Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Cyber Espionage Group Targets Aviation Firms to Steal Map Data
    Cybersecurity

    Cyber Espionage Group Targets Aviation Firms to Steal Map Data

    adminBy adminMay 11, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Cyber Espionage Group Targets Aviation Firms to Steal Map Data
    Share
    Facebook Twitter LinkedIn Pinterest Email

    As cyber operations continue to support regional conflicts, threat groups are targeting a wider range of information, including geospatial mapping and global positioning systems (GPS) data that can be used to locate enemy assets and gather information on a rival’s own intelligence capabilities, cybersecurity firms warn.

    One cyber espionage group has used specially crafted phishing and malvertising campaigns to target aerospace firms and drone operators by creating domains and sites that host malware that appears to be installers for legitimate aviation software and resources, according to Kaspersky Lab. The group, dubbed HeartlessSoul, even planted a fake project on SourceForge, a legitimate download service, that resulted in the downloading of a malicious archive.

    The ultimate goal of the group appears to be collecting geospatial data and information from compromised systems, currently mainly belonging to the Russian government and enterprises, Kaspersky Lab tells Dark Reading.

    Related:Why Security Leadership Makes or Breaks a Pen Test

    “[T]his actor is a sophisticated one: combined multi-stage infection, fileless execution and the data the group targets, confirms that it is not just a hacktivist or criminal group, but a motivated group posing a serious threat to organizations,” the cybersecurity firm said in its response.

    With several ongoing regional military conflicts and an increase in interference with global navigation satellite systems (GNSS), geospatial data has become a more common, if not popular, target for some threat groups. In 2024, for example, the cybercriminal hacker IntelBroker claimed to have breached Space-Eyes, a Miami-based geospatial intelligence firm, although analysts have cast doubt on some of the hacker’s claimed exploits. IntelBroker, later identified as British national Kai West, was arrested in June 2025.

    The espionage campaigns show signs of sophistication and align with the concerns of nation-states, says Will Baxter, head of product for threat intelligence firm Team Cymru.

    “The targeting of GIS, drone, and aviation data points to an intelligence-collection or defense-oriented angle, with downstream value across logistics disruption, infrastructure mapping, asset movement tracking, and operational planning,” he says. “The most under-appreciated value in GIS theft is operational ground truth — the adversary gets to see exactly what the victim’s own analysts believe about terrain, infrastructure, and routes, which lets them model gaps in the victim’s own awareness.”

    Geospatial Files, Hidden Commands

    Related:How Dark Reading Lifted Off the Launchpad in 2006

    Once the attackers gain access to databases and workstations used for GIS analysis, HeartlessSoul downloads a variety of common document types, but also some rather uncommon types, including GPS data, Geographic Information System (GIS) shape files, digital geographic relief files, and some proprietary GIS mapping files, Kaspersky Lab stated in its report (in Russian).

    “Such GIS files … allow you to obtain information about infrastructure — roads, engineering networks, terrain, as well as strategic objects, and provide confidential data in engineering, state and industrial organizations,” the company stated (Google translated) in the analysis.

    The attackers used a variety of common techniques in their efforts to compromise systems, including a JavaScript remote access Trojan (RAT) and PowerShell scripts for executing common tasks. Some of the malicious LNK files used a Windows shortcut exploit (ZDI-CAN-25373), which has become popular in advanced persistent threat (APT) campaigns.

    Kaspersky Lab has monitored the group through compromised command-and-control infrastructure since at least February. The company traced the group’s earliest activities back to at least September 2025.

    Attribution Uncertain

    While no Western cybersecurity vendors have identified a group that matches HeartlessSoul, two other Russian cybersecurity firms — Positive Technologies and BI.ZONE — have documented the threat group, with the latter naming the group Versatile Werewolf. Two other threat groups, Paper Werewolf and Eagle Werewolf, also target drone-focused forums and chat channels, such as Telegram, as well as Russian citizens seeking to bypass restrictions on Starlink devices, according to a BI.ZONE analysis.

    Related:Another AI-Assisted Software Scan Yields 9-Year-Old Linux Bug

    None of the three companies have publicly attributed the attacks. Paper Werewolf, also known as GOFFEE, appears to link to pro-Ukrainian groups, which initially targeted Russian defense contractors. BI.ZONE noted that the three groups, while given similar names and have adopted similar techniques, appear to be operating autonomously.

    Defenders should focus on mounting a practical response, hunting for signs of the attackers, and find operational-security failures, Baxter says.

    Additionally, companies and agencies that use GIS data should protect their crown jewels, focusing on putting specific assets such as flight-planning software behind zero-trust security measures like identity-bound access with egress monitoring, and segmenting engineering networks from general business networks, he says.

    The business will benefits from reducing operation risk for the most critical systems, without forcing non-critical environments to bear the burden of zero trust for no significant benefit. “It’s an asymmetric investment in the small set of workstations that touch crown-jewel data,” Baxter says. “Most businesses need flexibility and scale, and a textbook zero-trust posture on every drone-operator or field workstation isn’t realistic.”

    Aviation Cyber data Espionage firms Group Map steal Targets
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleI Helped Build Google’s Keyword System. Here’s Why It’s Becoming Obsolete
    Next Article How I Saved Over $115,000 on Travel by Making My Skills Pay
    admin
    • Website

    Related Posts

    Encryption Consulting launches CertSecure Manager v3.3 with zero-touch certificate renewals

    May 20, 2026

    GitHub confirms breach of 3,800 repos via malicious VSCode extension

    May 20, 2026

    Grafana GitHub Breach Exposes Source Code via TanStack npm Attack

    May 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Google adds llms.txt check to Chrome Lighthouse

    May 20, 2026

    Riverbed expands autonomous AI capabilities for Aternity platform

    May 20, 2026

    What’s New in WordPress 7.0? (Features & Screenshots)

    May 20, 2026

    How Denis Yurchak Built Yadaphone to $17,500 a Month and 20,000 Users in Just Over a Year After the Skype Shut Down

    May 20, 2026
    Categories
    • Blogging (82)
    • Cybersecurity (1,955)
    • Privacy & Online Earning (223)
    • SEO & Digital Marketing (1,208)
    • Tech Tools & Mobile / Apps (1,796)
    • WiFi / Internet & Networking (305)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Google adds llms.txt check to Chrome Lighthouse

    May 20, 2026

    Riverbed expands autonomous AI capabilities for Aternity platform

    May 20, 2026

    What’s New in WordPress 7.0? (Features & Screenshots)

    May 20, 2026
    Most Popular
    • Google adds llms.txt check to Chrome Lighthouse
    • Riverbed expands autonomous AI capabilities for Aternity platform
    • What’s New in WordPress 7.0? (Features & Screenshots)
    • How Denis Yurchak Built Yadaphone to $17,500 a Month and 20,000 Users in Just Over a Year After the Skype Shut Down
    • How to do SEO for beginners
    • Google Introduces New Ad Formats In AI Mode
    • AI reshapes cybersecurity workforce priorities as IT teams brace for new risks
    • How to stand out in AI search when every business sounds the same
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.