Cyber Espionage Targets Russian Aerospace with EAGLET Backdoor

Published:

spot_img

Jul 25, 2025Ravie LakshmananCyber Espionage / Malware

Cyber Espionage Targets Russian Aerospace Sector

Recent events highlight a new cyber espionage campaign aimed at Russia’s aerospace and defense sectors. This sophisticated attack, known as Operation CargoTalon, utilizes a malware backdoor termed EAGLET, which is designed to facilitate the unauthorized extraction of sensitive data from targeted networks.

Understanding Operation CargoTalon

Operation CargoTalon has been linked to a threat group designated as UNG0901 (Unknown Group 901). According to researchers at Seqrite Labs, this campaign specifically targets employees at the Voronezh Aircraft Production Association (VASO), a significant player in Russian aircraft manufacturing. The attackers leverage товарно-транспортная накладная (TTN) documents crucial for logistics operations in Russia, thereby enhancing the likelihood of deceiving their targets.

Phishing Techniques Employed

The initial attack phase begins with a spear-phishing email, themed around cargo deliveries. These emails contain a ZIP file that conceals a Windows shortcut (LNK) file. When executed, this file uses PowerShell to display a fake Microsoft Excel document while simultaneously deploying the EAGLET DLL implant onto the victim’s machine.

The Role of Decoy Documents

In a notable twist, the fake document references Obltransterminal, a Russian railway container terminal operator previously sanctioned by the U.S. Department of the Treasury in February 2024. This connection could lend the decoy added legitimacy, making it more likely for recipients to engage with the malicious attachment.

Capabilities of EAGLET

The EAGLET implant is engineered to collect critical system information and establish communication with a hard-coded remote server (IP: 185.225.17[.]104). This server processes HTTP responses and dictates commands for the compromised Windows system. The capabilities of EAGLET include remote shell access and the ability to upload and download files. However, the specifics of subsequent payloads delivered via this command-and-control method remain unclear due to the server’s current offline status.

Overlap with Other Threats

Seqrite has also pointed out parallels between EAGLET and activities targeting the Russian military sector, indicating a broader pattern of cyber threats against national entities. Notably, some features of EAGLET resemble those of PhantomDL, a backdoor known for its shell and file transfer functionalities. Researchers have also identified similarities in the naming conventions of phishing message attachments used in both campaigns.

Recent Developments in Cybersecurity

The disclosure of Operation CargoTalon coincides with reports of renewed activity from another Russian state-sponsored hacking group, known as UAC-0184 (or Hive0156), which has recently initiated new attacks against Ukrainian targets utilizing Remcos RAT. These operations have been observed over the past month.

Evolution of Malware Delivery

While UAC-0184 has history distributing Remcos RAT since early 2024, newer attack chains have streamlined the delivery methods. They now frequently utilize weaponized LNK or PowerShell files to facilitate the retrieval of decoy files along with the Hijack Loader (also known as IDAT Loader), which in turn launches Remcos RAT.

Implications for National Security

As the cyber landscape becomes increasingly complex, these incidents underscore the challenges faced by defense sectors in both Russia and Ukraine. The reliance on phishing tactics and malware demonstrates a fundamental shift toward more sophisticated, targeted attacks designed to exploit vulnerabilities in national security infrastructures.

The ongoing development of such threats highlights the necessity for robust cybersecurity measures to protect critical systems and sensitive information across various sectors, particularly in times of heightened geopolitical tension.

spot_img

Related articles

Recent articles

Cyberattacks Triple in UAE Amid Iran Conflict, Disrupting Businesses and Heightening Risks

Cyberattacks Triple in UAE Amid Iran Conflict, Disrupting Businesses and Heightening Risks Dubai | Bengaluru: As the US-Israel conflict with Iran enters a tentative pause,...

Cyber Insurance Data Strengthens CISOs’ Case for Cybersecurity Budgets

Cyber Insurance Data Strengthens CISOs' Case for Cybersecurity Budgets In an era where cyber threats are escalating, Chief Financial Officers (CFOs) and board members must...

UAE Accelerates AI Adoption Amidst Growing Security Challenges

UAE Accelerates AI Adoption Amidst Growing Security Challenges The rapid integration of artificial intelligence (AI) into organizational frameworks is reshaping the cybersecurity landscape, revealing significant...

IOCTA 2026 Report Highlights Escalating AI-Driven Cybercrime and Dark Web Challenges

IOCTA 2026 Report Highlights Escalating AI-Driven Cybercrime and Dark Web Challenges The recently released IOCTA 2026 report by Europol provides a comprehensive analysis of the...