Cloud Atlas Strikes Again: Phishing Frenzy Hits Russian Farms with Vintage Exploits

Cloud Atlas is back in action, targeting Russia’s agricultural sector with an old 2023 exploit. Using booby-trapped Word documents, they deliver the VBShower backdoor. This adaptable threat actor has been active since 2014, increasing attacks on Russia and Belarus in 2025. Other groups like GOFFEE and PhantomCore are also in the mix.

Pro Dashboard

Hot Take:

Looks like Cloud Atlas is going back to basics by dusting off some old exploits to mess with Mother Russia’s agricultural sector. I guess if it ain’t broke (or patched), don’t fix it! Clearly, Cloud Atlas is striving to be the “vintage vinyl” of cybercrime, proving that everything old is new again—especially if it can still cause chaos. As they say, one man’s trash is another hacker’s treasure.

Key Points:

  • Cloud Atlas is targeting Russia’s agricultural sector using old exploits in a new phishing campaign.
  • The group is using CVE-2017-11882 to deliver the VBShower backdoor via booby-trapped Word documents.
  • Cloud Atlas has a history of adaptability, increasing attacks on Russia and Belarus since 2025.
  • Russian organizations are also facing threats from GOFFEE and PhantomCore using new backdoors like PhantomGoShell.
  • PhantomGoShell is suspected to be developed by Russian-speaking members of gaming Discord communities.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?