πŸ”΄ HIGHintel

Bloody Wolf - Java NetSupport RAT Targets Kyrgyzstan and Uzbekistan

Category:Threat Alerts
Bloody Wolf is deploying Java-based NetSupport RAT variants across Central Asia, specifically targeting government and critical infrastructure in Kyrgyzstan and Uzbekistan. What's clever: using Java ensures cross-platform compatibility and evades Windows-focused defensive tools common in the region. The campaign uses spearphishing with geopolitical lures related to regional border tensions and economic disputes. NetSupport RAT provides full remote access, keylogging, screen capture, and file exfiltration capabilities. The Java implementation allows the malware to run on Windows, Linux, and macOS systems commonly found in government environments. Kaspersky's telemetry shows persistent targeting of foreign affairs ministries, energy sector entities, and telecommunications providers. Classic espionage tradecraft focused on strategic intelligence collection rather than financial crime.

🎯CORTEX Protocol Intelligence Assessment

Business Impact: Bloody Wolfs NetSupport RAT campaign threatens financial institutions, government entities, and IT service providers in Central Asia with stealthy remote access that can support espionage, fraud, and disruptive operations. Successful compromises may expose sensitive case files, citizen data, and financial records, damaging public trust and regional stability while imposing incident response and remediation costs on already resource-constrained organizations. Technical Context: The group leverages T1566 spear-phishing with ministry-themed lures to deliver Java-based loaders aligned with T1204 that execute within local runtimes and then use T1105 to fetch and run repackaged NetSupport Manager components. Geofencing and use of legitimate remote tools make traditional global malware tracking less effective, requiring localized telemetry and behavioral analytics for reliable detection.

⚑Strategic Intelligence Guidance

  • Block or heavily restrict execution of Java Archive files originating from email attachments or internet downloads, and reassess whether Java is required on end-user desktops at all.
  • Enhance phishing detection and user awareness specifically around government ministry themed lures, including fake justice department or regulatory communications targeting finance and government staff.
  • Deploy endpoint and network detection focused on NetSupport RAT behavior, such as remote sessions initiated from unusual hosts, new scheduled tasks, and suspicious persistence mechanisms.
  • Implement network segmentation and role-based access controls so that compromise of a single workstation does not grant direct access to high-value databases, domain controllers, or critical application servers.

Vendors

NetSupport

Threats

Bloody WolfNetSupport RAT

Targets

financial institutions in Kyrgyzstangovernment agencies in UzbekistanIT service providers in Central Asia