MysterySnail Malware Strikes Again in Russia and Mongolia

A Sneaky New Cyber Weapon in Play

A group of Chinese-speaking hackers called IronHusky has been caught. They were targeting government offices in Russia and Mongolia. The hackers used a powerful type of malware called MysterySnail. This malware is known as a remote access trojan, or RAT. It lets hackers control a computer from far away. They can do this without the user knowing.

The hackers used an upgraded version of MysterySnail. It is stronger and harder to spot. Once it infects a computer, it hides and stays active. It can steal files, run programs, and even delete data. All this happens silently in the background.

The attack started with a fake Word document. It looked normal but was dangerous. When someone opened it, a hidden script ran. This script downloaded more harmful files. These files hid deep inside the computer. They made sure the malware stayed even after a restart or cleanup. It was like planting a secret spy in the computer that never leaves.

Security experts at Kaspersky found something alarming. The malware hides by acting like a normal background task. It blends in with regular computer processes. This makes it hard to spot.

Kaspersky blocked the older version of the malware. But the hackers came back quickly. They used a new and smarter version called MysteryMonoSnail. This version is smaller and faster. It has only one part, which makes it harder to detect.

A New Version with Dangerous Powers

The updated version of MysterySnail RAT is capable of doing many harmful things once it takes control of a computer. It can move files between the hacker and the infected computer, secretly run commands in the background, and open or close programs without permission. It can also erase files and quietly shut down tasks. The person using the infected computer may have no idea that any of this is happening.

Kaspersky researchers confirmed the presence of this malware by identifying traces left behind in their security systems. They noted that once the malware infects a system, it is configured to stay on as a hidden service. This means the malware starts up automatically with the computer and continues working silently in the background.

Critical Vulnerabilities: The Dark Side of Pacemaker Technology

When the earlier versions of MysterySnail were blocked, the hackers quickly adjusted and launched the newer, single-component version. This version may be smaller, but it still supports dozens of powerful commands that allow hackers to fully control the infected system. The ability to manage services, execute shell commands, create or end processes, and manipulate files gives the hackers full power over the machine.

This constant improvement in the malware shows how determined and skilled the hackers are. They learn from past failures, upgrade their tools, and continue their attacks with even more advanced versions.

How Cyber Attacks on Industrial Control Systems Can Endanger Lives ?

The Story Behind the Hackers

IronHusky is not a new player in the cyber world. Security researchers first noticed the group back in 2017. At the time, they were already targeting Russian and Mongolian government organizations. Their goal appeared to be collecting secret information related to military discussions between the two countries.

In 2018, the group was seen again using different types of malware, including ones called PoisonIvy and PlugX. These programs are also known to be used by Chinese hacker groups. The attackers took advantage of known weaknesses in Microsoft Office to spread their malware during that time.

Then, in 2021, the original version of MysterySnail RAT was spotted. IronHusky used it in wide attacks against military, diplomatic, and IT organizations. In that attack, they took advantage of a serious security hole in Windows to break into systems and steal data.

Renuka Bangale
Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

As unemployment reaches 4.6%, Trump challenges official labor statistics

The U.S. unemployment rate rose to 4.6% in November,...

Almost 25% of American workers struggle with low wages and underemployment

A new report has revealed a concerning reality about...

Piracy enforcement escalates as UK reminds IPTV users they’re not immune

The United Kingdom’s anti-piracy organization, Fact (Federation Against Copyright...

AOC slams ICE funding surge, says $170 billion was pulled from public welfare programs

Congresswoman Alexandria Ocasio-Cortez, commonly known as AOC, drew strong...

Iran-linked hackers targeted Israeli law firms, logistics and infrastructure in 2025 cyber surge

A media report has highlighted new claims about cyber...

Why Pirated Copies Appear Within Hours of OTT Releases — and Why No One Stops It

Online piracy continues to trouble the film industry, especially...

Millions vanish on Christmas Day as investigators probe Trust Wallet browser extension breach

Cryptocurrency users faced a shocking blow on Christmas Day...

Restructuring layoffs backfire as markets suspect deeper trouble, Goldman finds

For many years, layoffs followed a predictable pattern in...

Trump comments after photos of Bill Clinton appear in Epstein-related documents

Donald Trump commented publicly after photos of former President...

As unemployment reaches 4.6%, Trump challenges official labor statistics

The U.S. unemployment rate rose to 4.6% in November,...

Almost 25% of American workers struggle with low wages and underemployment

A new report has revealed a concerning reality about...

Piracy enforcement escalates as UK reminds IPTV users they’re not immune

The United Kingdom’s anti-piracy organization, Fact (Federation Against Copyright...

AOC slams ICE funding surge, says $170 billion was pulled from public welfare programs

Congresswoman Alexandria Ocasio-Cortez, commonly known as AOC, drew strong...

Why Pirated Copies Appear Within Hours of OTT Releases — and Why No One Stops It

Online piracy continues to trouble the film industry, especially...

Related Articles

Popular Categories

error: Content is protected !!