News

Positive Technologies reports a new wave of attacks by CapFix

Experts at Positive Technologies have uncovered a new series of attacks by the CapFix threat group, spanning from late 2025 through March 2026. The threat actors used upgraded tools and compromised infrastructure, which they likely accessed by exploiting a critical vulnerability in the Roundcube Webmail client. An analysis of the group's attacks in autumn 2025 revealed that the criminals specifically targeted Russian companies in the industrial and aerospace sectors.

In December 2025, the Threat Intelligence department at the Positive Technologies Expert Security Center (PT ESC TI) detected a malicious campaign targeting Russian organizations. Researchers attributed this activity to the CapFix group, which relied on phishing emails as its primary attack vector. These emails contained PDF or HTML attachments with embedded links to download archives containing malicious payloads. The lures were primarily disguised as official messages from government agencies.

The investigation confirmed that during their attacks in autumn 2025, the group sent phishing emails to Russian companies in the industrial and aerospace sectors.

The attackers used compromised servers to send malicious files from seemingly trusted sources, which significantly enhanced the effectiveness of these attacks. Experts assume that the threat actors gained access to these servers by exploiting a critical vulnerability in the Roundcube Webmail client (CVE-2025-49113, CVSS score: 9.9).

In recent attacks, the group has deployed an upgraded version of the CapDoor malware. This tool serves as one of the stages in the infection chain, enabling the deployment of additional malicious modules (such as the SectopRAT remote access trojan) onto victim devices. The upgraded CapDoor features expanded capabilities: it can collect system information, capture screenshots, and download various file types upon receiving commands from operators.

The ESC specialists also found earlier samples of the malware that relied on cryptocurrency-themed lures during the delivery stage. In November 2025, over 10 such malware samples were uploaded to public sandboxes by users in Mexico, the U.S., the Netherlands, France, and other countries. Additionally, the researchers found phishing sites employing the ClickFix technique, masquerading as hotel booking services.

"CapFix was initially considered a financially motivated group, and we still assess them as such, given the artifacts found in their phishing emails and the attacks we have observed. However, their target selection and toolset are more closely aligned with the behavior of APT groups or advanced hacktivists, as evidenced by their attacks on industrial and aerospace companies. Furthermore, we have identified four new domains associated with CapFix that are currently inactive. We expect the threat actors will continue their operations and potentially expand their scope."

Alexander Badaev
Alexander BadaevThreat Intelligence Specialist at the Positive Technologies Expert Security Center

Positive Technologies continues to monitor CapFix's activities and urges organizations to strengthen their defenses against targeted attacks. Securing corporate email with a multilayered defense strategy should be a top priority. We recommend keeping software up to date, training employees to recognize phishing emails, and deploying solutions to detect anomalous network activity.