The Advanced Persistent Threat (APT) group Operation ForumTroll has resurfaced with a new espionage campaign specifically targeting Russian academics and political scientists. According to research from Securelist, the campaign, observed in the fall of 2025, uses a highly targeted phishing methodology. The attackers impersonate eLibrary.ru, a prominent Russian scientific library, and send personalized emails about fake plagiarism reports. The attack chain is designed to trick the victim into executing a malicious LNK file, which ultimately installs the Tuoni command-and-control (C2) framework. This campaign demonstrates the group's continued focus on intelligence gathering within Russia and Belarus and its consistent use of established TTPs, including COM Hijacking for persistence.
Operation ForumTroll, active since at least 2022, follows a patient and well-researched approach to its operations.
e-library[.]wiki in March 2025, more than six months before the campaign's launch, to age the domain and improve its reputation to bypass security filters.T1566.001 - Spearphishing Attachment): The target receives a personalized email from a spoofed address mimicking eLibrary.ru. The email prompts the victim to download a plagiarism report concerning their work.Ivanov_Ivan_Ivanovich.zip) to increase its perceived legitimacy.T1204.002 - Malicious File): Inside the archive is a Windows shortcut file (.LNK). When the victim clicks the LNK file, it executes a PowerShell script.T1059.001 - PowerShell) downloads and installs the Tuoni C2 framework, establishing a backdoor on the victim's machine.T1546.015 - Component Object Model Hijacking) to ensure their backdoor survives reboots.This campaign is a classic example of targeted espionage. The use of personalized lures and victim-specific filenames demonstrates that the attackers perform significant reconnaissance on their targets before launching the attack. The long domain registration period is a common APT tactic to evade reputation-based security tools.
The infection chain, using a ZIP -> LNK -> PowerShell sequence, is a popular method for bypassing email gateways that might block executable files but allow archives and shortcuts. The Tuoni C2 framework is a known tool, suggesting the group is comfortable with its existing toolkit rather than developing novel malware for this campaign. The targeting of academics in political science indicates a clear intelligence-gathering motive, likely aimed at accessing sensitive research, government contacts, or pre-publication policy analysis.
The impact of this campaign is not financial but strategic. A successful compromise could lead to:
| Type | Value | Description |
|---|---|---|
| Domain | e-library[.]wiki |
Malicious domain used for C2 and payload delivery |
powershell.exe. This is a high-fidelity indicator of this type of attack.e-library[.]wiki at the network perimeter.D3-SFA: System File Analysis: Hunt for persistence established via COM Hijacking by monitoring for suspicious modifications to relevant registry keys under HKEY_CLASSES_ROOT\CLSID.M1017 - User Training): While these are targeted attacks, training users to be suspicious of unsolicited attachments, even if they appear personalized, is crucial. Specifically, train them on the dangers of LNK files within ZIP archives..lnk file masquerading as a document.M1038 - Execution Prevention): Use application control policies to restrict the execution of PowerShell scripts for users who do not require it for their job function.Educating targeted user groups about the specific TTPs used by APTs, such as LNK files in ZIP archives and personalized lures, is a key defense.
Use application control to restrict PowerShell execution, preventing the second stage of the attack from running.
To detect the specific TTPs of Operation ForumTroll, security teams should leverage EDR to monitor for suspicious process chains. A high-fidelity detection rule can be created to alert whenever a user action on a .LNK file (parent process explorer.exe) results in the execution of powershell.exe. This is a known and highly suspicious attack pattern. The alert should include the full command line of the PowerShell execution, which would reveal the download cradle used to fetch the Tuoni C2 implant. This allows for rapid identification of the initial compromise, enabling incident responders to isolate the host and prevent the espionage objective from being achieved.
A simple yet effective countermeasure is to block access to the known command-and-control infrastructure. The domain e-library[.]wiki should be immediately added to the organization's DNS sinkhole or web proxy blocklist. This action serves two purposes: first, it prevents any newly compromised host from successfully downloading the Tuoni C2 payload, breaking the infection chain. Second, any host that is already compromised will generate an alert when it attempts to contact the C2 domain for instructions. This turns a preventative control into a detective one, allowing security teams to identify already-compromised machines within the network that are attempting to beacon out.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats