HAPPY LIFE

Happy life section image

WHAT NEWS?

STAC6565 Gold Blade ransomware

STAC6565 Targets Canada in 80% of Attacks as Gold Blade Expands Operations With QWCrypt Ransomware


Reddit logo Twitter logo Substack logo Medium logo
Feb
4
Os-Intel Logo

Trusted News - Expert Analysis - Global Coverage

| 3,150 Views | 7 Min | 42 Comments

STAC6565 Targets Canada in 80% of Attacks as Gold Blade Expands Operations With QWCrypt Ransomware

DECEMBER 12, 2025 • CYBERSECURITY
STAC6565 Targets Canada in 80% of Attacks

Canadian organizations are facing an unprecedented wave of targeted cyberattacks as a threat activity cluster tracked as STAC6565 intensifies operations, with nearly 80% of observed intrusions aimed at Canada, according to a new report by cybersecurity firm Sophos.

B

etween February 2024 and August 2025, Sophos investigated almost 40 security incidents tied to the group. Analysts say the activity strongly overlaps with a financially driven hacking group known by several aliases—Gold Blade, Earth Kapre, RedCurl, and Red Wolf—marking the latest evolution of a threat actor known for sophisticated espionage and corporate data theft.

Canada Becomes the Prime Target

While Gold Blade historically operated across Russia and parts of Europe, the newest campaign marks a dramatic geographic realignment.

"This campaign reflects an unusually narrow focus, with almost 80% of the attacks targeting Canadian organizations," — Morgan Demboski, Sophos Researcher

Victims span both public and private sectors, including service providers, manufacturing and retail companies, transportation networks, NGOs, and technology and infrastructure sectors. The remaining 20% of attacks were directed at organizations in the U.S., Australia, and the U.K.

Gold Blade attack targets Canada

Espionage to Ransomware Transition: Gold Blade has been active since late 2018, beginning with commercial espionage campaigns targeting Russian companies. Over time, the group expanded to Germany, Norway, Slovenia, Ukraine, the U.S., and Canada. Historically dependent on phishing emails to infiltrate corporate networks, Gold Blade has now adopted a more aggressive, hybrid strategy that blends data theft, credential harvesting, and targeted ransomware deployment. Sophos notes that this evolution demonstrates a shift from purely espionage-focused operations to financially motivated attacks.

QWCrypt: A Custom Ransomware Locker

The most striking development in the new campaign is Gold Blade's deployment of QWCrypt, a bespoke ransomware strain designed for selective, high-value extortion operations. This shift aligns Gold Blade with modern hybrid threat actors who steal data first, then encrypt systems to increase leverage.

Attack Timeline

Feb 2024 - Aug 2025: 40+ incidents investigated, 80% targeting Canada

Victim Sectors

Service providers, manufacturing, retail, transportation, NGOs, tech infrastructure

Geographic Spread

Canada (80%), U.S., Australia, U.K. (remaining 20%)

Group Aliases

Gold Blade, Earth Kapre, RedCurl, Red Wolf, STAC6565

Primary Tools

QWCrypt ransomware, RedLoader, PowerShell scripts, Active Directory recon

Campaign Focus

Data theft + ransomware hybrid attacks, selective high-value extortion

RedLoader and the Role of Active Directory Recon

A distinctive tool in the group's arsenal is RedLoader, a malicious utility that communicates with remote command-and-control servers, extracts system and user information, runs PowerShell scripts to enumerate Active Directory environments, and sets the stage for lateral movement and privilege escalation.

AD reconnaissance is especially dangerous in enterprise networks, enabling attackers to identify domain admins, critical servers, and high-value assets before deploying ransomware.

QWCrypt ransomware deployment

Active Directory Penetration: The group's focus on AD enumeration allows them to map out entire corporate networks, identifying the most valuable targets and planning precise ransomware deployment. This methodical approach distinguishes Gold Blade from more opportunistic ransomware groups.

A Broader, Multi-Country Threat

Outside Canada, STAC6565 / Gold Blade has also targeted the United States, Australia, and the United Kingdom. The sectors most heavily impacted include critical services and utilities, manufacturing and logistics, retail and e-commerce, technology firms, NGOs and civil society groups, and transportation infrastructure.

This pattern suggests that Gold Blade has evolved into a global threat actor combining espionage, data theft, and selective ransomware attacks to maximize economic gain.

"The shift from espionage-focused operations to ransomware deployment represents a significant evolution in Gold Blade's tactics," said cybersecurity analyst Mark Richardson. "They're no longer just stealing data—they're holding entire organizations hostage while simultaneously threatening to leak sensitive information. This double-extortion model has proven highly profitable for sophisticated threat actors."

A Rising Threat for 2025 and Beyond

The STAC6565 campaign highlights a worrying trend in the cyber threat landscape: espionage groups adopting ransomware, targeted regional campaigns, custom malware toolkits, deep Active Directory penetration, and hybrid financial-espionage motives.

Sophos warns that organizations—especially those in Canada—should immediately strengthen phishing prevention, network segmentation, MFA enforcement, PowerShell logging, EDR monitoring, and ransomware containment protocols. As Gold Blade expands its operations and deploys increasingly sophisticated tools, cybersecurity experts expect further intrusions in the coming months.

Immediate Actions

Strengthen phishing prevention, enforce MFA, segment critical networks

Monitoring

Enable PowerShell logging, deploy EDR solutions, monitor AD changes

Response Planning

Develop ransomware containment protocols, test backup restoration

Employee Training

Conduct security awareness programs, phishing simulation exercises

Technical Controls

Implement application whitelisting, restrict PowerShell usage

Threat Intelligence

Monitor for Gold Blade IOCs, share threat data with industry peers

The targeted nature of these attacks against Canadian organizations suggests either strategic intelligence about vulnerable sectors or potential geopolitical motives beyond mere financial gain. Cybersecurity analysts are closely monitoring whether this represents a sustained campaign or a temporary focus shift by the threat group.

Tags: Cybersecurity, Ransomware, Canada, STAC6565, Gold Blade, QWCrypt, Cyber Attacks, Network Security

Investigative Reporter Avatar
Investigative Reporter - Published posts: 12
John Doe is a seasoned investigative reporter focusing on corporate transparency, financial crimes, and environmental policies. With years of experience, John brings in-depth insights into the challenges faced by businesses and governments in these areas.
Successfully subscribed to newsletter!