Operation SkyCloak: Phishing Campaign Unmasks Cyber Threats in Defense Sector
Operation SkyCloak is a phishing campaign targeting the defense sector in Russia and Belarus. It uses weaponized attachments to deliver malware, setting up persistent backdoors with OpenSSH and Tor. The malware cleverly evades detection with environmental awareness checks, while attackers enjoy remote access and anonymity—like ninjas, but with keyboards.

Hot Take:
Looks like Operation SkyCloak is giving James Bond a run for his money with its cloak-and-dagger antics. This cyber caper is so intricate, it might as well have its own theme song. Watch out, defense sectors in Russia and Belarus—your emails just became more dangerous than your morning coffee!
Key Points:
- Threat actors are using phishing emails with weaponized attachments to target the defense sector in Russia and Belarus.
- The campaign, dubbed Operation SkyCloak, delivers a persistent backdoor utilizing OpenSSH and Tor for stealthy communication.
- Phishing emails lure recipients with military-related documents to initiate a multi-step infection chain.
- Advanced anti-analysis checks evade detection, requiring specific system conditions to proceed.
- The attack is linked to Eastern European espionage, sharing tactics with previous campaigns by threat actor UAC-0125.
Already a member? Log in here
