An ongoing spear-phishing campaign by the threat actor known as Bloody Wolf (tracked by Kaspersky as Stan Ghouls) is targeting organizations in Uzbekistan and Russia. The campaign, which has compromised approximately 60 victims, leverages the legitimate remote access tool NetSupport RAT to gain full control over infected systems. The attackers' targeting is broad, encompassing manufacturing, finance, IT, and government sectors, suggesting a dual motive of financial gain and cyber espionage. The attack begins with a phishing email containing a malicious LNK file disguised as a PDF within a password-protected ZIP archive. This campaign represents a tactical evolution for Bloody Wolf, which has shifted from using STRRAT malware to abusing a legitimate commercial tool for its operations, a technique known as Living off the Land (LotL).
T1566.001 - Spearphishing Attachment)The attack chain is straightforward and relies on tricking the user into executing the initial payload.
T1204.002 - Malicious File)T1218.005 - Msiexec or similar LOLBins are often used by LNK files).T1547.001 - Registry Run Keys / Startup Folder)The use of a legitimate tool like NetSupport RAT is a classic Living off the Land, Binaries, and Scripts (LOLBAS) technique. It allows the attackers' activity to blend in with normal administrative traffic, making detection more difficult for security tools that rely on blacklisting known malicious files.
client32.exe, the main executable for NetSupport. Look for the specific process chain of a LNK file leading to the download and execution of a new program.%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup)..lnk (a shortcut) and not a .pdf (a document).Application allow-listing can prevent the execution of unauthorized remote access tools like NetSupport RAT if it is not approved for use in the environment.
Mapped D3FEND Techniques:
Training users to recognize phishing attempts, especially those with suspicious attachments like password-protected ZIPs and LNK files, is a key preventative measure.
Blocking outbound connections on ports used by remote access tools like NetSupport RAT (e.g., TCP 5405) can prevent the malware from connecting to its C2 server.
Mapped D3FEND Techniques:
To counter the 'Bloody Wolf' campaign's abuse of a legitimate tool, executable allowlisting is a highly effective control. Since NetSupport RAT is commercial software, its executables (like client32.exe) are signed and may not be flagged as malicious by traditional antivirus. An allowlisting approach, however, would block its execution by default on all systems where it is not explicitly authorized. Security teams should create a policy that only permits known, approved applications to run on user endpoints. If NetSupport is not used for legitimate IT administration, it should not be on the allowlist. This prevents the payload from running, even if a user is tricked into executing the initial LNK file. This D3FEND technique effectively neutralizes the attacker's 'Living off the Land' strategy by treating any unauthorized legitimate tool as malicious.
Detecting this attack requires analyzing process lineage. An EDR solution should be configured to alert on suspicious parent-child process relationships. In this campaign, the chain would look something like explorer.exe (user double-clicks LNK) -> cmd.exe or powershell.exe (executed by the LNK file) -> network connection to download the loader -> execution of the NetSupport RAT installer. This is an anomalous chain of events. A user's file explorer should not be leading to the installation of a remote access tool. By creating detection rules that look for this specific sequence of process creation and network activity, security teams can identify the attack at the execution stage, before the RAT is fully installed and connected to its C2 server. This provides a critical window for automated or manual intervention.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats