Mysterious Red Stinger APT spying on pro-Ukraine and pro-Russia targets in Ukraine

Mysterious Red Stinger APT spying on pro-Ukraine and pro-Russia targets in Ukraine

A new cyber-espionage group dubbed “Red Stinger” has been been spying on both pro-Ukraine targets in central Ukraine and pro-Russia targets in the regions of Donetsk and Luhansk in eastern Ukraine that have been occupied by Russia since 2014, a new report from Malwarebytes reveals.

First spotted by the cybersecurity firm in September 2022, the group has been active since at least 2020 targeting entities in different regions of Ukraine, including military, transportation and critical infrastructure sectors.

Depending on the campaign, attackers managed to exfiltrate snapshots, USB drives, keyboard strokes, and microphone recordings.

In a February 2022 campaign the threat actor compromised a device belonging to a Ukrainian officer who works on Ukrainian critical infrastructure and exfiltrated screenshots and documents, and even recorded audio from the microphone.

The attack involved a phishing email with a malicious attachment that downloaded a variant of DBoxShell malware on the victim’s device.

“DBoxShell is malware that utilizes cloud storage services as a command and control (C&C) mechanism. This stage serves as an entry point for the attackers, enabling them to assess whether the targets are interesting or not, meaning that in this phase they will use different tools,” Malwarebytes explained.

The attackers used two separate Dropbox accounts - one account for reconnaissance and a different one for data exfiltration.

“The object field was also revealing. It contained a Russian name (redacted for privacy) followed by the DNR letters (probably Donetskaya Narodnaya Respublika, referring to one of the cities declared independent in 2014, and a known target to the group),” the researchers note.

Red Stinger also targeted a member of Ukraine’s military, although in this case the activity on the target was only carried out for a few hours, probably because the victim noticed that something was wrong.

During a September 2022 campaign the group targeted multiple election officials running Russian referendums in disputed cities in Ukraine -Luhansk, Donetsk, Zaporizhzhia and Kherson. One target was an adviser to Russia's Central Election Commission, and another works on transportation—possibly railroad infrastructure—in the region.

Interestingly, a library in the city of Vinnitsya was also infected, although it’s unclear why it had been attacked, especially since it was the only UA-aligned target in this campaign.

The researchers said that Red Stinger uses its own hacking tools and reuses characteristic scripts and infrastructure, including specific malicious URL generators and IP addresses. The researchers were able to get a glimpse of the group's operations after discovering two victims (possibly the members of Red Stinger) who appear to have infected themselves with Red Stinger malware while testing it or by mistake.

“In this case, attributing the attack to a specific country is not an easy task. Any of the involved countries or aligned groups could be responsible, as some victims were aligned with Russia, and others were aligned with Ukraine,” Malwarebytes said.

“What is clear is that the principal motive of the attack was surveillance and data gathering. The attackers used different layers of protection, had an extensive toolset for their victims, and the attack was clearly targeted at specific entities. Perhaps in the future, further events or additional activity from the group can shed light on the matter.”

Back to the list

Latest Posts

Cyber Security Week in Review: May 2, 2025

Cyber Security Week in Review: May 2, 2025

In brief: SonicWall warns of active exploitation of recently patched bugs, Commvault confirms a nation-state zero-day attack, and more.
2 May 2025
Nation-state hackers exploit zero-day in Commvault Azure environment

Nation-state hackers exploit zero-day in Commvault Azure environment

Additionally, SonicWall has warned that two flaws affecting its SMA100 appliances are being actively exploited in the wild.
1 May 2025
New crypto exchange Grinex suspected to be Garantex rebrand following US seizure

New crypto exchange Grinex suspected to be Garantex rebrand following US seizure

After Garantex’s domains were seized, Grinex was immediately promoted in Telegram channels.
30 April 2025