Skip to content

Cavalry Werewolf Phishing Campaign Targets Russian Agencies

A sophisticated phishing campaign, 'Cavalry Werewolf', has been targeting Russian state agencies and enterprises. The group uses malware-laced emails to gain access to systems, focusing on energy, mining, and manufacturing sectors.

Graffiti is on the train. These are cables. Background there are houses with windows.
Graffiti is on the train. These are cables. Background there are houses with windows.

Cavalry Werewolf Phishing Campaign Targets Russian Agencies

Cybersecurity experts have uncovered a sophisticated phishing campaign, dubbed 'Cavalry Werewolf', targeting Russian state agencies and enterprises between May and August 2025. Disguised as official correspondence from Kyrgyz government officials, the group sent spear-phishing emails containing malware.

The group, active since at least 2021, impersonated government officials to trick targets into opening RAR archives. These archives deployed either FoalShell or StallionRAT malware. FoalShell enables attackers to execute arbitrary commands on compromised hosts, while StallionRAT allows command execution, file loading, and data exfiltration.

Cavalry Werewolf focused on energy, mining, and manufacturing sectors in Russia. They employed a C++ launcher to run StallionRAT in PowerShell. The group uses a Telegram bot as its command-and-control server. Although no specific Middle Eastern targets have been identified, the group may extend its reach beyond Russia and Tajikistan.

Organizations worldwide, particularly in targeted sectors, are urged to bolster email security measures. Dedicated filtering and threat detection services can help protect against such sophisticated phishing campaigns. Further research is ongoing to monitor Cavalry Werewolf's activities and potential expansion into new regions.

Read also:

Latest