Summary: Operation Silent Rotor
Campaign Overview:
- Target: Professionals in the Eurasian unmanned aviation sector.
- Timing: Carefully timed to coincide with the "Unmanned Aviation 2026" forum in Moscow on April 23, 2026.
- Delivery Mechanism: Spear phishing emails containing realistic aviation-related documents and a Rust-based executable.
Technical Details:
-
Initial Infection Vector:
- The campaign uses spear phishing emails with convincing aviation-themed documents to gain initial victim trust.
- Upon opening the document, it triggers the download of a malicious Rust-based executable (payload).
-
Malware Analysis:
-
Stage 1:
- Collects system information including hostname and volume serial number.
- Gathers environment variables such as username, domain name, computer name, user profile path.
- Retrieves network adapter details including IP addresses and DNS-related information.
- Encrypts collected data using XOR encryption and sends it to the C2 server over HTTPS (port 443).
-
Stage 2:
- Receives an encrypted response from the C2 server, decrypts the payload
-
Read the full article at Malware Analysis, News and Indicators - Latest topics
Want to create content about this topic? Use Nemati AI tools to generate articles, social posts, and more.

![[AINews] The Unreasonable Effectiveness of Closing the Loop](/_next/image?url=https%3A%2F%2Fmedia.nemati.ai%2Fmedia%2Fblog%2Fimages%2Farticles%2F600e22851bc7453b.webp&w=3840&q=75)



