Chinese Hackers Unleash MysterySnail 2.0: Russia and Mongolia’s IT Nightmare!
Chinese-speaking IronHusky hackers are back, targeting Russian and Mongolian government entities with an upgraded MysterySnail RAT malware. This sneaky trojan, disguised as a Word document, downloads payloads and gains system persistence. Kaspersky uncovered this cyber caper, revealing IronHusky’s ongoing espionage escapades with their new slimmed-down MysteryMonoSnail RAT version.

Hot Take:
Looks like the IronHusky hackers are taking the phrase “sharing is caring” to a whole new level by sharing their MysterySnail RAT with Russian and Mongolian government computers. The only problem? The governments didn’t exactly ask for this kind of gift.
Key Points:
- IronHusky hackers are targeting Russian and Mongolian government organizations.
- They’re using an upgraded MysterySnail RAT malware, disguised as a Word document.
- The malware persists on systems, performing various malicious activities.
- This new version, dubbed “MysteryMonoSnail,” is more lightweight.
- The hackers have been active since 2017, consistently targeting Russian and Mongolian entities.
Already a member? Log in here