Key Takeaways
Security researchers have identified a new wave of malicious operations by the Tomiris APT (Storm-0473) group, which began in early 2025. These sophisticated attacks are directed at high-value political and diplomatic targets, including foreign ministries and intergovernmental organizations.Â
The group shows a particular focus on Russian-speaking users or entities in Central Asian countries like Turkmenistan, Kyrgyzstan, Tajikistan, and Uzbekistan.
The campaign primarily initiates infection through phishing emails containing password-protected archives, according to new research from Kaspersky’s SecureList. These archives hold executables disguised as office documents, which, when run, infect the target system.
A notable evolution in the group's tactics is the increased use of implants that leverage public services for C2. The campaign employs Telegram C2 malware and Discord-based reverse shells to blend their malicious traffic with legitimate network activity, making detection by security solutions more challenging.Â
These implants, written in languages such as Go, Rust, and Python, are used for initial reconnaissance and to download subsequent payloads. In one observed case, a Python-based Trojan used the Discord API to act as a reverse shell, executing commands and exfiltrating data.Â
The identified ones are:
Following initial access, the Tomiris cyberattacks in 2025 often involve deploying open-source post-exploitation frameworks, including Havoc and AdaptixC2. These tools give attackers advanced capabilities for lateral movement and data exfiltration within the compromised network.Â
Attribution to the Tomiris APT group is based on overlapping tactics, techniques, and procedures (TTPs) from previous campaigns, such as the use of specific file-naming conventions and password-protected archives.Â
The deployment of different malware types under the same filenames further strengthens the connection to this specific Russian-speaking threat actor.
Last month, the Adaptix framework was exploited by cybercriminals with Russian ties, including Akira.
In other recent news, the Russia-aligned RomCom gang was seen using SocGholish to deploy Mythic Agent on Ukraine supporters in a new campaign linked to GRU Unit 29155.