'Bloody Wolf' APT Deploys NetSupport RAT in Espionage Campaign

'Bloody Wolf' APT Targets Russia and Uzbekistan with NetSupport RAT in Financial and Espionage Attacks

HIGH
February 9, 2026
5m read
Threat ActorCyberattackMalware

Related Entities

Threat Actors

Bloody Wolf

Organizations

Kaspersky

Other

NetSupport RATSTRRAT

Full Report

Executive Summary

An ongoing spear-phishing campaign by the threat actor known as Bloody Wolf (tracked by Kaspersky as Stan Ghouls) is targeting organizations in Uzbekistan and Russia. The campaign, which has compromised approximately 60 victims, leverages the legitimate remote access tool NetSupport RAT to gain full control over infected systems. The attackers' targeting is broad, encompassing manufacturing, finance, IT, and government sectors, suggesting a dual motive of financial gain and cyber espionage. The attack begins with a phishing email containing a malicious LNK file disguised as a PDF within a password-protected ZIP archive. This campaign represents a tactical evolution for Bloody Wolf, which has shifted from using STRRAT malware to abusing a legitimate commercial tool for its operations, a technique known as Living off the Land (LotL).

Threat Overview

  • Threat Actor: Bloody Wolf (also known as Stan Ghouls).
  • Activity Period: Active since at least 2023.
  • Targets: Approximately 60 victims, with 50 in Uzbekistan and 10 in Russia. Targeted sectors include manufacturing, finance, IT, government, logistics, healthcare, and education.
  • Motive: Appears to be a hybrid of financial crime (targeting financial institutions) and cyber espionage (broad targeting and use of a RAT).
  • Payload: NetSupport RAT, a commercially available remote administration tool.
  • Initial Access Vector: Spear-phishing emails containing a password-protected ZIP archive. (T1566.001 - Spearphishing Attachment)

Technical Analysis

The attack chain is straightforward and relies on tricking the user into executing the initial payload.

  1. Delivery: The victim receives a phishing email with a password-protected ZIP file. Including the password in the email body is a common tactic to bypass automated email gateway scanners, which cannot inspect the archive's contents.
  2. Lure: Inside the ZIP archive is a Windows shortcut (LNK) file that is disguised with a PDF icon and a deceptive name to trick the user into double-clicking it. (T1204.002 - Malicious File)
  3. Execution: When the LNK file is executed, it runs a command to download a loader from an external domain. (T1218.005 - Msiexec or similar LOLBins are often used by LNK files).
  4. Payload Installation: The loader checks if NetSupport RAT is already installed. If not, it downloads the RAT from an attacker-controlled server and executes it.
  5. Persistence: To ensure it survives a reboot, the malware creates an autorun script in the Windows Startup folder, which re-launches the RAT every time the user logs in. (T1547.001 - Registry Run Keys / Startup Folder)
  6. Command and Control: Once installed, the NetSupport RAT connects to the attacker's C2 server, giving them complete remote control over the victim's machine. They can then perform actions such as file transfer, keystroke logging, screen viewing, and executing further commands.

The use of a legitimate tool like NetSupport RAT is a classic Living off the Land, Binaries, and Scripts (LOLBAS) technique. It allows the attackers' activity to blend in with normal administrative traffic, making detection more difficult for security tools that rely on blacklisting known malicious files.

Impact Assessment

  • Espionage: With full remote access, the attackers can steal sensitive corporate data, intellectual property, government documents, and financial information.
  • Financial Theft: The focus on financial institutions suggests the attackers may use their access to commit fraud, such as initiating unauthorized wire transfers.
  • Further Compromise: The compromised machine can be used as a pivot point to move laterally within the victim's network, leading to a much wider breach.
  • Installation of Other Malware: The RAT provides a channel for the attackers to deploy additional malware, such as ransomware or banking trojans.

Detection & Response

  • Network Traffic Monitoring: Monitor for network traffic associated with NetSupport RAT, especially connections from general user workstations to external IP addresses on the default NetSupport ports (e.g., TCP 5405). Since it's a legitimate tool, context is key. An IT admin using it is normal; a user in the accounting department having it run is not.
  • Endpoint Detection: Use an EDR to alert on the installation and execution of client32.exe, the main executable for NetSupport. Look for the specific process chain of a LNK file leading to the download and execution of a new program.
  • Log Analysis: Analyze logs for the creation of files or scripts in the Startup folder (%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup).
  • Email Security: While scanning password-protected ZIPs is difficult, email gateways can be configured to flag or block such attachments for manual review, especially from untrusted senders.

Mitigation

  • Application Control: Implement application allow-listing to prevent unauthorized software like NetSupport RAT from being installed or executed on user endpoints. If NetSupport is not a sanctioned tool in your environment, it should be explicitly blocked.
  • User Training: Train users to be suspicious of emails with password-protected attachments and to never execute files from untrusted sources, especially LNK files disguised as documents.
  • Attack Surface Reduction: Configure Windows to show file extensions by default. This makes it easier for users to see that a file is a .lnk (a shortcut) and not a .pdf (a document).
  • PowerShell Hardening: Use constrained language mode and script block logging for PowerShell to limit the capabilities of malicious scripts and improve visibility into their execution.

Timeline of Events

1
February 9, 2026
This article was published

MITRE ATT&CK Mitigations

Application allow-listing can prevent the execution of unauthorized remote access tools like NetSupport RAT if it is not approved for use in the environment.

Mapped D3FEND Techniques:

Training users to recognize phishing attempts, especially those with suspicious attachments like password-protected ZIPs and LNK files, is a key preventative measure.

Blocking outbound connections on ports used by remote access tools like NetSupport RAT (e.g., TCP 5405) can prevent the malware from connecting to its C2 server.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To counter the 'Bloody Wolf' campaign's abuse of a legitimate tool, executable allowlisting is a highly effective control. Since NetSupport RAT is commercial software, its executables (like client32.exe) are signed and may not be flagged as malicious by traditional antivirus. An allowlisting approach, however, would block its execution by default on all systems where it is not explicitly authorized. Security teams should create a policy that only permits known, approved applications to run on user endpoints. If NetSupport is not used for legitimate IT administration, it should not be on the allowlist. This prevents the payload from running, even if a user is tricked into executing the initial LNK file. This D3FEND technique effectively neutralizes the attacker's 'Living off the Land' strategy by treating any unauthorized legitimate tool as malicious.

Detecting this attack requires analyzing process lineage. An EDR solution should be configured to alert on suspicious parent-child process relationships. In this campaign, the chain would look something like explorer.exe (user double-clicks LNK) -> cmd.exe or powershell.exe (executed by the LNK file) -> network connection to download the loader -> execution of the NetSupport RAT installer. This is an anomalous chain of events. A user's file explorer should not be leading to the installation of a remote access tool. By creating detection rules that look for this specific sequence of process creation and network activity, security teams can identify the attack at the execution stage, before the RAT is fully installed and connected to its C2 server. This provides a critical window for automated or manual intervention.

Sources & References

Cybersecurity News
WIU Cybersecurity (wiu.edu) February 9, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Bloody WolfAPTNetSupport RATSpear-phishingUzbekistanRussiaLOLBAS

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading