🔴 HIGHintel

Bloody Wolf Expands Java-Based NetSupport RAT Campaign in Central Asia

Category:Threat Alerts
Bloody Wolf, a Central Asian threat group, expanded its Java-based NetSupport RAT campaign from Kyrgyzstan into Uzbekistan since June 2025, targeting finance, government, and IT organizations. The campaign uses weaponized JAR files delivered via phishing emails impersonating Kyrgyzstan's Ministry of Justice through official-looking PDFs and domains. What's clever: Bloody Wolf leverages NetSupport Manager, a legitimate remote administration tool from 2013, as malware—allowing C2 traffic to blend with normal IT support activity. The JAR payloads execute within Java runtime environments that many EDR solutions trust implicitly. Group-IB researchers found the Uzbekistan phase incorporates geofencing—requests from outside Uzbekistan redirect to legitimate government websites, while requests from within trigger malicious downloads. The group maintains effectiveness through low-cost, commercially available tools weaponized with social engineering.

🎯CORTEX Protocol Intelligence Assessment

Business Impact: Bloody Wolf’s NetSupport RAT campaign threatens financial institutions, government agencies, and IT providers in Central Asia with long-term surveillance, credential theft, and data exfiltration using seemingly legitimate remote support tooling. The impersonation of justice and government ministries also degrades trust in official communications and amplifies phishing risk across the region. Technical Context: The campaign relies on spear-phishing (T1566) to deliver Java 8-based JAR loaders that download and run a repackaged NetSupport RAT, with persistence via scheduled tasks, registry keys, and startup scripts, mapped to T1204 and T1105. Geofencing techniques ensure only in-country victims receive malicious payloads, complicating external analysis and threat hunting.

Strategic Intelligence Guidance

  • Block or heavily restrict execution of Java Archive (JAR) files from email attachments and web downloads, and review whether Java is required on end-user systems at all.
  • Enhance phishing detection for government-themed lures and run focused awareness campaigns in finance, government, and IT sectors about fake ministry emails and Java update prompts.
  • Deploy endpoint detection rules for NetSupport RAT behavior, including suspicious use of legacy NetSupport Manager binaries and the creation of scheduled tasks and startup scripts.
  • Segment internal networks to limit lateral movement from compromised workstations and implement strict role-based access controls so Bloody Wolf operators cannot easily escalate privileges.

Vendors

NetSupport

Threats

Bloody WolfNetSupport RAT

Targets

financial institutions in Kyrgyzstangovernment agencies in UzbekistanIT service providers in Central Asia