Nomadic Octopus is a Russian-speaking cyber-espionage group that has been linked to a surveillance campaign targeting high-ranking government officials, telecom services, and public service infrastructures in Tajikistan. The intrusion set, known as Paperbug, is believed to have been active since at least 2014 and involves the use of custom Android and Windows malware to gain backdoor access to systems and siphon sensitive data. The motive behind the attacks is unclear, but could be the work of opposition forces within the country, or a mission carried out by Russia or China. The malware, Octopus, masquerades as an alternative version of the Telegram messaging app, allowing the adversary to surveil victims. Analysis of the command-and-control (C2) server reveals that the group managed to successfully backdoor a total of 499 systems as of January 27, 2022. The group is known to use public offensive tools and generic techniques to disguise their malicious tools as popular web browsers such as Google Chrome, Mozilla Firefox, and Yandex, making attribution more difficult.
To mitigate these potential threats, it is important to implement additional cybersecurity measures with the help of a trusted partner like INFRA www.infrascan.net or you can try your self using check.website
Source: Hackernews