry keys. This can provide early detection of the group's persistence mechanism. This falls under D3-SFA: System File Analysis (conceptually applied to registry).outlook.exe -> winword.exe -> cmd.exe) executes discovery commands like ipconfig or netstat. This is a form of D3-PA: Process Analysis.M1017 - User Training).Educate users to identify and report spear-phishing emails, which serve as the initial access vector for this threat actor.
Implement egress filtering to block connections to known malicious IPs and ports used by the SOCKS5 proxy C2.
Mapped D3FEND Techniques:
To directly counter Cavalry Werewolf's C2 method, implement a strict outbound traffic filtering policy at the network edge. First, add the known malicious IPs (96.9.125.168 and 78.128.112.209) to a denylist. More strategically, adopt a default-deny egress policy, only allowing outbound traffic to known-good destinations on standard ports. Since the attackers used both standard (443) and non-standard (10443) ports, this policy would block the non-standard port communication and allow for closer inspection of the traffic on port 443, disrupting the SOCKS5 proxy C2 channel.
Deploy an EDR to monitor for the specific post-compromise behaviors of Cavalry Werewolf. Create detection rules that correlate process lineage with command-line execution. For example, an alert should be generated if a process originating from an email client (e.g., outlook.exe) spawns a shell that then executes a sequence of discovery commands like ipconfig, netstat, and whoami. This behavioral chain is a strong indicator of the reconnaissance phase of this specific attack and can provide early warning of a breach.
The attacker's use of the HKCU\...\CurrentVersion\Run key for persistence is a classic and detectable technique. Configure your EDR or a dedicated File/Registry Integrity Monitoring tool to generate a high-priority alert for any modification to this specific registry path. While legitimate installers sometimes write to this key, any changes on a user's machine outside of a managed software deployment should be investigated immediately. This provides a reliable method for detecting the malware's attempt to establish a persistent foothold on the compromised system.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats