"Since the beginning of June, we have been recording a mass mailing of phishing emails ... The attackers used spoofing, that is, they forged the sender's address, for the recipient the letter looked like a message from government agencies, "RIA Novosti quoted Bi.Zone as saying.

The subject line of the letter for employees most often appeared: "General mobilization - 2023", "Verification of documents of the military registration and enlistment office", etc. In the attachment to the letter, an archive with the DCRat Trojan was attached under the guise of documents. The virus allowed attackers to gain control over the system: they could take screenshots, find out the sequence of keystrokes and collect confidential information.

Earlier, the Public Relations Center of the FSB of Russia said that in 2022 more than 5 thousand hacker attacks on Russian critical infrastructure were recorded.

It was also reported that over the past year, the hacker group Sneaking Leprechaun attacked more than 30 organizations from Russia and Belarus, most of which develop software, for ransom.