Contact

Operation HollowQuill: Russian R&D Networks Targeted via Decoy PDFs

NetmanageIT OpenCTI - opencti.netmanageit.com

Operation HollowQuill: Russian R&D Networks Targeted via Decoy PDFs



SUMMARY :

Operation HollowQuill targets Russian research and defense networks, particularly the Baltic State Technical University, using weaponized decoy documents disguised as research invitations. The attack chain involves a malicious RAR file containing a .NET dropper, which deploys a Golang-based shellcode loader and a legitimate OneDrive application. The final payload is a Cobalt Strike beacon. The campaign focuses on academic institutions, military and defense industries, aerospace and missile technology, and government-oriented research entities within the Russian Federation. The threat actor employs sophisticated techniques, including anti-analysis measures, APC injection, and infrastructure rotation across multiple ASNs.

OPENCTI LABELS :

cobalt strike,defense industry,shellcode loader,russian r&d,decoy pdfs,academic institutions,baltic state technical university,operation hollowquill


Open in NetmanageIT OpenCTI Public Instance with below link!


Use public read only username and password on login page.

NOTE : Use Public READ only user credentials on login page banner.


Operation HollowQuill: Russian R&D Networks Targeted via Decoy PDFs