Red Stinger is an Advanced Persistent Threat (APT) group that has been active since 2020. It targets military, transportation, and critical infrastructure entities in Eastern Europe, primarily in Ukraine and Russia-aligned regions. It utilizes malicious installers, DBoxShell and GraphShell malware, as well as cloud storage services for Command and Control (C&C). It has targeted two victims in central Ukraine, a library in Vinnytsia, and individuals involved in the September East Ukraine referendums. The identity of the perpetrator behind the attack is unknown, but it is clear that the motive is surveillance and data gathering.
Source: Hackernews
To mitigate these potential threats, it is important to implement additional cybersecurity measures with the help of a trusted partner like INFRA www.infrascan.net or you can try your self using check.website.