{"id":179,"date":"2025-12-19T09:15:28","date_gmt":"2025-12-19T09:15:28","guid":{"rendered":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/"},"modified":"2025-12-19T09:15:28","modified_gmt":"2025-12-19T09:15:28","slug":"operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports","status":"publish","type":"post","link":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/","title":{"rendered":"Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports"},"content":{"rendered":"<div>\n<p><img width=\"990\" height=\"400\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/17093749\/forumtroll-part-3-featured-image-990x400.jpg\" class=\"attachment-securelist-huge-promo size-securelist-huge-promo wp-post-image\" alt=\"\" decoding=\"async\" loading=\"lazy\"><\/p>\n<h2 id=\"introduction\">Introduction<\/h2>\n<p>In March 2025, <a href=\"https:\/\/securelist.com\/operation-forumtroll\/115989\/\" target=\"_blank\" rel=\"noopener\">we discovered Operation ForumTroll<\/a>, a series of sophisticated cyberattacks exploiting the CVE-2025-2783 vulnerability in Google Chrome. We previously <a href=\"https:\/\/securelist.com\/forumtroll-apt-hacking-team-dante-spyware\/117851\/\" target=\"_blank\" rel=\"noopener\">detailed the malicious implants<\/a> used in the operation: the LeetAgent backdoor and the complex spyware Dante, developed by Memento Labs (formerly Hacking Team). However, the attackers behind this operation didn\u2019t stop at their spring campaign and have continued to infect targets within the Russian Federation.<\/p>\n<h2 id=\"emails-posing-as-a-scientific-library\">Emails posing as a scientific library<\/h2>\n<p>In October 2025, just days before we presented our report detailing the ForumTroll APT group\u2019s attack at the <a href=\"https:\/\/thesascon.com\/\" target=\"_blank\" rel=\"noopener\">Security Analyst Summit<\/a>, we detected a new targeted phishing campaign by the same group. However, while the spring cyberattacks focused on organizations, the fall campaign honed in on specific individuals: scholars in the field of political science, international relations, and global economics, working at major Russian universities and research institutions.<\/p>\n<p>The emails received by the victims were sent from the address <code>support@e-library[.]wiki<\/code>. The campaign purported to be from the scientific electronic library, eLibrary, whose legitimate website is <code>elibrary.ru<\/code>. The phishing emails contained a malicious link in the format: <code>https:\/\/e-library[.]wiki\/elib\/wiki.php?id=&lt;8 pseudorandom letters and digits&gt;<\/code>. Recipients were prompted to click the link to download a plagiarism report. Clicking that link triggered the download of an archive file. The filename was personalized, using the victim\u2019s own name in the format: <code>&lt;LastName&gt;_&lt;FirstName&gt;_&lt;Patronymic&gt;.zip<\/code>.<\/p>\n<h2 id=\"a-well-prepared-attack\">A well-prepared attack<\/h2>\n<p>The attackers did their homework before sending out the phishing emails. The malicious domain, <code>e-library[.]wiki<\/code>, was registered back in March 2025, over six months before the email campaign started. This was likely done to build the domain\u2019s reputation, as sending emails from a suspicious, newly registered domain is a major red flag for spam filters.<\/p>\n<p>Furthermore, the attackers placed a copy of the legitimate eLibrary homepage on <code>https:\/\/e-library[.]wiki<\/code>. According to the information on the page, they accessed the legitimate website from the IP address <code>193.65.18[.]14<\/code> back in December 2024.<\/p>\n<div id=\"attachment_118494\" style=\"width: 569px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16201932\/operation-forumtroll1.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118494\" class=\"size-full wp-image-118494\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16201932\/operation-forumtroll1.png\" alt=\"A screenshot of the malicious site elements showing the IP address and initial session date\" width=\"559\" height=\"233\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16201932\/operation-forumtroll1.png 559w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16201932\/operation-forumtroll1-300x125.png 300w\" sizes=\"auto, (max-width: 559px) 100vw, 559px\"><\/a><\/p>\n<p id=\"caption-attachment-118494\" class=\"wp-caption-text\">A screenshot of the malicious site elements showing the IP address and initial session date<\/p>\n<\/div>\n<p>The attackers also carefully personalized the phishing emails for their targets, specific professionals in the field. As mentioned above, the downloaded archive was named with the victim\u2019s last name, first name, and patronymic.<\/p>\n<p>Another noteworthy technique was the attacker\u2019s effort to hinder security analysis by restricting repeat downloads. When we attempted to download the archive from the malicious site, we received a message in Russian, indicating the download link was likely for one-time use only:<\/p>\n<div id=\"attachment_118495\" style=\"width: 599px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202012\/operation-forumtroll2.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118495\" class=\"size-full wp-image-118495\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202012\/operation-forumtroll2.png\" alt=\"The message that was displayed when we attempted to download the archive\" width=\"589\" height=\"177\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202012\/operation-forumtroll2.png 589w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202012\/operation-forumtroll2-300x90.png 300w\" sizes=\"auto, (max-width: 589px) 100vw, 589px\"><\/a><\/p>\n<p id=\"caption-attachment-118495\" class=\"wp-caption-text\">The message that was displayed when we attempted to download the archive<\/p>\n<\/div>\n<p>Our investigation found that the malicious site displayed a different message if the download was attempted from a non-Windows device. In that case, it prompted the user to try again from a Windows computer.<\/p>\n<div id=\"attachment_118496\" style=\"width: 697px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202050\/operation-forumtroll3.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118496\" class=\"size-full wp-image-118496\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202050\/operation-forumtroll3.png\" alt=\"The message that was displayed when we attempted to download the archive from a non-Windows OS\" width=\"687\" height=\"93\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202050\/operation-forumtroll3.png 687w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202050\/operation-forumtroll3-300x41.png 300w\" sizes=\"auto, (max-width: 687px) 100vw, 687px\"><\/a><\/p>\n<p id=\"caption-attachment-118496\" class=\"wp-caption-text\">The message that was displayed when we attempted to download the archive from a non-Windows OS<\/p>\n<\/div>\n<h2 id=\"the-malicious-archive\">The malicious archive<\/h2>\n<p>The malicious archives downloaded via the email links contained the following:<\/p>\n<ul>\n<li>A malicious shortcut file named after the victim: <code>&lt;LastName&gt;_&lt;FirstName&gt;_&lt;Patronymic&gt;.lnk<\/code>;<\/li>\n<li>A <code>.Thumbs<\/code> directory containing approximately 100 image files with names in Russian. These images were not used during the infection process and were likely added to make the archives appear less suspicious to security solutions.<\/li>\n<\/ul>\n<div id=\"attachment_118497\" style=\"width: 455px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202133\/operation-forumtroll4.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118497\" class=\"size-full wp-image-118497\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202133\/operation-forumtroll4.png\" alt=\"A portion of the .Thumbs directory contents\" width=\"445\" height=\"582\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202133\/operation-forumtroll4.png 445w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202133\/operation-forumtroll4-229x300.png 229w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202133\/operation-forumtroll4-268x350.png 268w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202133\/operation-forumtroll4-214x280.png 214w\" sizes=\"auto, (max-width: 445px) 100vw, 445px\"><\/a><\/p>\n<p id=\"caption-attachment-118497\" class=\"wp-caption-text\">A portion of the .Thumbs directory contents<\/p>\n<\/div>\n<p>When the user clicked the shortcut, it ran a PowerShell script. The script\u2019s primary purpose was to download and execute a PowerShell-based payload from a malicious server.<\/p>\n<div id=\"attachment_118498\" style=\"width: 1696px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202210\/operation-forumtroll5.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118498\" class=\"size-full wp-image-118498\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202210\/operation-forumtroll5.png\" alt=\"The script that was launched by opening the shortcut\" width=\"1686\" height=\"175\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202210\/operation-forumtroll5.png 1686w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202210\/operation-forumtroll5-300x31.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202210\/operation-forumtroll5-1024x106.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202210\/operation-forumtroll5-768x80.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202210\/operation-forumtroll5-1536x159.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202210\/operation-forumtroll5-740x77.png 740w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202210\/operation-forumtroll5-1600x166.png 1600w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202210\/operation-forumtroll5-800x83.png 800w\" sizes=\"auto, (max-width: 1686px) 100vw, 1686px\"><\/a><\/p>\n<p id=\"caption-attachment-118498\" class=\"wp-caption-text\">The script that was launched by opening the shortcut<\/p>\n<\/div>\n<p>The downloaded payload then performed the following actions:<\/p>\n<ul>\n<li>Contacted a URL in the format: <code>https:\/\/e-library[.]wiki\/elib\/query.php?id=&lt;8 pseudorandom letters and digits&gt;&amp;key=&lt;32 hexadecimal characters&gt;<\/code> to retrieve the final payload, a DLL file.<\/li>\n<li>Saved the downloaded file to <code>%localappdata%MicrosoftWindowsExplorericoncache_&lt;4 pseudorandom digits&gt;.dll<\/code>.<\/li>\n<li>Established persistence for the payload using <a href=\"https:\/\/attack.mitre.org\/techniques\/T1546\/015\/\" target=\"_blank\" rel=\"noopener\">COM Hijacking<\/a>. This involved writing the path to the DLL file into the registry key HKCRCLSID{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}InProcServer32. Notably, the attackers had used that same technique in <a href=\"https:\/\/securelist.com\/forumtroll-apt-hacking-team-dante-spyware\/117851\/#persistent-loader\" target=\"_blank\" rel=\"noopener\">their spring attacks<\/a>.<\/li>\n<li>Downloaded a decoy PDF from a URL in the format: <code>https:\/\/e-library[.]wiki\/pdf\/&lt;8 pseudorandom letters and digits&gt;.pdf<\/code>. This PDF was saved to the user\u2019s Downloads folder with a filename in the format: <code>&lt;LastName&gt;_&lt;FirstName&gt;_&lt;Patronymic&gt;.pdf<\/code> and then opened automatically.<\/li>\n<\/ul>\n<p>The decoy PDF contained no valuable information. It was merely a blurred report generated by a Russian plagiarism-checking system.<\/p>\n<div id=\"attachment_118499\" style=\"width: 729px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202308\/operation-forumtroll6.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-118499\" class=\"size-full wp-image-118499\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202308\/operation-forumtroll6.png\" alt=\"A screenshot of a page from the downloaded report\" width=\"719\" height=\"1011\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202308\/operation-forumtroll6.png 719w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202308\/operation-forumtroll6-213x300.png 213w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202308\/operation-forumtroll6-249x350.png 249w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202308\/operation-forumtroll6-711x1000.png 711w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202308\/operation-forumtroll6-199x280.png 199w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/16202308\/operation-forumtroll6-640x900.png 640w\" sizes=\"auto, (max-width: 719px) 100vw, 719px\"><\/a><\/p>\n<p id=\"caption-attachment-118499\" class=\"wp-caption-text\">A screenshot of a page from the downloaded report<\/p>\n<\/div>\n<p>At the time of our investigation, the links for downloading the final payloads didn\u2019t work. Attempting to access them returned error messages in English: \u201cYou are already blocked\u2026\u201d or \u201cYou have been bad ended\u201d (sic). This likely indicates the use of a protective mechanism to prevent payloads from being downloaded more than once. Despite this, we managed to obtain and analyze the final payload.<\/p>\n<h2 id=\"the-final-payload-the-tuoni-framework\">The final payload: the Tuoni framework<\/h2>\n<p>The DLL file deployed to infected devices proved to be an OLLVM-obfuscated loader, which we described <a href=\"https:\/\/securelist.com\/forumtroll-apt-hacking-team-dante-spyware\/117851\/#persistent-loader\" target=\"_blank\" rel=\"noopener\">in our previous report on Operation ForumTroll<\/a>. However, while this loader previously delivered rare implants like LeetAgent and Dante, this time the attackers opted for a better-known commercial red teaming framework: Tuoni. Portions of the Tuoni code are publicly available on GitHub. By deploying this tool, the attackers gained remote access to the victim\u2019s device along with other capabilities for further system compromise.<\/p>\n<p>As in the previous campaign, the attackers used <code>fastly.net<\/code> as C2 servers.<\/p>\n<h2 id=\"conclusion\">Conclusion<\/h2>\n<p>The cyberattacks carried out by the ForumTroll APT group in the spring and fall of 2025 share significant similarities. In both campaigns, infection began with targeted phishing emails, and persistence for the malicious implants was achieved with the COM Hijacking technique. The same loader was used to deploy the implants both in the spring and the fall.<\/p>\n<p>Despite these similarities, the fall series of attacks cannot be considered as technically sophisticated as the spring campaign. In the spring, the ForumTroll APT group exploited zero-day vulnerabilities to infect systems. By contrast, the autumn attacks relied entirely on social engineering, counting on victims not only clicking the malicious link but also downloading the archive and launching the shortcut file. Furthermore, the malware used in the fall campaign, the Tuoni framework, is less rare.<\/p>\n<p>ForumTroll has been targeting organizations and individuals in Russia and Belarus since at least 2022. Given this lengthy timeline, it is likely this APT group will continue to target entities and individuals of interest within these two countries. We believe that investigating ForumTroll\u2019s potential future campaigns will allow us to shed light on shadowy malicious implants created by commercial developers\u00a0\u2013 much as we did with the discovery of the Dante spyware.<\/p>\n<h2 id=\"indicators-of-compromise\">Indicators of compromise<\/h2>\n<p><a href=\"https:\/\/opentip.kaspersky.com\/e-library.wiki\/?icid=gl_sl_post-opentip_sm-team_d73fec01407f7d20&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">e-library[.]wiki<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/perf-service-clients2.global.ssl.fastly.net\/?icid=gl_sl_post-opentip_sm-team_eb06bfc235d16f67&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">perf-service-clients2.global.ssl.fastly[.]net<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/bus-pod-tenant.global.ssl.fastly.net\/?icid=gl_sl_post-opentip_sm-team_a67fc6590cfc7fb3&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">bus-pod-tenant.global.ssl.fastly[.]net<\/a><br \/>\n<a href=\"https:\/\/opentip.kaspersky.com\/status-portal-api.global.ssl.fastly.net\/?icid=gl_sl_post-opentip_sm-team_e0e979bb3ed3ad76&amp;utm_source=SL&amp;utm_medium=SL&amp;utm_campaign=SL\" target=\"_blank\" rel=\"noopener\">status-portal-api.global.ssl.fastly[.]net<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction In March 2025, we discovered Operation ForumTroll, a series of sophisticated cyberattacks exploiting the CVE-2025-2783 vulnerability in Google Chrome. We previously detailed the malicious implants used in the operation: the LeetAgent backdoor and the complex spyware Dante, developed by Memento Labs (formerly Hacking Team). However, the attackers behind this operation didn\u2019t stop at their [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-container-style":"default","site-container-layout":"default","site-sidebar-layout":"default","disable-article-header":"default","disable-site-header":"default","disable-site-footer":"default","disable-content-area-spacing":"default","footnotes":""},"categories":[251,256,247,90,254,255,248,99,233,252,250,249,253,257],"tags":[91],"class_list":["post-179","post","type-post","status-publish","format-standard","hentry","category-apt","category-apt-targeted-attacks","category-apt-reports","category-cybersecurity","category-dll","category-forumtroll","category-great-research","category-malware","category-malware-technologies","category-powershell","category-spear-phishing","category-targeted-attacks","category-thematic-phishing","category-windows-malware","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports - Imperative Business Ventures Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports - Imperative Business Ventures Limited\" \/>\n<meta property=\"og:description\" content=\"Introduction In March 2025, we discovered Operation ForumTroll, a series of sophisticated cyberattacks exploiting the CVE-2025-2783 vulnerability in Google Chrome. We previously detailed the malicious implants used in the operation: the LeetAgent backdoor and the complex spyware Dante, developed by Memento Labs (formerly Hacking Team). However, the attackers behind this operation didn\u2019t stop at their [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/\" \/>\n<meta property=\"og:site_name\" content=\"Imperative Business Ventures Limited\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-19T09:15:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/17093749\/forumtroll-part-3-featured-image-990x400.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"headline\":\"Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports\",\"datePublished\":\"2025-12-19T09:15:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/\"},\"wordCount\":1080,\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/17093749\/forumtroll-part-3-featured-image-990x400.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"APT\",\"APT (Targeted attacks)\",\"APT reports\",\"Cybersecurity\",\"DLL\",\"ForumTroll\",\"GReAT research\",\"Malware\",\"Malware Technologies\",\"PowerShell\",\"Spear phishing\",\"Targeted attacks\",\"Thematic phishing\",\"Windows malware\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/\",\"url\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/\",\"name\":\"Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports - Imperative Business Ventures Limited\",\"isPartOf\":{\"@id\":\"https:\/\/blog.ibvl.in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/17093749\/forumtroll-part-3-featured-image-990x400.jpg\",\"datePublished\":\"2025-12-19T09:15:28+00:00\",\"author\":{\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/#primaryimage\",\"url\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/17093749\/forumtroll-part-3-featured-image-990x400.jpg\",\"contentUrl\":\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/17093749\/forumtroll-part-3-featured-image-990x400.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.ibvl.in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.ibvl.in\/#website\",\"url\":\"https:\/\/blog.ibvl.in\/\",\"name\":\"Imperative Business Ventures Limited\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.ibvl.in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/blog.ibvl.in\"],\"url\":\"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports - Imperative Business Ventures Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/","og_locale":"en_US","og_type":"article","og_title":"Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports - Imperative Business Ventures Limited","og_description":"Introduction In March 2025, we discovered Operation ForumTroll, a series of sophisticated cyberattacks exploiting the CVE-2025-2783 vulnerability in Google Chrome. We previously detailed the malicious implants used in the operation: the LeetAgent backdoor and the complex spyware Dante, developed by Memento Labs (formerly Hacking Team). However, the attackers behind this operation didn\u2019t stop at their [&hellip;]","og_url":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/","og_site_name":"Imperative Business Ventures Limited","article_published_time":"2025-12-19T09:15:28+00:00","og_image":[{"url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/17093749\/forumtroll-part-3-featured-image-990x400.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/#article","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/"},"author":{"name":"admin","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"headline":"Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports","datePublished":"2025-12-19T09:15:28+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/"},"wordCount":1080,"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/17093749\/forumtroll-part-3-featured-image-990x400.jpg","keywords":["Cybersecurity"],"articleSection":["APT","APT (Targeted attacks)","APT reports","Cybersecurity","DLL","ForumTroll","GReAT research","Malware","Malware Technologies","PowerShell","Spear phishing","Targeted attacks","Thematic phishing","Windows malware"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/","url":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/","name":"Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports - Imperative Business Ventures Limited","isPartOf":{"@id":"https:\/\/blog.ibvl.in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/#primaryimage"},"image":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/#primaryimage"},"thumbnailUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/17093749\/forumtroll-part-3-featured-image-990x400.jpg","datePublished":"2025-12-19T09:15:28+00:00","author":{"@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02"},"breadcrumb":{"@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/#primaryimage","url":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/17093749\/forumtroll-part-3-featured-image-990x400.jpg","contentUrl":"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2025\/12\/17093749\/forumtroll-part-3-featured-image-990x400.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.ibvl.in\/index.php\/2025\/12\/19\/operation-forumtroll-continues-russian-political-scientists-targeted-using-plagiarism-reports\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.ibvl.in\/"},{"@type":"ListItem","position":2,"name":"Operation ForumTroll continues: Russian political scientists targeted using plagiarism reports"}]},{"@type":"WebSite","@id":"https:\/\/blog.ibvl.in\/#website","url":"https:\/\/blog.ibvl.in\/","name":"Imperative Business Ventures Limited","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.ibvl.in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/55b87b72a56b1bbe9295fe5ef7a20b02","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.ibvl.in\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d20b2cd313e4417a599678e950e6fb7d4dfa178a72f2b769335a08aaa615aa9?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/blog.ibvl.in"],"url":"https:\/\/blog.ibvl.in\/index.php\/author\/admin_hcbs9yw6\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/comments?post=179"}],"version-history":[{"count":0,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/posts\/179\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/media?parent=179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/categories?post=179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.ibvl.in\/index.php\/wp-json\/wp\/v2\/tags?post=179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}