Threat Summary
Category: Cyber Espionage / Military Targeting
Features: Weaponized document lures, Excel-based malware execution, covert data exfiltration, command-and-control obfuscation
Delivery Method: Phishing emails with malicious Excel add-ins (XLL)
Threat Actor: Goffee (aka Paper Werewolf) — suspected pro-Ukrainian cyberespionage group
A covert cyberespionage campaign has been identified targeting Russian military personnel and defense-industry organizations through socially engineered phishing lures disguised as New Year concert invitations and official defense correspondence. The operation leverages malicious Excel add-in files to deliver a previously undocumented backdoor, enabling long-term intelligence collection within sensitive environments tied to military planning and defense procurement.
The activity reflects a broader shift toward psychologically tuned lures aligned with cultural events and hierarchical access points, indicating a focus on senior or administrative personnel with privileged visibility into operational or procurement data.
Core Narrative
The campaign surfaced in early October following the appearance of a malicious Excel add-in file uploaded to public malware analysis repositories. The file, masquerading as a document labeled “enemy’s planned targets,” was engineered to automatically execute code when opened in Microsoft Excel, bypassing traditional macro warnings by exploiting the trusted behavior of XLL add-ins.
Upon execution, the file deployed a custom backdoor now tracked as EchoGather, a modular implant designed to establish persistence, collect detailed system information, execute remote commands, and transfer files back to the attacker. Stolen data was routed through a command-and-control infrastructure masked as a legitimate food delivery website, a tactic intended to blend malicious traffic into normal consumer web activity and evade network monitoring.
To gain initial access, the threat actors relied on Russian-language phishing lures crafted to appear authoritative and timely. One lure posed as an invitation to a New Year concert allegedly intended for senior military officers, exploiting social status cues and seasonal relevance. Another impersonated an official request from a government trade authority, soliciting pricing justification documents linked to state defense contracts and targeting large defense and high-technology enterprises.
While the documents attempted to mimic official formatting and symbolism, investigators noted linguistic inconsistencies and flawed reproductions of national emblems—indicators of automated or semi-automated content generation. These imperfections suggest an adversary still refining its social engineering tradecraft despite increasing technical sophistication.
Infrastructure at Risk
The primary targets appear to be:
- Russian military administrative systems
- Defense-industry contractors and subcontractors
- High-technology enterprises linked to state procurement
- Systems handling pricing, logistics, or operational planning data
Successful compromise of these environments would grant visibility into force readiness, procurement bottlenecks, supply-chain vulnerabilities, and potentially classified planning materials, making them high-value intelligence targets.
Tradecraft Evolution
The use of Excel XLL files represents a deliberate move away from heavily scrutinized macro-based attacks, exploiting a lesser-monitored execution pathway within widely deployed office software. The EchoGather backdoor’s lightweight design and reliance on disguised web infrastructure indicate an emphasis on stealth and longevity rather than immediate disruption.
Although the campaign’s ultimate success rate remains unclear, prior activity attributed to the same threat actor shows a pattern of experimentation with removable media abuse, custom malware, and exploitation of both known and previously unpatched software flaws. This trajectory points toward a group actively iterating on its capabilities rather than executing one-off operations.
Policy / Allied Pressure
The operation highlights the growing normalization of cyberespionage campaigns embedded within regional conflict dynamics, where state-aligned or sympathetic actors operate in the gray zone between intelligence collection and active disruption. Limited public visibility into Russian internal networks complicates independent assessment and attribution, reinforcing asymmetry in global cyber transparency.
Forecast — 30 Days
- Continued use of culturally timed lures to increase click-through success
- Expansion of Excel add-in–based delivery mechanisms
- Refinement of linguistic and visual authenticity in phishing materials
- Potential lateral movement from intelligence collection toward limited operational disruption
TRJ Verdict
This campaign reflects a calculated intelligence-gathering effort rather than indiscriminate cybercrime. Its focus on senior personnel, procurement documentation, and stealthy persistence underscores the strategic value of administrative access in modern conflict. While technical execution shows room for improvement, the operational intent is clear: map, monitor, and quietly extract insight from defense-linked systems without triggering overt escalation.
Cyberespionage no longer announces itself through dramatic breaches. It arrives disguised as routine paperwork, seasonal invitations, and trusted file formats—quietly embedding itself where oversight is weakest and trust is assumed.
🔥 NOW AVAILABLE! 🔥
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 1 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed
🔥 Kindle Edition 👉 https://a.co/d/9EoGKzh
🔥 Paperback 👉 https://a.co/d/9EoGKzh
🔥 Hardcover Edition 👉 https://a.co/d/0ITmDIB
🔥 NOW AVAILABLE! 🔥
📖 INK & FIRE: BOOK 2 📖
A bold and unapologetic collection of poetry that ignites the soul. Ink & Fire dives deep into raw emotions, truth, and the human experience—unfiltered and untamed just like the first one.
🔥 Kindle Edition 👉 https://a.co/d/1xlx7J2
🔥 Paperback 👉 https://a.co/d/a7vFHN6
🔥 Hardcover Edition 👉 https://a.co/d/efhu1ON
Get your copy today and experience poetry like never before. #InkAndFire #PoetryUnleashed #FuelTheFire
🚨 NOW AVAILABLE! 🚨
📖 THE INEVITABLE: THE DAWN OF A NEW ERA 📖
A powerful, eye-opening read that challenges the status quo and explores the future unfolding before us. Dive into a journey of truth, change, and the forces shaping our world.
🔥 Kindle Edition 👉 https://a.co/d/0FzX6MH
🔥 Paperback 👉 https://a.co/d/2IsxLof
🔥 Hardcover Edition 👉 https://a.co/d/bz01raP
Get your copy today and be part of the new era. #TheInevitable #TruthUnveiled #NewEra
🚀 NOW AVAILABLE! 🚀
📖 THE FORGOTTEN OUTPOST 📖
The Cold War Moon Base They Swore Never Existed
What if the moon landing was just the cover story?
Dive into the boldest investigation The Realist Juggernaut has ever published—featuring declassified files, ghost missions, whistleblower testimony, and black-budget secrets buried in lunar dust.
🔥 Kindle Edition 👉 https://a.co/d/2Mu03Iu
🛸 Paperback Coming Soon
Discover the base they never wanted you to find. TheForgottenOutpost #RealistJuggernaut #MoonBaseTruth #ColdWarSecrets #Declassified





I don’t know how you find this stuff out, John, but this is interesting. Usually, Russia seems pretty tight-lipped about just about everything.
Any idea who the source is?
Thank you for this article.
You’re very welcome, Chris. Russia is generally very tight-lipped, especially when military or defense networks are involved. Activity like this usually surfaces through technical artifacts and pattern analysis over time rather than official disclosures. There isn’t a single source, but a convergence of indicators that makes these campaigns visible even when governments don’t acknowledge them. Our systems monitor those signals as well, and in some cases that allows developments to surface early—it really depends on the situation. Ultimately, the activity tends to speak for itself. Thanks again, Chris, it’s always appreciated. I hope you have a great night. 😎
You’re welcome, John, and thank you for your reply. As I’m getting to this quite late in the day, I hope you have a great night as well!