Attackers used two different backdoors1 and rare malware
Specialists from the Threat Intelligence department at Positive Technologies Expert Security Center (PT ESC TI) have identified attacks on telecommunications companies in Kyrgyzstan and Tajikistan. The attackers distributed phishing emails containing documents and links with malicious code embedded. The hackers disguised their malware as legitimate Microsoft Windows components.
In September 2025, the attackers sent phishing emails to organizations in Kyrgyzstan. The messages were sent under the guise of potential customers inquiring about mobile service rates. The emails contained an attached document that, when opened, displayed an image with text in Russian. The message claimed that to unlock the file, the user needed to run a certain script, which was actually malicious. The script downloaded the LuciDoor backdoor, which established a connection with the attackers' C2 server. If a direct connection failed, the malware would route through system proxies or other servers within the victim's infrastructure. Once connected, LuciDoor collected basic device information, downloaded programs, and exfiltrated data.
In November 2025, attacks on Kyrgyzstan resumed following the same scenario, but this time the group used the MarsSnake backdoor. This malware is notable in that its configuration can be changed without recompiling the executable file. Simply updating parameters in the loader is sufficient, saving the attackers time. Once established on the victim's device, the backdoor collects system information, calculates its unique identifier, and transmits the data to the C2 server.
1 A backdoor is malicious software or an undisclosed feature in legitimate software designed to gain unauthorized access to a system.