{"id":190636,"date":"2024-06-05T04:24:10","date_gmt":"2024-06-05T09:24:10","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2024\/06\/russian-power-companies-it-firms-and-govt-agencies-hit-by-decoy-dog-trojan"},"modified":"2024-06-05T04:24:10","modified_gmt":"2024-06-05T09:24:10","slug":"russian-power-companies-it-firms-and-govt-agencies-hit-by-decoy-dog-trojan","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2024\/06\/russian-power-companies-it-firms-and-govt-agencies-hit-by-decoy-dog-trojan","title":{"rendered":"Russian Power Companies, IT Firms, and Govt Agencies Hit by Decoy Dog Trojan"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/russian-power-companies-it-firms-and-govt-agencies-hit-by-decoy-dog-trojan2.jpg\"><\/a><\/p>\n<p>Russian organizations are at the receiving end of cyber attacks that have been found to deliver a Windows version of a malware called <a href=\"https:\/\/thehackernews.com\/2023\/05\/new-decoy-dog-malware-toolkit-uncovered.html\" rel=\"noopener\" target=\"_blank\">Decoy Dog<\/a>.<\/p>\n<p>Cybersecurity company Positive Technologies is tracking the activity cluster under the name Operation Lahat, attributing it to an advanced persistent threat (APT) group called <strong>HellHounds<\/strong>.<\/p>\n<p>\u201cThe Hellhounds group compromises organizations they select and gain a foothold on their networks, remaining undetected for years,\u201d security researchers Aleksandr Grigorian and Stanislav Pyzhov <a href=\"https:\/\/www.ptsecurity.com\/ww-en\/analytics\/pt-esc-threat-intelligence\/hellhounds-operation-lahat-part-2\/\" rel=\"noopener\" target=\"_blank\">said<\/a>. \u201cIn doing so, the group leverages primary compromise vectors, from vulnerable web services to trusted relationships.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Russian organizations are at the receiving end of cyber attacks that have been found to deliver a Windows version of a malware called Decoy Dog. Cybersecurity company Positive Technologies is tracking the activity cluster under the name Operation Lahat, attributing it to an advanced persistent threat (APT) group called HellHounds. \u201cThe Hellhounds group compromises organizations [\u2026]<\/p>\n","protected":false},"author":427,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1497],"tags":[],"class_list":["post-190636","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-energy"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/190636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/427"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=190636"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/190636\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=190636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=190636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=190636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}