Awaken Likho

Description

(Kaspersky) In July 2021, a campaign was launched primarily targeting Russian government agencies and industrial enterprises. Shortly after the campaign started, we began tracking it, and published three reports in August and September 2024 through our threat research subscription on the threat actor we named Awaken Likho (also named by other vendors as Core Werewolf).

While investigating the activity of this APT group, we discovered a new campaign that began in June 2024 and continued at least until August. Analysis of the campaign revealed that the attackers had significantly changed the software they used in their attacks. The attackers now prefer using the agent for the legitimate MeshCentral platform instead of the UltraVNC module, which they had previously used to gain remote access to systems. The group remains focused on targeting Russian government organizations and enterprises.

Names

NameName-Giver
Awaken LikhoKaspersky
Core WerewolfBI.ZONE

Country

Motivation

  • Information theft and espionage

First Seen

2021

Observed Sectors

Observed Countries

Information

Other Information

Uuid

f3c3beeb-ae74-411b-8a9a-110533a0b28d

Last Card Change

2024-10-24