<ul data-eligibleForWebStory="true">Rare Werewolf hackers target Russian devices for cryptojacking and data theft.The group utilizes advanced phishing techniques, posing as legitimate organizations to infiltrate systems.Crypto mining by the hackers starts at 1 a.m. and ends at 5 a.m. to remain undetected.Phishing emails kick off the Rare Werewolf campaign, leveraging Russian language and password-protected archives.Malware from opened files grants hackers remote access to victims' systems.XMRig software is deployed for crypto mining while stealing log-ins and operational data.The hackers evade detection by using legitimate third-party tools and scheduled system operations.The campaign targets industrial and academic institutions in Russia, Belarus, and Kazakhstan.Detection is complicated by PowerShell scripts and batch files managing system wake-sleep cycles.Rare Werewolf attacks suggest vulnerabilities in organizational cybersecurity in Russia and CIS countries.Organizations are advised to strengthen email security, monitor unauthorized access, and update antivirus software.