Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
25.01.2026
11227

A multi-stage phishing campaign targeting Russia abuses GitHub and Dropbox to disable Microsoft Defender and deploy Amnesia RAT and ransomware.
Russia just got hit with a nasty multi-stage phishing op
Hackers are weaponizing GitHub and Dropbox to bypass defenses and drop Amnesia RAT + ransomware on Russian targets. This isn't your average phishing email — it's a surgical strike designed to disable Microsoft Defender before deploying the payload.

The campaign starts with a phishing email containing a malicious link. When clicked, it downloads a PowerShell script from GitHub that disables Microsoft Defender's real-time protection. Once defenses are down, the script pulls the Amnesia RAT from Dropbox and executes it.
Amnesia RAT gives attackers full remote access to compromised systems — think keylogging, screen capturing, file exfiltration, and command execution. But they didn't stop there. The same infrastructure deploys ransomware to encrypt files and demand payment, doubling the damage.
- • Phishing email with malicious link
- • PowerShell script from GitHub disables Microsoft Defender
- • Amnesia RAT downloaded from Dropbox
- • Ransomware deployed via same chain
- • Targets specifically in Russia
This attack chain shows how threat actors are evolving beyond simple malware attachments. By abusing legitimate services like GitHub and Dropbox, they're making detection harder and increasing the success rate of their campaigns.
Security researchers tracking this campaign note the sophisticated use of living-off-the-land techniques (LOLbins) and the clear targeting of Russian entities. The combination of remote access and ransomware suggests either data theft or disruptive intent — or both.
A multi-stage phishing campaign targeting Russia abuses GitHub and Dropbox to disable Microsoft Defender and deploy Amnesia RAT and ransomware.
#Amnesia RAT#malware#ransomware#remote access#phishing
Got a topic? Write to ATLA WIRE on Telegram:t.me/atla_community

