News

Positive Technologies reports a new wave of attacks by the PhantomCore cyberespionage group

Company experts prevented non-tolerable events at Russian critical infrastructure facilities

From May to July, specialists at the Positive Technologies Expert Security Center's Threat Intelligence group (PT ESC TI) found over 180 infected hosts at Russian organizations. The malicious activity directed at Russia's critical infrastructure was traced back to the PhantomCore cybercriminal group. PT ESC TI experts identified the victims and notified them of the cyberthreats before non-tolerable events occurred.

Compromised organizations included government agencies, research institutes, and enterprises in the defense, shipbuilding, chemical, mining, and manufacturing sectors, as well as IT companies. The first attack occurred on May 12, and activity peaked in June, with 56% of all infections occurring on June 30. On average, the group stayed in compromised networks for 24 days, with a maximum of 78 days. At least 49 hosts are still controlled by the attackers.

According to Positive Technologies, the PhantomCore APT group has been active since early 2024 and aims to gain access to confidential information. The cyberattacks are large-scale and selective: victims include Russian organizations in key sectors of the economy and public administration. PhantomCore has a substantial offensive toolkit—from popular open-source utilities and updated versions of well-known tools to previously unknown proprietary malware. This variety helps the attackers remain undetected in infected networks for extended periods. In addition, the group's malicious infrastructure is strictly segmented by function and by tool class.

Nearly half of the servers (48%) are located in Russia, mainly in the networks of three Russian providers. The remaining 52% is hosted abroad, distributed roughly evenly across Finland, France, the Netherlands, the U.S., Germany, Hong Kong, Moldova, and Poland. Meanwhile, 33% of all servers are concentrated with a Canadian provider.

"We believe the spike in this campaign resulted from upgrades to PhantomCore's toolkit. It is likely that, until the end of April, the attackers were preparing a new series of attacks, focusing primarily on developing their tools. We also discovered a new offshoot of the group operating outside the core team and consisting of lower-skilled operators. It was presumably set up by a PhantomCore member to ramp up cybercriminal activity and expand the attack surface."

Viktor Kazakov
Viktor KazakovLead PT ESC TI Specialist

The Positive Technologies Expert Security Center expects PhantomCore to continue posing a high threat to Russian organizations. PT ESC TI continues to monitor the APT group's activity, promptly alerts victims to planned cyberattacks, and provides unique threat intelligence to users of Positive Technologies products.

Share link