"Operation ForumTroll" APT Targets Russian Academics with Plagiarism Lure

Operation ForumTroll APT Resurfaces, Targeting Russian Academics with Phishing Campaign Deploying Tuoni C2

HIGH
December 18, 2025
4m read
Threat ActorPhishingCyberattack

Related Entities

Threat Actors

Operation ForumTroll

Products & Tech

PowerShell

Other

TuonieLibrary.ru

Full Report

Executive Summary

The Advanced Persistent Threat (APT) group Operation ForumTroll has resurfaced with a new espionage campaign specifically targeting Russian academics and political scientists. According to research from Securelist, the campaign, observed in the fall of 2025, uses a highly targeted phishing methodology. The attackers impersonate eLibrary.ru, a prominent Russian scientific library, and send personalized emails about fake plagiarism reports. The attack chain is designed to trick the victim into executing a malicious LNK file, which ultimately installs the Tuoni command-and-control (C2) framework. This campaign demonstrates the group's continued focus on intelligence gathering within Russia and Belarus and its consistent use of established TTPs, including COM Hijacking for persistence.


Threat Overview

Operation ForumTroll, active since at least 2022, follows a patient and well-researched approach to its operations.

  1. Preparation: The attackers registered the malicious domain e-library[.]wiki in March 2025, more than six months before the campaign's launch, to age the domain and improve its reputation to bypass security filters.
  2. Initial Access (T1566.001 - Spearphishing Attachment): The target receives a personalized email from a spoofed address mimicking eLibrary.ru. The email prompts the victim to download a plagiarism report concerning their work.
  3. Social Engineering: The downloaded ZIP archive is named using the victim's full name (e.g., Ivanov_Ivan_Ivanovich.zip) to increase its perceived legitimacy.
  4. Execution (T1204.002 - Malicious File): Inside the archive is a Windows shortcut file (.LNK). When the victim clicks the LNK file, it executes a PowerShell script.
  5. C2 Implantation: The PowerShell script (T1059.001 - PowerShell) downloads and installs the Tuoni C2 framework, establishing a backdoor on the victim's machine.
  6. Persistence: The group is known to use COM Hijacking (T1546.015 - Component Object Model Hijacking) to ensure their backdoor survives reboots.

Technical Analysis

This campaign is a classic example of targeted espionage. The use of personalized lures and victim-specific filenames demonstrates that the attackers perform significant reconnaissance on their targets before launching the attack. The long domain registration period is a common APT tactic to evade reputation-based security tools.

The infection chain, using a ZIP -> LNK -> PowerShell sequence, is a popular method for bypassing email gateways that might block executable files but allow archives and shortcuts. The Tuoni C2 framework is a known tool, suggesting the group is comfortable with its existing toolkit rather than developing novel malware for this campaign. The targeting of academics in political science indicates a clear intelligence-gathering motive, likely aimed at accessing sensitive research, government contacts, or pre-publication policy analysis.

Impact Assessment

The impact of this campaign is not financial but strategic. A successful compromise could lead to:

  • Espionage: Theft of sensitive academic research, intellectual property, and data related to national policy or international relations.
  • Compromise of Networks: The compromised academic's account or machine could be used as a stepping stone to pivot into university or government networks.
  • Information Operations: Stolen research or communications could be leaked or manipulated as part of a disinformation campaign.

IOCs

Type Value Description
Domain e-library[.]wiki Malicious domain used for C2 and payload delivery

Detection & Response

  • PowerShell Logging: Ensure comprehensive PowerShell script block logging is enabled across all endpoints. Analyze logs for suspicious scripts, especially those executed via LNK files or containing download cradles.
  • EDR Monitoring: Use an EDR solution to monitor for the specific attack chain: a LNK file execution that spawns powershell.exe. This is a high-fidelity indicator of this type of attack.
  • Network Filtering: Block the known malicious domain e-library[.]wiki at the network perimeter.
  • D3FEND Technique - D3-SFA: System File Analysis: Hunt for persistence established via COM Hijacking by monitoring for suspicious modifications to relevant registry keys under HKEY_CLASSES_ROOT\CLSID.

Mitigation

  • User Training (M1017 - User Training): While these are targeted attacks, training users to be suspicious of unsolicited attachments, even if they appear personalized, is crucial. Specifically, train them on the dangers of LNK files within ZIP archives.
  • Attack Surface Reduction: Configure Windows to show file extensions by default, making it easier for users to spot a .lnk file masquerading as a document.
  • Execution Prevention (M1038 - Execution Prevention): Use application control policies to restrict the execution of PowerShell scripts for users who do not require it for their job function.

Timeline of Events

1
January 1, 2022
Operation ForumTroll has been active since at least 2022.
2
March 1, 2025
The malicious domain e-library.wiki was registered.
3
October 1, 2025
The new phishing campaign targeting Russian academics was observed in the fall of 2025.
4
December 18, 2025
This article was published

MITRE ATT&CK Mitigations

Educating targeted user groups about the specific TTPs used by APTs, such as LNK files in ZIP archives and personalized lures, is a key defense.

Use application control to restrict PowerShell execution, preventing the second stage of the attack from running.

Mapped D3FEND Techniques:

Audit

M1047enterprise

Enable and collect detailed logs, especially PowerShell script block logging, to facilitate detection and investigation of such attacks.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To detect the specific TTPs of Operation ForumTroll, security teams should leverage EDR to monitor for suspicious process chains. A high-fidelity detection rule can be created to alert whenever a user action on a .LNK file (parent process explorer.exe) results in the execution of powershell.exe. This is a known and highly suspicious attack pattern. The alert should include the full command line of the PowerShell execution, which would reveal the download cradle used to fetch the Tuoni C2 implant. This allows for rapid identification of the initial compromise, enabling incident responders to isolate the host and prevent the espionage objective from being achieved.

A simple yet effective countermeasure is to block access to the known command-and-control infrastructure. The domain e-library[.]wiki should be immediately added to the organization's DNS sinkhole or web proxy blocklist. This action serves two purposes: first, it prevents any newly compromised host from successfully downloading the Tuoni C2 payload, breaking the infection chain. Second, any host that is already compromised will generate an alert when it attempts to contact the C2 domain for instructions. This turns a preventative control into a detective one, allowing security teams to identify already-compromised machines within the network that are attempting to beacon out.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

APTForumTrollPhishingEspionageRussiaTuoniLNK

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading