Cybersecurity Threat: Bloody Wolf’s Campaign in Central Asia
Introducing the Cyber Threat
The hacking group known as Bloody Wolf has emerged as a significant cyber threat, particularly within Kyrgyzstan and increasingly Uzbekistan. This group has been linked to a series of cyberattacks that began in June 2025 with the intent of deploying the NetSupport Remote Access Trojan (RAT). Recent reports by researchers from Group-IB, specifically Amirbek Kurbanov and Volen Kayo, highlight how this group has adapted its strategies to target critical sectors such as finance, government, and information technology.
Expansion of Attack Vectors
Initial activity of Bloody Wolf was concentrated on Kyrgyzstan, but by October 2025, the group’s focus expanded to Uzbekistan. The strategic shift appears to involve impersonation of governmental bodies, notably the Ministry of Justice of Kyrgyzstan. Attackers have been using seemingly official PDF documents and domain names that closely mimic legitimate government resources to lure victims into downloading malicious Java Archive (JAR) files.
Combining Techniques: Social Engineering and Malware
The effectiveness of Bloody Wolf’s operations lies in its combination of social engineering and accessible technological tools. By utilizing emails that appear to come from trusted government entities, the group lowers the defenses of potential targets. These emails often contain links that, when clicked, initiate the download of JAR files disguised as necessary for viewing important documents. Victims are misled into thinking that installing Java Runtime is harmless or even required.
The Mechanism of Infection
Once the seemingly innocent loader is executed, it connects to attacker-controlled servers to download the actual payload—the NetSupport RAT. This process establishes persistence on the victim’s system through several methods:
- Creating a scheduled task
- Modifying the Windows Registry
- Dropping a batch script in the Startup folder
These techniques signify a deliberate and technical approach to maintaining access even after initial detection attempts.
Geofencing Strategies in Uzbekistan
The campaign targeting Uzbekistan includes a notable feature: geofencing restrictions. When requests originate from outside the country, users are redirected to the legitimate government site data.egov[.]uz. However, those accessing the site from within Uzbekistan find that their requests trigger the download of the malicious JAR file contained in the PDF attachment. This strategic twist ensures that only local targets are at risk from these attacks.
Technical Insights into the Attack
The JAR loaders employed by Bloody Wolf were found to be based on Java 8, which has been available since March 2014. This choice suggests that the attackers may be utilizing a customized generator or template to fabricate these malicious files. Additionally, the version of the NetSupport RAT used in these operations is an older variant, dating back to October 2013.
Implications for Cybersecurity
Group-IB’s analysis emphasizes how commercially accessible tools can be repurposed for sophisticated cyber operations. By exploiting trust in government institutions, Bloody Wolf effectively navigates through security measures to launch targeted attacks within Central Asia. This highlights a growing trend where cybercriminals leverage simple, yet effective, tactics to gain footholds in various regions.
Conclusion
As the cyber threat landscape continues to evolve, employers and institutions within Central Asia should remain vigilant. Understanding the tactics employed by hacking groups like Bloody Wolf is crucial for developing effective defenses. The blending of social engineering with malware attacks poses ongoing challenges for cybersecurity, particularly in sensitive governmental and financial institutions.


