2 Sources
2 Sources
[1]
Russian Defense Firms Targeted by Hackers Using AI, Other Tactics
Dec 19 (Reuters) - Russian technology companies working on air defense, sensitive electronics and other defense applications were targeted in recent weeks by a cyber espionage group using AI-generated decoy documents, according to a cybersecurity analyst. The discovery by cybersecurity firm Intezer shows how AI tools can be easily harnessed for high-stakes operations, senior security researcher Nicole Fishbein said, and offers a rare look at hacking campaigns targeting Russian entities. The campaign, not previously reported, is likely the work of a group tracked as either "Paper Werewolf" or GOFFEE, Fishbein said, a hacking group active since 2022 that is widely thought to be pro-Ukrainian and has focused nearly all of its efforts on Russian targets. The hack also suggests just how aggressively Ukraine and its allies are pursuing a military advantage in the war, which has included drone attacks on defense supply chain entities in recent months. And it has come to light as delicate negotiations play out over a potential end to Russia's war in Ukraine, with Moscow threatening to take more land by force if Kyiv and its European allies do not engage with U.S. proposals for peace. The hacking campaign targeted several Russian companies, according to suspected AI-generated decoy documents discovered by Fishbein, who is the lead author of an analysis prepared by Intezer. The Russian and Ukrainian embassies in Washington did not respond to requests for comment. HACKING CAMPAIGN MADE USE OF ACCESSIBLE AI TOOLS In one case, an apparently AI-generated document purports to be an invitation, written in Russian, to a concert for high-ranking officers. In another case, a document purports to be sent from the Ministry of Industry and Trade of the Russian Federation, asking for price justification under government regulations around pricing, according to the analysis. Fishbein said the campaign stands out as a rare opportunity to examine attacks on Russian entities. "This isn't necessarily because those attacks are rare, but because visibility into them is limited," she said. The group's use of AI-generated decoy documents also demonstrates how "accessible AI tools can be repurposed for malicious goals," Fishbein said. "(It) shows how emerging technologies can lower the barrier for sophisticated attacks and why misuse, not the technology itself, remains the core problem." The targets, which are all major defense contractors, indicate the attackers' broad interest in Russia's military industry, said Oleg Shakirov, a Russia cyber policy researcher, while potential access to the contractors could offer visibility into "the production of everything from scopes to air defense systems, but also into defense supply chains and R&D processes. "(There's) nothing unusual about pro-Ukrainian hackers trying to spy on Russian defense companies during the war," Shakirov added, while suggesting that Paper Werewolf may have expanded its targeting beyond government agencies, energy, finance and telecoms to other sectors. While Intezer attributed the operation to Paper Werewolf, based on the infrastructure supporting the effort, the particular software vulnerabilities exploited, and how the decoy documents were constructed, Fishbein said it was an open question whether the hackers were working with a specific nation-state or other hacking group. Others, however, have suggested a link between the group and other known pro-Ukrainian hacking efforts. A September 2025 report published by Russian cybersecurity firm Kaspersky said Paper Werewolf has potential overlaps with Cloud Atlas, a pro-Ukrainian hacking group dating back more than a decade. The group is known for targeting pro-Russian entities in Eastern Europe and Central Asia, according to cybersecurity firm Check Point. (Reporting by AJ Vicens in Detroit; Editing by Edmund Klamann)
[2]
Russian defence firms targeted by hackers using AI, other tactics: Report
Russian defense companies faced cyber attacks. A hacking group used AI-generated fake documents to target them. These documents appeared to be invitations and official requests. Russian technology companies working on air defense, sensitive electronics and other defense applications were targeted in recent weeks by a cyber espionage group using AI-generated decoy documents, according to a cybersecurity analyst. The discovery by cybersecurity firm Intezer shows how AI tools can be easily harnessed for high-stakes operations, senior security researcher Nicole Fishbein said, and offers a rare look at hacking campaigns targeting Russian entities. The campaign, not previously reported, is likely the work of a group tracked as either "Paper Werewolf" or GOFFEE, Fishbein said, a hacking group active since 2022 that is widely thought to be pro-Ukrainian and has focused nearly all of its efforts on Russian targets. The hack also suggests just how aggressively Ukraine and its allies are pursuing a military advantage in the war, which has included drone attacks on defense supply chain entities in recent months. And it has come to light as delicate negotiations play out over a potential end to Russia's war in Ukraine, with Moscow threatening to take more land by force if Kyiv and its European allies do not engage with U.S. proposals for peace. The hacking campaign targeted several Russian companies, according to suspected AI-generated decoy documents discovered by Fishbein, who is the lead author of an analysis prepared by Intezer. The Russian and Ukrainian embassies in Washington did not respond to requests for comment. In one case, an apparently AI-generated document purports to be an invitation, written in Russian, to a concert for high-ranking officers. In another case, a document purports to be sent from the Ministry of Industry and Trade of the Russian Federation, asking for price justification under government regulations around pricing, according to the analysis. Fishbein said the campaign stands out as a rare opportunity to examine attacks on Russian entities. "This isn't necessarily because those attacks are rare, but because visibility into them is limited," she said. The group's use of AI-generated decoy documents also demonstrates how "accessible AI tools can be repurposed for malicious goals," Fishbein said. "(It) shows how emerging technologies can lower the barrier for sophisticated attacks and why misuse, not the technology itself, remains the core problem." The targets, which are all major defense contractors, indicate the attackers' broad interest in Russia's military industry, said Oleg Shakirov, a Russia cyber policy researcher, while potential access to the contractors could offer visibility into "the production of everything from scopes to air defense systems, but also into defense supply chains and R&D processes. "(There's) nothing unusual about pro-Ukrainian hackers trying to spy on Russian defense companies during the war," Shakirov added, while suggesting that Paper Werewolf may have expanded its targeting beyond government agencies, energy, finance and telecoms to other sectors. While Intezer attributed the operation to Paper Werewolf, based on the infrastructure supporting the effort, the particular software vulnerabilities exploited, and how the decoy documents were constructed, Fishbein said it was an open question whether the hackers were working with a specific nation-state or other hacking group. Others, however, have suggested a link between the group and other known pro-Ukrainian hacking efforts. A September 2025 report published by Russian cybersecurity firm Kaspersky said Paper Werewolf has potential overlaps with Cloud Atlas, a pro-Ukrainian hacking group dating back more than a decade. The group is known for targeting pro-Russian entities in Eastern Europe and Central Asia, according to cybersecurity firm Check Point.
Share
Share
Copy Link
Russian technology companies working on air defense and sensitive electronics were targeted by hackers using AI-generated fake documents. Cybersecurity firm Intezer links the campaign to Paper Werewolf, a pro-Ukrainian hacking group active since 2022. The operation demonstrates how accessible AI tools can be repurposed for high-stakes malicious operations.
Russian defense firms working on air defense systems, sensitive electronics, and critical military applications became targets of a sophisticated cyber espionage campaign in recent weeks, according to analysis from cybersecurity firm Intezer
1
. The operation stands out for its use of AI-generated decoy documents, marking a notable evolution in cyberattacks on Russian entities. Senior security researcher Nicole Fishbein, who led the analysis, identified the campaign as likely orchestrated by Paper Werewolf—also tracked as GOFFEE—a pro-Ukrainian hacking group that has concentrated nearly all its efforts on targeting Russian technology companies since 20222
.
Source: ET
The discovery offers a rare window into hacking efforts against Russian entities, visibility into which remains notably limited. Fishbein emphasized that the campaign demonstrates how "accessible AI tools can be repurposed for malicious goals" and shows how emerging technologies lower the barrier for sophisticated attacks
1
. The attacks underscore Ukraine's aggressive pursuit of military advantage through cyber operations, complementing physical drone strikes on defense supply chain targets in recent months.The hackers crafted convincing fake documents using AI tools to infiltrate their targets. One AI-generated document posed as an invitation to a concert for high-ranking officers, written in Russian. Another masqueraded as official correspondence from the Ministry of Industry and Trade of the Russian Federation, requesting price justification under government regulations
1
. These decoy documents served as entry points for the cyber espionage campaign, exploiting human trust in seemingly legitimate communications.Intezer attributed the operation to Paper Werewolf based on multiple factors: the infrastructure supporting the effort, specific software vulnerabilities exploited, and construction patterns in the decoy documents. Russia cyber policy researcher Oleg Shakirov noted that all targets are major defense contractors, revealing the attackers' comprehensive interest in Russia's military industry. Potential access to these contractors could provide visibility into "the production of everything from scopes to air defense systems, but also into defense supply chains and R&D processes," Shakirov explained
2
.While Fishbein characterized it as an open question whether the hackers operate with a specific nation-state or collaborate with other hacking groups, evidence suggests broader connections within pro-Ukrainian cyber operations. A September 2025 report from Russian cybersecurity firm Kaspersky identified potential overlaps between Paper Werewolf and Cloud Atlas, a pro-Ukrainian hacking group with more than a decade of activity. Cloud Atlas has established a track record of targeting pro-Russian entities across Eastern Europe and Central Asia, according to cybersecurity firm Check Point
1
.Shakirov suggested that Paper Werewolf may be expanding its targeting scope beyond traditional sectors like government agencies, energy, finance, and telecoms into broader defense manufacturing. The timing proves significant, as the campaign surfaced amid delicate negotiations over a potential end to Russia's war in Ukraine, with Moscow threatening further territorial seizures if Kyiv and European allies reject U.S. peace proposals
2
.Related Stories
The campaign signals a troubling trend: AI tools originally designed for legitimate purposes can be rapidly adapted for cyber warfare. Fishbein stressed that "misuse, not the technology itself, remains the core problem"
1
. This accessibility means threat actors no longer need extensive resources to mount sophisticated operations against critical infrastructure and defense contractors. As AI capabilities advance, defense organizations must anticipate increasingly convincing social engineering attacks that exploit both technological and human vulnerabilities. The Russian and Ukrainian embassies in Washington declined to comment on the campaign2
, leaving questions about attribution and response measures unanswered as the cyber dimension of the conflict intensifies.Summarized by
Navi
16 Oct 2025•Technology

13 Nov 2025•Technology

17 Oct 2024•Technology

1
Technology

2
Technology

3
Technology
