Cyber Espionage Targets Russian Aerospace Sector
Recent events highlight a new cyber espionage campaign aimed at Russia’s aerospace and defense sectors. This sophisticated attack, known as Operation CargoTalon, utilizes a malware backdoor termed EAGLET, which is designed to facilitate the unauthorized extraction of sensitive data from targeted networks.
Understanding Operation CargoTalon
Operation CargoTalon has been linked to a threat group designated as UNG0901 (Unknown Group 901). According to researchers at Seqrite Labs, this campaign specifically targets employees at the Voronezh Aircraft Production Association (VASO), a significant player in Russian aircraft manufacturing. The attackers leverage товарно-транспортная накладная (TTN) documents crucial for logistics operations in Russia, thereby enhancing the likelihood of deceiving their targets.
Phishing Techniques Employed
The initial attack phase begins with a spear-phishing email, themed around cargo deliveries. These emails contain a ZIP file that conceals a Windows shortcut (LNK) file. When executed, this file uses PowerShell to display a fake Microsoft Excel document while simultaneously deploying the EAGLET DLL implant onto the victim’s machine.
The Role of Decoy Documents
In a notable twist, the fake document references Obltransterminal, a Russian railway container terminal operator previously sanctioned by the U.S. Department of the Treasury in February 2024. This connection could lend the decoy added legitimacy, making it more likely for recipients to engage with the malicious attachment.
Capabilities of EAGLET
The EAGLET implant is engineered to collect critical system information and establish communication with a hard-coded remote server (IP: 185.225.17[.]104). This server processes HTTP responses and dictates commands for the compromised Windows system. The capabilities of EAGLET include remote shell access and the ability to upload and download files. However, the specifics of subsequent payloads delivered via this command-and-control method remain unclear due to the server’s current offline status.
Overlap with Other Threats
Seqrite has also pointed out parallels between EAGLET and activities targeting the Russian military sector, indicating a broader pattern of cyber threats against national entities. Notably, some features of EAGLET resemble those of PhantomDL, a backdoor known for its shell and file transfer functionalities. Researchers have also identified similarities in the naming conventions of phishing message attachments used in both campaigns.
Recent Developments in Cybersecurity
The disclosure of Operation CargoTalon coincides with reports of renewed activity from another Russian state-sponsored hacking group, known as UAC-0184 (or Hive0156), which has recently initiated new attacks against Ukrainian targets utilizing Remcos RAT. These operations have been observed over the past month.
Evolution of Malware Delivery
While UAC-0184 has history distributing Remcos RAT since early 2024, newer attack chains have streamlined the delivery methods. They now frequently utilize weaponized LNK or PowerShell files to facilitate the retrieval of decoy files along with the Hijack Loader (also known as IDAT Loader), which in turn launches Remcos RAT.
Implications for National Security
As the cyber landscape becomes increasingly complex, these incidents underscore the challenges faced by defense sectors in both Russia and Ukraine. The reliance on phishing tactics and malware demonstrates a fundamental shift toward more sophisticated, targeted attacks designed to exploit vulnerabilities in national security infrastructures.
The ongoing development of such threats highlights the necessity for robust cybersecurity measures to protect critical systems and sensitive information across various sectors, particularly in times of heightened geopolitical tension.


