Published on: Julyβ―26,β―2025
By: CyberDudeBivash Editorial Team
Category: Cyber Espionage | Threat Intelligence
A sophisticated espionage operation dubbed Operation CargoTalon has emerged, targeting Russiaβs aerospace sectorβincluding employees of the Voronezh Aircraft Production Association (VASO)βusing a stealthy backdoor known as EAGLET. Identified in late June 2025 by Seqrite Labs, this campaign is attributed to a threat cluster tracked as UNG0901.Deepwatch+6Cyber Security News+6The Hacker News+6
The operation begins with well-crafted emails referencing Transport Consignment Note (TTN) documentsβvital to Russian logistics. The payload arrives as a ZIP archive containing a malicious .LNK
file, masquerading as a delivery document.Reddit+5Cyber Security News+5The Hacker News+5
When opened, the .LNK
launches PowerShell that:
EAGLET establishes persistence while masquerading as legitimate traffic using the user-agent string MicrosoftAppStore/2001.0
. It contacts a hard-coded C2 server (185.225.17[.]104
), periodically polling via HTTP for instructions. It supports:
/result
endpointsβLinkedIn+13Cyber Security News+13The Hacker News+13The Hacker News+1Nubetia+1Analysis of related implants reveals overlapping characteristics with campaigns using implant variants tied to βHead Mareβ threat activity. Similar targeting and infrastructure reuse reinforce the alignment between these APT clusters. EAGLET shares code traits with PhantomDL, a Goβbased backdoor featuring file and shell functionality.Seqrite+3Cyber Security News+3Nubetia+3
Train employees to scrutinize shipment-themed emails, especially from unknown senders. ZIP files with unusual naming should raise suspicion.
.LNK
execution via default settings or AppLocker rules.Flag HTTP traffic using suspicious user-agent strings such as MicrosoftAppStore/2001.0
to unfamiliar external domains. Lock down egress to unknown hosts.The Hacker News+2Cyber Security News+2Nubetia+2
Search for directories like MicrosoftApppStore
(used by EAGLET) and monitor HTTP POSTs to suspicious endpoints.
Isolate aerospace engineering networks behind firewalls and segmentation. Deploy network monitoring inside high-value segments.
Detect snapshot DLL installs, command-line activity from unknown processes, and reference IOC listsβincluding file hashes or C2 domains.
Operation CargoTalon aligns with a pattern of targeted campaigns orchestrated by Russia-aligned APT groups (e.g., Head Mare, UNG0901) aimed at aerospace and defense industries.Reddit+6Cyber Security News+6Nubetia+6LinkedInReddit+5Nubetia+5The Hacker News+5 Their ability to engineer domain-specific lures and drop advanced implants underscores the high stakes of cyber espionage in critical infrastructure.
Share your insights in the comments or connect with us on Twitter: @CyberDudeBivash.
For continuous tracking of espionage campaigns, malware innovations, and defense strategies in aerospace, subscribe to our Cyber Magazine: cyberdudebivash.com
Tags: #CargoTalon #EAGLETBackdoor #OperationCargoTalon #UNG0901 #CyberEspionage #AerospaceSecurity #RussiaAPT #ThreatIntel #CyberDudeBivash