HomeIntelligenceBrief
BREACH BRIEF🟠 High ThreatIntel

HeartlessSoul Espionage Campaign Harvests GIS and GPS Data from Russian Aviation Companies

A Kaspersky‑backed investigation reveals that the state‑aligned HeartlessSoul group is using phishing, malicious ads and counterfeit software on platforms like SourceForge to steal high‑value geospatial data from Russian aviation firms. The campaign underscores supply‑chain and third‑party risks for organizations handling GIS assets.

LiveThreat™ Intelligence · 📅 May 01, 2026· 📰 therecord.media
🟠
Severity
High
TI
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
3 recommended
📰
Source
therecord.media

State‑Sponsored Cyber Espionage Group HeartlessSoul Harvests GIS Data from Russian Aviation Firms

What Happened – The HeartlessSoul threat‑espionage group has been running a multi‑vector campaign against Russian government agencies and aviation companies, using phishing emails, malicious advertising, and counterfeit software on platforms such as SourceForge to deliver spyware. The malware exfiltrates geographic information system (GIS) files, screenshots, keystrokes, browser data, Telegram credentials and device location.

Why It Matters for TPRM – • GIS data reveals critical infrastructure layouts that can be weaponized or sold to adversaries.

• The use of legitimate software‑hosting sites shows how supply‑chain trust can be subverted, increasing third‑party risk.

• Persistent state‑backed actors indicate a long‑term espionage campaign that may target other sectors in the supply chain.

Who Is Affected – Aviation and aerospace manufacturers, air traffic control agencies, satellite‑navigation service providers, and related government bodies in Russia.

Recommended Actions – • Review all third‑party software download policies and enforce verification of source integrity.

• Conduct phishing‑resilience training and implement email‑gateway sandboxing.

• Inventory and monitor GIS data repositories; apply encryption and strict access controls.

Technical Notes – Attack vector: phishing emails with malicious archives, malicious ad campaigns, counterfeit download sites, and abuse of SourceForge to host a fake “GearUP” installer. Malware capabilities: keylogging, screenshot capture, file exfiltration, Telegram credential theft, and geolocation harvesting. Source: The Record

📰 Original Source
https://therecord.media/russia-cyber-espionage-aviation

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.