• Explore
  • Blog
  • Podcast
  • About
  • Services
  • Contact
Menu

Exploring Information Security

Securing the Future - A Journey into Cybersecurity Exploration
  • Explore
  • Blog
  • Podcast
  • About
  • Services
  • Contact

April 2025 - ExploreSec Cybersecurity Threat Intelligence Newsletter

June 10, 2025

This is a newsletter I create and share with my internal security team. Feel free to grab and do the same.

Ransomware Ecosystem in Flux 

Coveware's latest analysis reveals a significant transformation in the ransomware threat landscape as of Q1 2025. The once-dominant Ransomware-as-a-Service (RaaS) model is unraveling due to intensified law enforcement actions, internal discord, and operational setbacks. 

Key Insights: 

  • Disintegration of Major RaaS Groups: Prominent groups like LockBit, BlackCat/ALPHV, and Black Basta have collapsed, plagued by internal conflicts and increased scrutiny. Leaked communications from Black Basta highlight challenges in targeting, risk assessment, and evasion of sanctions. 

  • Emergence of New Threat Actors: The void left by these groups is being filled by unaffiliated extortionists, nascent ransomware brands with ties to espionage and hacktivism, and a few remnants of traditional ransomware operations. 

  • Operational Missteps: Recent incidents, such as Clop's underwhelming Cleo campaign and a poorly executed Oracle Cloud SSO breach by a BreachForums actor, indicate a decline in the sophistication and monetization strategies of threat actors. 

  • Rise of Phantom Scams: The appearance of fraudulent ransom notes, like those falsely attributed to BianLian, underscores a trend toward deceptive tactics as traditional extortion methods wane. 

  • Increased Exposure and Arrests: Enhanced operational security measures and international cooperation have led to the identification and apprehension of several threat actors, diminishing the perceived anonymity that once shielded cybercriminals. 

Further Reading: Coveware 

 

 

Stealthy .NET Malware: Hiding Malicious Payloads as Bitmap Resources 

Unit 42 researchers have identified a novel obfuscation technique employed by threat actors, wherein malicious payloads are concealed within bitmap resources embedded in seemingly benign 32-bit .NET applications. This method leverages steganography to initiate a multi-stage execution chain, ultimately deploying final payloads such as Agent Tesla, RemcosRAT, or XLoader. 

Key Insights: 

  • Steganographic Embedding: Malware is hidden within bitmap resources of .NET executables, allowing it to evade traditional detection mechanisms. 

  • Malspam Distribution: Campaigns have been observed targeting sectors like finance in Türkiye and logistics in Asia, using localized email subjects and attachments to increase credibility. 

  • Multi-Stage Execution: Upon execution, the infected application extracts and deobfuscates embedded payloads, loading them as dynamic-link libraries before executing the final malicious code. 

  • Advanced Obfuscation Techniques: Additional methods such as metadata obfuscation, opcode replacement, and control flow manipulation are used to hinder static analysis and reverse engineering. 

Further Reading: Unit 42 

 

 

New Tool Can Trick Windows into Disabling Microsoft Defender 

Security researchers have discovered a new, publicly available tool called "DefendNot" that can manipulate Windows systems into effectively disabling Microsoft Defender, the built-in antivirus software. This tool doesn't exploit vulnerabilities but instead uses legitimate system administration features in unintended ways. 

Key Insights for Security Teams: 

  • Abuse of Admin Privileges: Highlights the critical importance of least privilege principles and monitoring privileged accounts. 

  • Bypasses Traditional Defenses: May evade detection by traditional security solutions that primarily look for malware signatures or exploit activity. 

  • Focus on Tamper Protection: Underscores the importance of enabling and closely monitoring tamper protection features within Microsoft Defender. 

  • Need for Behavioral Monitoring: Organizations should emphasize behavioral monitoring and anomaly detection to identify suspicious activity. 

  • Tool is Publicly Available: Means threat actors could potentially incorporate it into their attack chains. 

Further Reading: BleepingComputer 

 

 

NIST Proposes Metric to Identify Likely Exploited Vulnerabilities 

The National Institute of Standards and Technology (NIST), in collaboration with the Cybersecurity and Infrastructure Security Agency (CISA), has introduced a proposed metric aimed at determining the likelihood that a given vulnerability has been exploited in the wild. This initiative seeks to enhance the efficiency and cost-effectiveness of enterprise vulnerability remediation efforts. 

Key Insights: 

  • Addressing Limitations of Existing Systems: Current remediation strategies often rely on the Exploit Prediction Scoring System (EPSS) and Known Exploited Vulnerabilities (KEV) lists. However, EPSS has been noted for inaccuracies, and KEV lists may not be comprehensive. The proposed metric aims to augment these tools by providing a more accurate assessment of exploitation likelihood. 

  • Enhancing Vulnerability Prioritization: By estimating the probability of exploitation, organizations can better prioritize vulnerabilities, focusing resources on those most likely to be targeted. 

  • Collaborative Approach: The success of this metric depends on collaboration with industry partners to provide necessary performance measurements and validate the effectiveness of the approach. 

Further Reading: NIST CSWP 41 

 

 

New Best Practices Guide for Securing AI Data Released 

CISA, NSA, FBI, and international partners have jointly released a new Cybersecurity Information Sheet focused on AI Data Security: Best Practices for Securing Data Used to Train & Operate AI Systems. This guide emphasizes that robust data security is fundamental for ensuring the accuracy, integrity, and trustworthiness of AI outcomes throughout its entire lifecycle. 

Key Insights: 

  • Holistic Risk Management: The guide outlines risks stemming from data security and integrity issues across all phases of AI, from development to operation. 

  • Target Audience: It's particularly relevant for Defense Industrial Bases, National Security Systems owners, federal agencies, and Critical Infrastructure owners/operators. 

  • Core Recommendations: Key practices include adopting strong data protection measures, proactively managing AI-related risks, and enhancing monitoring, threat detection, and network defense capabilities. 

  • Vigilance is Key: As AI integration grows, organizations must take deliberate steps to secure the underlying data. 

Further Reading: CISA 

 

 

DDoS Attack "Street Prices": What You Need to Know 

Recent analysis of the underground market reveals that the "street prices" for DDoS (Distributed Denial-of-Service) attacks have remained remarkably stable over the past few years, with some new trends in service delivery. While web-based booters are still available, Telegram-based booter services are becoming a new norm, offering readily accessible attack capabilities. 

Key Insights: 

  • Stable Pricing: DDoS attack costs have remained consistent, making them a relatively affordable option for malicious actors. 

  • Layer 3/4 Attacks (Volume-based):  

  • 1 GB/Day (Booter-Service): ~$1/day 

  • 100 GB/Day: ~$25/day 

  • 1000 GB/Day (DDoS for Hire): ~$150/day 

  • Layer 7 Attacks (Application-layer):  

  • 10,000 RPS/Day (Booter-Service): ~$1/day 

  • 50,000 RPS/Day (DDoS for Hire): ~$20/day 

  • 100,000 RPS + Protected Services (DDoS for Hire): ~$50/day 

  • Max monthly cost for DDoS for Hire: ~$10,000/month 

  • DDoS-as-a-Service (DDoSaaS) Dominance: This business model continues to thrive, with attackers charging hourly or monthly fees to sustain attacks, often with extra charges for targeting protected services. 

  • Emergence of Telegram Booters: Threat actors are increasingly leveraging Telegram for offering and managing DDoS services, simplifying access for potential customers. 

Further Reading: KyberVandals Blog 

 

 

Deceptive CAPTCHA "ClickFix" Campaign Uses Clipboard Injection to Deliver Malware 

Threat actors are employing a new social engineering campaign, dubbed "ClickFix," that utilizes fake CAPTCHA prompts on compromised or cloned websites. This sophisticated technique tricks users into launching malware by combining clipboard injection with abuse of the Windows Run dialog, leading to the delivery of payloads like Lumma Stealer and NetSupport RAT. 

Key Insights: 

  • Social Engineering Focus: The campaign heavily relies on user fatigue with CAPTCHA mechanisms, guiding victims through seemingly familiar steps to execute malicious code. 

  • Clipboard Injection & Run Dialog Abuse: The core of the attack involves copying a malicious PowerShell or mshta command to the clipboard, which users are then instructed to paste and execute in the Windows Run dialog. 

  • Living Off the Land Binaries (LOLBins): Attackers extensively use trusted system binaries like PowerShell, mshta.exe, and certutil.exe to bypass traditional security defenses, making detection challenging. 

  • Payloads: Frequently observed payloads include infostealers (e.g., Lumma Stealer targeting browser data, credentials, and crypto wallets) and remote access tools (e.g., NetSupport RAT for full system access). 

  • Simplicity and Effectiveness: The campaign's success stems from its simplicity, avoiding zero-day exploits or complex hidden mechanisms, relying instead on user interaction. 

  • Proactive Defense: This campaign underscores the need for robust endpoint detection and response (EDR) solutions capable of behavioral analysis and detection of LOLBin abuse, alongside user education on suspicious CAPTCHA prompts and the dangers of pasting unknown commands. 

Further Reading: SecurityOnline.info 

 

 

Cybercriminals Exploit AI Hype to Spread Malware 

Cybercriminals are increasingly exploiting the public's interest in artificial intelligence by creating fake AI-themed websites and advertisements to distribute malware. A recent campaign identified by Mandiant Threat Defense involves the threat group UNC6032 using deceptive ads on platforms like Facebook and LinkedIn to lure users into downloading malicious software disguised as AI video generation tools. 

Key Insights: 

  • Deceptive Advertising: Thousands of malicious ads have been disseminated, impersonating legitimate AI tools such as Luma AI and Canva Dream Lab. These ads direct users to fraudulent websites designed to mimic authentic AI services. 

  • Malware Deployment: Upon interacting with these fake sites, users are prompted to download a ZIP file containing the STARKVEIL malware dropper. This dropper installs multiple malware components, including GRIMPULL, XWORM, and FROSTRIFT, which are designed to steal sensitive information and establish persistent access to the victim's system. 

  • Information Theft: The deployed malware targets a range of data, including login credentials, cookies, credit card information, and digital wallet contents. Some components, like XWORM, also perform keylogging and screen capture, further compromising user privacy. 

  • Evasion Techniques: The malware employs sophisticated methods to avoid detection, such as using Braille pattern blank characters to obscure file extensions and leveraging legitimate processes for malicious activities. 

This campaign underscores the importance of vigilance when engaging with online advertisements, especially those offering AI-related services. Users should be cautious of unsolicited offers and verify the legitimacy of websites before downloading any software. 

Further Reading: Google Cloud Blog 

 

 

Beyond the Kill Chain: How Cybercriminals Invest Their Profits 

Sophos X-Ops' five-part series, Beyond the Kill Chain, explores what happens after a successful cyberattack. The series reveals how financially motivated threat actors invest their illicit earnings—often blending legitimate business with ethically questionable and outright criminal ventures. 

Key Insights: 

  • Legitimate Business Ventures: Cybercriminals are investing in seemingly lawful enterprises such as restaurants, real estate, and e-commerce platforms. These ventures help launder money while also creating additional income streams. 

  • Ethically Dubious Activities: Some threat actors operate in legal gray zones, selling spyware, monetizing vulnerability research under the guise of security services, or manipulating online traffic for advertising profits. 

  • Criminal Enterprises: Illicit gains are also funneled into traditional criminal operations like counterfeit goods, drug trafficking, and underground gambling, showing how cybercrime supports broader organized crime ecosystems. 

  • Implications for Cybersecurity: Mapping how threat actors reinvest their profits helps threat intelligence teams understand evolving risk models and disrupt the infrastructure supporting ongoing cybercriminal activity. 

Further Reading: Sophos News 

 

 

Lumma Infostealer: Disrupted but Not Defeated 

A recent global law enforcement operation disrupted parts of the Lumma Infostealer malware-as-a-service platform, seizing over 2,500 domains. However, key infrastructure—particularly servers hosted in Russia—remains intact, allowing Lumma’s core operations to continue. 

Key Insights: 

  • Partial Takedown: While many domains were seized, Lumma’s main server remains online, enabling continued malware activity. 

  • Resilience and Recovery: The developer claimed services resumed quickly with no arrests made, signaling strong operational recovery. 

  • Ongoing Threat: Stolen credentials and sensitive data tied to Lumma are still appearing on dark web markets. 

  • Psychological Tactics: Authorities planted disruptive messages in Lumma’s Telegram channels and admin panels to undermine trust in the service. 

  • Mixed Reactions: Some cybercriminals are distancing themselves from Lumma, while others remain loyal and active. 

Further Reading: Check Point Blog 

 

 

CFOs Targeted in Sophisticated Spear-Phishing Campaign 

A recent spear-phishing campaign is targeting Chief Financial Officers (CFOs) and finance executives across banking, energy, insurance, and investment sectors in regions including Europe, Africa, Canada, the Middle East, and South Asia. The attackers use a multi-stage approach to deploy NetBird, a legitimate WireGuard-based remote access tool, onto compromised systems. 

Key Insights: 

  • Deceptive Recruitment Emails: The campaign begins with emails impersonating a Rothschild & Co recruiter offering a “strategic opportunity.” Victims are directed to a Firebase-hosted page featuring a custom CAPTCHA to access a malicious file. 

  • Malicious Payload Delivery: After solving the CAPTCHA, users download a ZIP file containing a VBS script. When executed, it installs NetBird and OpenSSH, creates a hidden local admin account, and enables Remote Desktop Protocol (RDP) for persistent attacker access. 

  • Evasion Techniques: The use of custom CAPTCHAs and trusted hosting services helps the attackers bypass traditional security defenses and increases credibility. 

  • Attribution: Some infrastructure overlaps with known nation-state campaigns, but the specific threat actor remains unidentified. 

Further Reading: Trellix Blog 

 

 

Threat Actors Exploit Google Apps Script for Evasive Phishing Attacks 

Threat actors are leveraging Google's Apps Script platform to host phishing pages that appear legitimate, allowing them to steal login credentials. These campaigns often begin with emails posing as invoice notifications, linking to webpages hosted using Google Apps Script. By operating within Google's trusted environment, attackers make their phishing pages seem more authentic, increasing the chances of success. 

Key Insights: 

  • Abuse of Trusted Services: Google Apps Script, a JavaScript-based platform used for automating Google Workspace tasks, is being exploited to host fake login pages that capture user credentials and send them to attacker-controlled servers. 

  • Evasion of Security Measures: Because the scripts are hosted on Google's own domain, they can bypass traditional email and web filters that typically block suspicious domains. 

  • Sophisticated Phishing Techniques: The phishing emails and login prompts are convincingly designed to mimic legitimate services, making it more likely that targets will engage and provide sensitive information. 

Further Reading: BleepingComputer 

 

 

HuluCAPTCHA – An Evolving Fake CAPTCHA Framework 

Security researchers have identified "HuluCAPTCHA," a sophisticated fake CAPTCHA framework actively compromising websites. This advanced system tricks users into running malicious commands via fake CAPTCHA prompts and the Windows Run dialog, leading to infections with infostealers and remote access tools. 

Key Insights: 

  • Deceptive Execution: Users are redirected from compromised sites to fake CAPTCHA pages, then instructed to copy/paste malicious PowerShell or mshta commands into Windows Run. 

  • Advanced Tracking & Stealth: The framework meticulously tracks user interactions and potential command execution. It leverages Living Off the Land Binaries (LOLBins) to evade traditional defenses. 

  • Payload Versatility: Delivers various infostealers (e.g., Lumma, Aurotun) and remote access tools (e.g., Donut Injector). 

  • Persistent Backdoors: Compromised WordPress sites show sophisticated hidden admin backdoors, designed for stealth and persistence. 

  • High-Value Targets: Attackers are targeting organizations that could hold sensitive data, highlighting the potential for significant impact. 

Further Reading: HuluCaptcha — An example of a FakeCaptcha framework 

 

 

Phishing Campaign Exploits Google.com Open Redirects 

A recent phishing campaign has been observed exploiting an open redirect vulnerability within Google's google.com/travel/clk endpoint. Threat actors are leveraging this legitimate Google Travel click-tracking mechanism to redirect users from a trusted google.com domain to malicious phishing sites. This technique adds an air of legitimacy to phishing links, making them harder for users to identify as fraudulent. 

Key Insights: 

  • Trusted Domain Abuse: Attackers are using google.com/travel/clk?pc=[token]&pcurl=[target_URL] to redirect users. The presence of google.com in the initial link provides a deceptive sense of security. 

  • Persistent Tokens: The pc token, which controls the redirect, lacks a clear expiration mechanism and can remain valid for months or even years. This allows attackers to reuse tokens across multiple campaigns. 

  • Ease of Exploitation: Obtaining a valid token is trivial, requiring only a visit to Google's hotel search page to copy one from a legitimate link. 

  • Google's Stance: Google's official position classifies open redirects as "very little practical risk," claiming they invest in phishing detection rather than preventing the redirects themselves. This stance is debated given the observed abuse. 

  • Detection Challenge: The initial legitimate google.com domain in the link makes it difficult for users and some security systems to immediately flag it as malicious. 

Mitigation Recommendation for Internal Security Teams: 

  • Flag or sandbox any google.com/travel/clk links that appear in email and other messages until Google clarifies its redirect validation mechanisms. 

Further Reading: Another day, another phishing campaign abusing google.com open redirects 

 

 

Cybercriminals Use Fake Booking Sites to Spread AsyncRAT Malware 

Cybercriminals are exploiting fake Booking.com websites to infect users with AsyncRAT, a remote access trojan. Victims are lured through deceptive ads and social media links to counterfeit booking sites, where they are tricked into running a malicious PowerShell script. The attack results in full remote control of the infected system, putting sensitive personal information at risk. 

Key Insights: 

  • Attackers use fake CAPTCHA prompts to manipulate users into executing malware. 

  • The AsyncRAT payload allows for full system access, including surveillance and data theft. 

  • Domains rotate every few days, making detection and blocking more difficult. 

Further Reading: Malwarebytes Blog 

 

 

UNC6040 – Voice Phishing to Salesforce Data Extortion 

Google Threat Intelligence Group (GTIG) is tracking UNC6040, a financially motivated threat cluster specializing in voice phishing (vishing) campaigns. This group is successfully impersonating IT support to gain access to organizations' Salesforce instances, primarily to steal large volumes of data for subsequent extortion. Their tactics rely heavily on manipulating end users rather than exploiting software vulnerabilities. 

 

Key Insights: 

  • Vishing is Key: UNC6040 uses convincing phone calls, often targeting English-speaking employees, to socially engineer access. 

  • Salesforce Data Loader Abuse: They trick victims into authorizing malicious versions of Salesforce Data Loader, gaining broad access to exfiltrate sensitive data. 

  • Lateral Movement: After Salesforce, they use stolen credentials for lateral movement into other cloud platforms like Okta and Microsoft 365. 

  • No Platform Vulnerability: Attacks exploit user trust and process gaps, not inherent Salesforce flaws. 

  • Persistent Threat: Extortion can occur months after the initial intrusion, indicating a patient and persistent threat. 

Further Reading: The Cost of a Call: From Voice Phishing to Data Extortion 

In News Tags threat intelligence, Newsletter, malware, phishing
Comment

April 2025 - ExploreSec Cybersecurity Threat Intelligence Newsletter

April 22, 2025

This is a newsletter I create and share with my internal security team. Feel free to grab and do the same.

Camera Off: Akira Deploys Ransomware via Webcam 

Akira, a notorious ransomware group, has demonstrated a novel technique by bypassing Endpoint Detection and Response (EDR) tools through the compromise of unsecured webcams. After facing detection while attempting to deploy ransomware on a Windows server, Akira pivoted to target a vulnerable webcam on the victim's network. This device, running a lightweight Linux OS and lacking EDR, allowed the group to deploy Linux-based ransomware successfully. This incident emphasizes the importance of securing IoT devices and enhancing patch management strategies. 

Key Insights: 

  • IoT devices, such as webcams, can be used as pivot points for attackers to bypass traditional security tools like EDR. 

  • Akira's adaptability highlights how ransomware groups are evolving and using multiple platforms for attacks. 

  • Organizations should prioritize securing all devices, including IoT, and ensuring comprehensive patch management. 

Further Reading: S-RM 

 

 

Not Just for Developers: How Product and Security Teams Can Use GitHub Copilot 

GitHub Copilot is transforming not just development teams but also product and security teams. With its AI-powered code generation, it can assist security teams in identifying vulnerabilities faster and help product teams in generating feature specifications or optimizing documentation. Copilot's integration into the workflow allows these teams to accelerate their tasks and focus more on strategy rather than repetitive tasks, improving efficiency and productivity across the board. 

Key Insights: 

  • GitHub Copilot isn't just for coders; it’s valuable for security and product teams too. 

  • It accelerates vulnerability identification and aids in documentation and feature specification. 

  • Teams can leverage AI to improve efficiency and focus on high-impact work. 

Further Reading: GitHub Blog 

 

 

Blink and They're In: How Rapid Phishing Attacks Exploit Weaknesses 

Phishing attacks are accelerating, with attackers exploiting weaknesses in systems faster than security teams can respond. In one notable case, attackers gained control of a network in just 48 minutes using social engineering and a flood of spam emails, followed by convincing employees to give remote access. These attacks leverage low-tech tactics, such as using legitimate tools like Microsoft Teams and Quick Assist, to bypass security defenses. 

Key Insights: 

  • Attackers are exploiting basic social engineering tactics, such as impersonating IT help desks, to gain control of devices. 

  • Rapid response times (48 minutes in this case) highlight the need for automated security measures. 

  • Preventative measures include verifying help-desk staff interactions and locking down remote access tools like Quick Assist. 

Further Reading: ReliaQuest 

 

 

ACRStealer Infostealer Exploiting Google Docs as C2 

ACRStealer, a new type of infostealer, is taking a unique approach by using Google Docs as an intermediary command-and-control (C2) server. Threat actors hide malicious commands within Google Docs files, leveraging Base64 encoding to keep the communication with the C2 server hidden. The infostealer targets a wide range of sensitive information, including browser data, cryptocurrency wallet files, FTP credentials, and even chat program data. This shift in tactics highlights the evolving nature of cybercrime and the need for robust monitoring and secure data handling practices to detect and prevent such attacks. 

Key Insights: 

  • ACRStealer uses Google Docs, telegra.ph, and Steam as intermediary C2 servers, making it harder to detect the malware's activity. 

  • The malware targets sensitive data like browser history, cryptocurrency wallet files, and FTP credentials. 

  • It continues to evolve by hiding its communication strings within different services to evade detection. 

Further Reading: AhnLab 

 

 

 

 

SecTopRAT Bundled in Chrome Installer Distributed via Google Ads 

A new phishing attack is leveraging Google Ads to distribute a fake Google Chrome installer bundled with SecTopRAT, a remote access Trojan (RAT) with stealer capabilities. Users searching for the legitimate Google Chrome installer are led to a malicious Google Sites page, where they unknowingly download the malware disguised as Chrome. The attack bypasses Windows Defender by dynamically retrieving and decrypting the malicious payload, allowing attackers to inject the malware into a legitimate process, giving them control of the victim's system. 

Key Insights: 

  • The malware is hidden in a fake Chrome installer, which is distributed through Google Ads and Google Sites. 

  • Once installed, SecTopRAT is deployed, giving attackers remote access and the ability to steal sensitive data. 

  • The attack evades detection by dynamically downloading the malware and using anti-virus evasion techniques. 

Further Reading: Malwarebytes 

 

 

Abusing CSS for Evasion and Tracking: A New Threat 

Cybercriminals are increasingly abusing Cascading Style Sheets (CSS) to evade detection and track users. By using techniques like hidden text salting, attackers can insert irrelevant, invisible content into emails to bypass spam filters and email parsers. This method can also be used to track user actions and preferences, even when email clients restrict dynamic content like JavaScript. 

These tactics include setting text to invisible properties, manipulating opacity, and hiding content off-screen. Attackers can exploit this for phishing emails and even to fingerprint users based on their system configurations. 

Key Insights: 

  • CSS properties like text-indent and opacity are used to conceal malicious content and bypass security measures. 

  • CSS can also be abused for tracking user actions and preferences, allowing for advanced targeting in phishing campaigns. 

  • Security teams should educate employees about these new evasion tactics and strengthen email defenses. 

Further Reading: Talos Intelligence 

 

 

Remote Monitoring and Management (RMM) Tools: Attackers’ First Choice 

Cybercriminals are increasingly turning to legitimate Remote Monitoring and Management (RMM) tools as their first-stage payloads in email campaigns. These tools, typically used by IT teams for managing multiple systems remotely, are now being exploited to collect data, steal finances, and deploy additional malware, including ransomware. In 2024, there was a marked shift, with RMM tools like ScreenConnect, Fleetdeck, and Atera replacing traditional loaders and botnets. This trend emphasizes the need for organizations to monitor remote management tools carefully and ensure they are not abused by attackers. 

Key Insights: 

  • RMM tools are being used to facilitate cyberattacks by granting attackers remote access to systems. 

  • The use of RMM tools as a first-stage payload is increasing, replacing older attack methods. 

  • Organizations must secure their RMM tools and ensure they are used appropriately. 

Further Reading: Proofpoint Blog 

 

 

ClickFix: The Social Engineering Technique Hackers Use to Manipulate Victims 

The ClickFix technique has gained significant traction among cybercriminals due to its ability to manipulate users into executing malicious actions. By using a clever mix of human psychology and obfuscation, attackers deploy this technique to bypass security systems and install malware. The attack typically involves fake CAPTCHA-like elements, tricking victims into clicking on links or downloading malicious files. This technique has become increasingly popular due to its effectiveness in evading traditional detection methods. 

Key Insights: 

  • ClickFix uses obfuscation to bypass security measures and execute malicious actions. 

  • Attackers exploit human psychology to trick users into performing actions that compromise security. 

  • Organizations should educate employees on recognizing manipulative tactics like ClickFix and improve multi-layered defenses. 

Further Reading: Group-IB Blog 

 

 

ESET Discovers Zero-Day Exploit in Windows Kernel (CVE-2025-24983) 

ESET Research has uncovered a zero-day exploit leveraging the CVE-2025-24983 vulnerability in the Windows Kernel, allowing attackers to elevate their privileges. First observed in the wild in March 2023, this exploit was used in conjunction with the PipeMagic backdoor, compromising targeted systems. The discovery highlights the continued use of kernel vulnerabilities in advanced attacks and the importance of regular patching and security monitoring to protect against zero-day threats. 

Key Insights: 

  • The exploit targets a critical Windows Kernel vulnerability (CVE-2025-24983), enabling privilege escalation. 

  • The attack was first observed in March 2023 and delivered through the PipeMagic backdoor. 

  • Organizations must prioritize timely updates and monitoring for signs of this and similar vulnerabilities. 

Further Reading: ESET Research on Bluesky 

 

 

From Data to Defense: Insights from ReliaQuest’s 2025 Annual Threat Report 

The 2025 Annual Threat Report from ReliaQuest reveals the rapidly increasing speed of cyberattacks, with attackers moving from initial access to lateral movement in just 48 minutes. AI and automation are now key tools for both attackers and defenders, with organizations needing to integrate AI-driven solutions to keep pace. Phishing remains the primary method of attack, but ransomware tactics are evolving, with more emphasis on data exfiltration rather than encryption. The report offers actionable recommendations, including the need for automated responses, securing remote services, and enhancing logging practices to better track and prevent breaches. 

Key Insights: 

  • Attackers now complete lateral movement in 48 minutes, stressing the importance of rapid detection and response. 

  • AI and automation are critical to addressing the evolving cyberthreat landscape. 

  • Ransomware is shifting towards exfiltration and data extortion. 

Further Reading: ReliaQuest 

 

 

Microsoft 365 Targeted in New Phishing, Account Takeover Attacks 

New phishing campaigns are leveraging Microsoft 365's infrastructure to conduct account takeover (ATO) attacks, exploiting tenant misconfigurations and using OAuth redirection. One campaign involves attackers sending phishing emails using Microsoft’s own infrastructure, making detection difficult. These emails, masquerading as legitimate Microsoft notifications, direct victims to call centers, bypassing security controls. Another attack uses OAuth apps pretending to be Adobe and DocuSign to steal credentials and deploy malware. Security teams must be vigilant in securing OAuth applications and scrutinizing internal communications. 

Key Insights: 

  • Phishing attacks are exploiting Microsoft 365’s infrastructure for ATO attacks. 

  • Attackers use fake support contacts and legitimate-looking emails to trick victims. 

  • OAuth applications masquerading as trusted brands are used for stealing credentials and deploying malware. 

Further Reading: SecurityWeek 

 

 

AI Agent Attacks: A New Threat with Serious Implications 

AI agents, like OpenAI's Operator, are being used by attackers to automate cyberattacks such as phishing, malware creation, and setting up attack infrastructure. As these AI tools become more accessible, they lower the entry barrier for cybercriminals, increasing the risk of widespread and damaging attacks. 

Key Insights: 

  • AI agents automate complex attacks, including phishing and malware creation. 

  • These tools reduce the effort required for attacks, making them more accessible to cybercriminals. 

  • Organizations should strengthen detection systems and control access to mitigate AI-driven threats. 

Further Reading: Symantec Blog 

 

 

JavaGhost’s Persistent Phishing Attacks From the Cloud 

JavaGhost, an active cybercriminal group, has evolved from website defacement to launching sophisticated phishing attacks. They exploit misconfigurations in Amazon Web Services (AWS) environments, leveraging services like Amazon Simple Email Service (SES) to send phishing emails using the infrastructure of compromised organizations. These attacks are particularly insidious, bypassing traditional email protections due to the legitimacy of the sending source. JavaGhost has adapted advanced evasion techniques to obscure their activities, making detection harder for defenders. 

Key Insights: 

  • JavaGhost exploits AWS misconfigurations to send phishing emails, bypassing email protections. 

  • They use advanced evasion techniques to obscure their presence in cloud logs. 

  • Organizations must secure AWS environments, restrict IAM permissions, and implement enhanced detection methods. 

Further Reading: Unit42 Blog 

 

 

Buying Browser Extensions: A Dangerous Security Risk 

In a recent investigation, it was revealed how attackers are buying up popular browser extensions and using them for malicious purposes. Extensions that started as helpful tools can easily be sold to the highest bidder, transforming into spyware or data harvesters without the original developers or users being notified. This risky practice allows new owners to repurpose permissions, such as tracking browsing behavior or stealing sensitive data, all without any visible changes to the extension’s appearance. 

Key Insights: 

  • Extensions can be sold and repurposed for malicious use, including tracking user data or even stealing login credentials. 

  • The process of transferring ownership of extensions is relatively easy, with few security checks from platforms like Google Chrome. 

  • Organizations should actively monitor the extensions in use and verify the legitimacy of any new updates or ownership changes to prevent security risks. 

Further Reading: Secure Annex Blog 

 

 

Menlo Security Report: 130% Increase in Zero-Hour Phishing Attacks and Nearly 600 Incidents of GenAI Fraud 

Menlo Security's 2025 State of Browser Security Report reveals a 130% increase in zero-hour phishing attacks and highlights nearly 600 incidents of GenAI fraud. Attackers are using generative AI to impersonate legitimate platforms and manipulate users into disclosing personal information. Additionally, cybercriminals are leveraging sophisticated evasion techniques to bypass traditional security systems. With phishing sites growing by nearly 700% since 2020, organizations must prioritize browser security to mitigate these evolving threats. 

Key Insights: 

  • A surge in generative AI-based fraud, with cybercriminals impersonating platforms to steal personal data. 

  • Nearly 1M new phishing sites are created monthly, reflecting a 700% increase since 2020. 

  • Attackers are increasingly exploiting cloud services like AWS and CloudFlare for malicious content hosting. 

Further Reading: Menlo Security 

 

 

Is Firebase Phishing a Threat to Your Organization? 

Firebase, a platform commonly used for app development, has been exploited in phishing attacks targeting organizations. Attackers can hijack Firebase’s authentication services to launch phishing campaigns, tricking users into divulging sensitive information. These attacks can be used to steal credentials, and in some cases, manipulate cloud-based services that organizations rely on. With Firebase being a trusted service, users may not immediately recognize these phishing attempts, making it a potent tool for attackers. 

Key Insights: 

  • Firebase is being exploited for phishing attacks, often targeting organizations’ authentication systems. 

  • Users may unknowingly fall victim due to Firebase’s trusted reputation. 

  • Organizations need to be aware of how Firebase can be misused and take proactive measures to secure their systems. 

Further Reading: Check Point Blog 

 

 

RansomHub's EDRKillShifter: Unveiling Evolving Ransomware Tactics 

ESET's recent research delves into RansomHub, a prominent ransomware-as-a-service (RaaS) group that emerged in early 2024. The study uncovers RansomHub's connections to established gangs like Play, Medusa, and BianLian, highlighting the dynamic nature of ransomware operations. A focal point of the research is EDRKillShifter, a custom tool developed by RansomHub to disable endpoint detection and response (EDR) systems, enhancing the effectiveness of their attacks. This tool exemplifies the evolving sophistication of ransomware tactics, emphasizing the need for advanced security measures to counteract such threats.  

Key Insights: 

  • RansomHub's Emergence: Rapidly rose to prominence in 2024, surpassing established ransomware groups in activity.  

  • EDRKillShifter Tool: A custom-developed EDR killer that targets various security solutions to facilitate attacks.  

  • Affiliate Connections: Links between RansomHub and other ransomware gangs, suggesting a fluid and interconnected threat landscape.  

Further Reading: ESET Research 

 

 

Google Announces Sec-Gemini v1: An Experimental AI Model for Cybersecurity 

Google has introduced Sec-Gemini v1, an experimental AI model designed to enhance cybersecurity operations. By integrating advanced reasoning capabilities with near real-time cybersecurity knowledge, Sec-Gemini v1 aims to improve tasks such as incident root cause analysis, threat analysis, and understanding vulnerability impacts. The model combines Gemini's AI capabilities with data from sources like Google Threat Intelligence (GTI) and the Open Source Vulnerabilities (OSV) database, resulting in superior performance on key cybersecurity benchmarks. Google is offering Sec-Gemini v1 to select organizations, institutions, professionals, and NGOs for research purposes to foster collaboration in advancing AI-driven cybersecurity solutions.  

Key Insights: 

  • Sec-Gemini v1 integrates AI with real-time cybersecurity data to enhance security operations.  

  • The model outperforms others on benchmarks like CTI-MCQ and CTI-Root Cause Mapping.  

  • Google is providing access to Sec-Gemini v1 for research collaborations to advance AI in cybersecurity.  

Further Reading: Google Security Blog 

 

 

Off the Beaten Path: Recent Unusual Malware 

Unit 42 researchers have identified several distinctive malware samples exhibiting uncommon characteristics and techniques: 

  • C++/CLI IIS Backdoor: A passive backdoor for Internet Information Services (IIS) developed using C++/CLI—a rarely used programming language in malware development. It employs evasive techniques to facilitate unauthorized access. 

  • Dixie-Playing Bootkit: This bootkit leverages an unsecured kernel driver to install a GRUB 2 bootloader in a highly unconventional way, showing a creative approach to persistence and system control. 

  • ProjectGeass Post-Exploitation Framework: A Windows-based implant of a cross-platform post-exploitation framework written in C++. While not groundbreaking in technique, its atypical structure distinguishes it from mainstream frameworks. 

These samples demonstrate the evolving nature of malware and the increasing variety of methods attackers are using to bypass defenses. 

Further Reading: Unit 42 Blog 

 

 

ClickFix: A Deceptive Malware Deployment Technique 

Cybercriminals are employing a tactic known as "ClickFix," which masquerades as a CAPTCHA verification to trick users into executing commands that download malware. This scheme prompts users to press a series of keyboard shortcuts—Windows + R, Ctrl + V, and Enter—that open the Run dialog, paste malicious code, and execute it via mshta.exe, a legitimate Windows utility. This method has been used to deliver various malware families, including XWorm, Lumma Stealer, and AsyncRAT. 

Key Insights: 

  • ClickFix attacks exploit user actions to bypass security measures, leading to the installation of credential-stealing malware. 

  • Industries such as hospitality and healthcare have been targeted, with attackers impersonating trusted entities like Booking.com. 

  • The attack leverages legitimate Windows functionalities (mshta.exe) to execute malicious code, complicating detection efforts. 

Further Reading: Krebs on Security 

 

 

PoisonSeed Phishing Campaign Targets Email and CRM Providers 

The PoisonSeed phishing campaign has been identified targeting email and CRM providers, including Mailchimp, Mailgun, and Zoho, to gain unauthorized access to high-value accounts. Attackers create convincing phishing pages that closely resemble legitimate login portals to harvest user credentials. Once access is obtained, they download email lists for use in cryptocurrency-related spam operations. Notably, security expert Troy Hunt fell victim to such an attack, highlighting the sophistication of these phishing attempts. 

Key Insights: 

  • PoisonSeed employs highly convincing phishing pages to compromise accounts of email and CRM service providers. 

  • Compromised accounts are used to disseminate cryptocurrency-related spam, potentially leading to further financial fraud. 

  • Even cybersecurity professionals have been deceived by these tactics, underscoring the need for heightened awareness. 

Further Reading: CSO Online 

 

 

98% Increase in Phishing Campaigns Using Russian (.ru) Domains 

Recent analyses have revealed a 98% surge in phishing campaigns hosted on Russian (.ru) top-level domains (TLDs) between December 2024 and January 2025. These campaigns primarily aim to harvest user credentials by employing tactics such as QR codes, auto-redirects, and multi-layered attachments to direct victims to phishing websites. Notably, many of these phishing emails have bypassed security products, including Exchange Online Protection and Barracuda Email Security Gateway. 

Key Findings: 

  • 1,500 unique .ru domains identified in the campaign. 

  • 377 new domains registered with the "bulletproof" registrar R01-RU. 

  • Over 13,000 malicious emails reported. 

  • 2.2% of observed emails from .ru domains were phishing attempts. 

  • Average age of a .ru domain used in these attacks is 7.4 days. 

Industries Targeted: 

  • Business and Economy (36.09%) 

  • Financial Services (12.44%) 

  • News & Media (8.27%) 

  • Health and Medicine (5.6%) 

  • Government (4.51%) 

Further Reading: KnowBe4 Blog 

 

 

Pharmacist Allegedly Used Keyloggers to Spy on Coworkers at Maryland Hospital 

A former pharmacist at the University of Maryland Medical Center is accused of secretly installing keylogging software on nearly 400 hospital computers over a decade. The class-action lawsuit claims he accessed coworkers’ login credentials, personal files, and even activated webcams in patient exam rooms. The hospital is also being sued for allegedly failing to detect or respond to the breach in a timely manner. 

Key Insights: 

  • Keyloggers were reportedly used to steal credentials and access private communications. 

  • The software was allegedly installed across hundreds of hospital systems without detection. 

  • The incident underscores the importance of monitoring for insider threats and unauthorized software. 

Further Reading: The Record 

 

In News Tags Newsletter, threat intelligence
Comment

Created by ChatGPT

March 2025 - ExploreSec Cybersecurity Threat Intelligence Newsletter

March 14, 2025

This is a monthly newsletter that I share internally with our Cybersecurity team. Feel free to take and use for your own team. Created with the help of ChatGPT.

Exploring Q4 2024 Brand Phishing Trends: Microsoft Remains the Top Target as LinkedIn Makes a Comeback 

In the final quarter of 2024, Microsoft continued to be the most targeted brand in phishing campaigns, but LinkedIn made a significant comeback, appearing as a top target for the first time in years. Phishing actors are increasingly leveraging trusted brands to deceive users, with attacks designed to steal sensitive credentials and install malware. Organizations must continue to strengthen defenses against these brand impersonation attacks to protect their users and data. 

Key Insights: 

  • Microsoft remains the primary target in brand phishing campaigns, with attackers frequently using its name to trick users into disclosing credentials. 

  • LinkedIn’s resurgence as a phishing target highlights the shifting tactics of cybercriminals, who are capitalizing on platforms that users trust. 

  • Organizations need to implement strong anti-phishing measures, including employee training and advanced detection tools, to defend against these evolving threats. 

Further Reading: Checkpoint Blog 

 

 

Threat Actors Still Leveraging Legit RMM Tool ScreenConnect for Persistence in Cyberattacks 

Cybercriminals are continuing to exploit the legitimate remote monitoring and management (RMM) tool, ScreenConnect, to maintain persistence in cyberattacks. Threat actors are using social engineering to lure victims into installing altered versions of ScreenConnect, which gives them control over victims’ systems. This tool is particularly used to target sensitive data, with specific campaigns focused on Social Security recipients. The attacks are facilitated through bulletproof hosting providers, making it challenging to trace and mitigate these threats. 

Key Insights: 

  • ScreenConnect is being used by threat actors to gain persistent access to victims’ systems. 

  • Malicious versions of the software are being disguised as legitimate files, such as eStatements from the Social Security Administration. 

  • Social engineering tactics are employed to trick users into installing compromised software. 

  • Bulletproof hosting providers are being used to shelter malicious activities, making them harder to disrupt. 

Further Reading: Silent Push 

 

 

Hackers Spoof Microsoft ADFS Login Pages to Steal Credentials 

Hackers are spoofing Microsoft Active Directory Federation Services (ADFS) login pages to steal user credentials. This attack leverages the trust users have in Microsoft’s secure login page by creating fake versions that closely resemble the original. Once victims enter their credentials, the attackers steal the information for malicious purposes. This highlights the importance of verifying login pages and using multi-factor authentication to protect against such credential theft. 

Key Insights: 

  • Hackers are creating fake versions of Microsoft ADFS login pages to capture user credentials. 

  • These attacks rely on users trusting the Microsoft login page, making them difficult to detect. 

  • Multi-factor authentication (MFA) and vigilant scrutiny of login pages can help prevent successful credential theft. 

Further Reading: BleepingComputer 

 

 

Racing the Clock: Outpacing Accelerating Attacks 

In 2024, cyberattack speeds surged, with the average breakout time dropping to just 48 minutes, a 22% reduction from the previous year. Key factors behind this acceleration include more efficient Ransomware-as-a-Service (RaaS) operations, a rise in infostealers, and the use of AI-powered penetration testing tools. As attacks become faster, organizations must enhance their security measures to match the pace of threat actors, leveraging automation and AI to reduce response times and contain attacks before they spread. 

Key Insights: 

  • Breakout time—the time from initial access to lateral movement—has decreased to 48 minutes, making it crucial to respond quickly. 

  • Infostealers and IABs (Initial Access Brokers) are driving faster breaches by providing quick access to compromised systems. 

  • Automation and AI-driven tools are essential for organizations to respond to attacks more efficiently and minimize damage. 

Further Reading: ReliaQuest 

 

 

VidSpam: A New Threat Emerges as Bitcoin Scams Evolve from Images to Video 

Bitcoin scams targeting mobile users are evolving with attackers now using video-based spam (VidSpam) to deceive victims. These scammers are sending small video file attachments to lure individuals into fraudulent schemes. The videos often direct recipients to high-pressure WhatsApp groups where personal information or money is extracted. This evolution from image-based scams to video content marks a troubling trend in mobile security. 

Key Insights: 

  • Attackers are using small video files (e.g., 14KB .3gp files) to promote Bitcoin scams through multimedia messages. 

  • The video attachments encourage victims to join WhatsApp groups where scammers use pressure tactics to steal money or data. 

  • As scammers refine their tactics, VidSpam is expected to increase, targeting unsuspecting mobile users. 

Further Reading: Proofpoint 

 

 

January 2025’s Most Wanted Malware: FakeUpdates Continues to Dominate 

FakeUpdates malware remains the top threat in January 2025, continuing its dominance in the malware landscape. This malware is primarily distributed through fake software updates that users are tricked into downloading. Once installed, it can enable attackers to take control of the system and steal sensitive information. The persistence of FakeUpdates emphasizes the need for cautious behavior when downloading updates and a heightened focus on secure software practices. 

Key Insights: 

  • FakeUpdates continues to lead as one of the most used malware types, delivered through fake update prompts. 

  • This malware is often disguised as legitimate updates, compromising systems and exfiltrating data. 

  • Users should avoid downloading updates from unverified sources and ensure they only install software from trusted vendors. 

Further Reading: Checkpoint Blog 

 

 

Using Genuine Business Domains and Legitimate Services to Harvest Credentials 

Cybercriminals are increasingly using legitimate business domains and services to conduct credential harvesting attacks. By spoofing well-known companies and mimicking their email communications, attackers deceive users into providing their login information. These tactics often involve using business-looking email addresses and phishing links that lead to fake login pages. This trend underscores the need for businesses and consumers to be cautious when interacting with unsolicited messages. 

Key Insights: 

  • Phishing attacks are increasingly using trusted business domains and services to trick users into disclosing credentials. 

  • Attackers mimic legitimate emails to create fake login pages that steal sensitive information. 

  • Users should be cautious of unsolicited messages and verify the authenticity of any login requests by visiting official websites directly. 

Further Reading: KnowBe4 Blog 

 

 

Protect Your Data: Russian Spear-Phishing Targets Microsoft 365 Accounts 

A new spear-phishing campaign linked to Russian threat actors is targeting Microsoft 365 users. The attackers use highly customized phishing emails that appear legitimate, aiming to steal login credentials and gain unauthorized access to sensitive information. With Microsoft 365 being a prime target, organizations should enhance their security by training users to recognize phishing attempts and implementing advanced security measures, including multi-factor authentication. 

Key Insights: 

  • Russian threat actors are targeting Microsoft 365 accounts using personalized spear-phishing emails. 

  • These attacks aim to steal credentials, putting sensitive data at risk. 

  • Organizations should deploy multi-factor authentication and conduct regular security awareness training to protect against these threats. 

Further Reading: KnowBe4 Blog 

 

New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials 

Critical vulnerabilities have been found in Xerox VersaLink printers, allowing attackers to potentially capture Windows Active Directory credentials via pass-back attacks. These flaws, affecting firmware versions 57.69.91 and earlier, enable attackers to manipulate printer configurations and redirect authentication credentials. Successful exploitation could allow lateral movement within an organization's network, compromising servers and file systems. Immediate patching and enhanced security measures, such as strong admin passwords and disabling remote access, are advised. 

Key Insights: 

  • Xerox VersaLink printers are vulnerable to attacks that can capture Windows Active Directory credentials. 

  • Exploiting these vulnerabilities requires physical or remote access to the printer's control interface. 

  • Organizations should patch printers immediately, enforce strong passwords, and limit access to vulnerable settings. 

Further Reading: The Hacker News 

 

 

ClickFix vs. Traditional Download in New DarkGate Campaign 

A new malvertising campaign has been observed using two different methods to deliver the DarkGate malware: the ClickFix technique and traditional file downloads. The ClickFix method involves a fake CAPTCHA-like page that tricks users into executing a malicious command, while the traditional approach uses a fake software download disguised as a legitimate app. Both methods ultimately deliver the DarkGate malware, highlighting the adaptability of threat actors in refining delivery techniques. 

Key Insights: 

  • The ClickFix method tricks users into running malicious code by mimicking a CAPTCHA process. 

  • The traditional download method uses fake installers to distribute malware. 

  • Both methods successfully deliver DarkGate, with the ClickFix technique possibly yielding higher success rates. 

Further Reading: Malwarebytes 

 

 

Russian Phishing Campaigns Exploit Signal's Device-Linking Feature 

Russian phishing campaigns are exploiting the device-linking feature of the Signal messaging app to compromise user accounts. Attackers use malicious QR codes to trick targets into linking their Signal account to an attacker-controlled device, allowing them to monitor private conversations without fully compromising the target's device. This method has been observed in both large-scale campaigns and targeted attacks, especially against military personnel and high-value targets. 

Key Insights: 

  • Attackers use malicious QR codes to link Signal accounts to their devices, enabling undetected access to encrypted communications. 

  • These phishing techniques often involve impersonating legitimate resources, such as group invitations or app instructions. 

  • Signal users are advised to update the app, check linked devices regularly, and enable two-factor authentication for added protection. 

Further Reading: BleepingComputer 

 

 

Phishing Attack Hides JavaScript Using Invisible Unicode Trick 

A new phishing attack technique is using invisible Unicode characters to hide malicious JavaScript. This approach involves obfuscating binary values within JavaScript payloads by replacing them with invisible Hangul characters, making the script appear empty. When executed, a proxy retrieves and reconstructs the original code. The attack is particularly difficult to detect, as it uses anti-debugging techniques and avoids triggering security scanners by exploiting whitespace. The campaign targets affiliates of a political action committee, employing highly personalized tactics. 

Key Insights: 

  • The phishing attack uses invisible Unicode characters to obfuscate JavaScript payloads, making detection more challenging. 

  • Anti-debugging techniques are employed to avoid analysis and redirect attackers if they detect delays in execution. 

  • The attack is highly personalized and can evade security scanners by using empty spaces and encoding methods. 

Further Reading: BleepingComputer 

 

 

New Facebook Copyright Infringement Phishing Campaign 

A new phishing campaign has been detected targeting Facebook users with fake copyright infringement notices. The attackers use deceptive emails that appear to come from Facebook, claiming that users have violated copyright laws. The emails contain links to fake Facebook pages that prompt users to enter personal information, including passwords. This campaign highlights the ongoing threat of phishing attacks that impersonate trusted platforms like Facebook. 

Key Insights: 

  • The phishing emails mimic Facebook's notifications about copyright violations to trick users into sharing sensitive data. 

  • Victims are directed to fake pages designed to capture their credentials. 

  • Users should be cautious about unsolicited emails and verify the authenticity of any official communications by visiting Facebook directly. 

Further Reading: Check Point Blog 

 

 

University Site Cloned to Evade Ad Detection, Distributes Fake Cisco Installer 

A recent malicious campaign involved cloning a German university website to evade ad detection, distributing a fake Cisco AnyConnect installer. The attackers leveraged a Google ad to direct users to a fraudulent site designed to mimic a legitimate university page, with the goal of deploying the NetSupport RAT. The malware, disguised as a Cisco update, was signed with a valid certificate and allowed attackers to remotely access infected systems. 

Key Insights: 

  • Attackers cloned a university website to evade detection, delivering a fake Cisco installer via a Google ad. 

  • The malware, NetSupport RAT, was hidden in a digitally signed installer and granted remote access to attackers. 

  • Users should exercise caution when downloading software, especially from sponsored ads, and verify the authenticity of the source. 

Further Reading: Malwarebytes 

 

 

How Hunting for Vulnerable Drivers Unraveled a Widespread Attack 

An investigation into vulnerable drivers revealed a widespread attack exploiting these weaknesses to gain unauthorized access. Attackers used outdated or unpatched drivers to deploy malware and maintain persistence within compromised systems, bypassing traditional security measures. This emphasizes the need for regular updates and comprehensive vulnerability management to safeguard against such threats. 

Key Insights: 

  • Attackers exploited outdated drivers to gain system access and deploy malware. 

  • The attack allowed persistent control over systems, evading detection. 

  • Regular driver updates and vulnerability assessments are crucial for preventing similar attacks. 

Further Reading: Check Point Blog 

 

 

2024 Account Takeover Statistics 

Proofpoint’s latest research highlights the alarming prevalence of account takeover (ATO) attacks, which are now among the most common cyberattack types. These attacks involve threat actors gaining control of legitimate user accounts to execute malicious activities, including data breaches and fraud. The findings underscore the importance of strong authentication and continuous monitoring to prevent unauthorized access and protect sensitive data. 

Key Insights: 

  • ATO attacks remain a leading threat, with significant consequences for organizations and users. 

  • Gaining access to legitimate accounts allows attackers to bypass security measures and execute more damaging attacks. 

  • Organizations should prioritize multi-factor authentication and robust monitoring to mitigate ATO risks. 

Further Reading: Proofpoint 

 

 

DeepSeek Lure Used to Spread Malware 

A new DeepSeek campaign uses CAPTCHA-like pages to distribute malware. Attackers use fake CAPTCHA challenges to lure users into executing malicious code, evading detection by appearing harmless. The campaign primarily targets users who are tricked into downloading and running the malware. This attack illustrates how cybercriminals are exploiting popular web features to deliver malicious payloads. 

Key Insights: 

  • The malware is delivered through fake CAPTCHA-like pages, making it seem legitimate. 

  • Attackers use this method to bypass security filters and trick users into downloading harmful software. 

  • Regular security updates and cautious behavior when interacting with unfamiliar websites can help mitigate such threats. 

Further Reading: Zscaler Blog 

 

 

Botnet Targets Basic Auth in Microsoft 365 Password Spray Attacks 

A large botnet, consisting of over 130,000 compromised devices, is conducting password-spray attacks against Microsoft 365 accounts. The attackers are using Basic Authentication to evade Multi-Factor Authentication (MFA) protections, exploiting plaintext credentials to access accounts without triggering alerts. This method targets accounts with weak or leaked passwords and bypasses security measures that typically protect interactive sign-ins. Organizations are urged to disable Basic Auth, enforce MFA, and implement Conditional Access Policies (CAP) to protect against these attacks. 

Key Insights: 

  • The botnet targets Basic Authentication to bypass MFA and gain unauthorized access. 

  • Attackers use stolen credentials to conduct widespread password-spray attacks on Microsoft 365 accounts. 

  • Disabling Basic Auth and enabling MFA are critical defenses against this type of attack. 

Further Reading: BleepingComputer 

 

 

New Undetectable Batch Script Uses PowerShell and Visual Basic to Install XWorm 

A new undetectable malware campaign uses a highly obfuscated Batch script to deliver the XWorm RAT or AsyncRAT. The script employs PowerShell and Visual Basic Script (VBS) to bypass security tools and download the malware. Once executed, the script establishes persistence and exfiltrates data via Telegram’s API. This campaign marks a significant evolution in fileless attacks, leveraging AI-generated code and cloud-based C2 to evade detection. 

Key Insights: 

  • The malware uses a Batch script, PowerShell, and VBS to download XWorm or AsyncRAT. 

  • Obfuscation and environmental checks make the attack difficult to detect by security tools. 

  • Telegram’s API is used to exfiltrate system data, blending malicious traffic with legitimate communications. 

  • AI tools may have assisted in generating the code, increasing sophistication and evasion tactics. 

Further Reading: GBHackers 

 

 

Chinese Hackers Target Hospitals by Spoofing Medical Software 

A new phishing campaign has been discovered where Chinese hackers are targeting hospitals by spoofing medical software, including fake updates for health-related applications. The hackers use these fake updates to deliver malware, gaining access to sensitive healthcare data. Hospitals and healthcare organizations are urged to be cautious of unsolicited software updates and to ensure they are obtaining updates from official sources. 

Key Insights: 

  • Attackers are spoofing medical software updates to distribute malware in healthcare organizations. 

  • The campaign targets sensitive healthcare data, with phishing emails disguised as software updates. 

  • Healthcare organizations should verify software updates and ensure they come from trusted sources. 

Further Reading: KnowBe4 Blog 

 

 

GreyNoise 2025 Mass Internet Exploitation Report: Attackers Are Moving Faster Than Ever — Are You Ready? 

The 2025 Mass Internet Exploitation Report reveals a dramatic increase in the speed and scale of cyberattacks, with attackers exploiting vulnerabilities faster than security teams can respond. In 2024, automated exploitation of known vulnerabilities was rampant, with legacy flaws from as far back as the 1990s being targeted alongside new threats. The most commonly exploited vulnerabilities were in home routers and IoT devices, which are often overlooked in traditional security strategies. To stay ahead of this rapidly evolving threat, executives must prioritize real-time intelligence and adapt patching and defense strategies to address both old and new vulnerabilities. 

Key Insights: 

  • Attackers are automating vulnerability exploitation, surpassing traditional patching strategies. 

  • Legacy vulnerabilities are still prime targets, with some dating back decades. 

  • Ransomware groups are using mass exploitation to gain access, making real-time threat intelligence a necessity for effective defense. 

Further Reading: GreyNoise 

 

 

Threat Spotlight: Inside the World’s Fastest Rising Ransomware Operator — BlackLock 

BlackLock, a rapidly rising ransomware-as-a-service (RaaS) operator, has gained prominence for its custom malware and unique data-leak tactics. By Q4 2024, it had become the seventh most active ransomware group, using double extortion to encrypt data and steal sensitive information. BlackLock’s sophisticated leak site and the rapid expansion of its affiliate network via the Russian-language RAMP forum highlight its threat to organizations globally. Executives should prioritize enhancing defense strategies against evolving ransomware threats, including securing third-party access and increasing employee awareness about spear-phishing tactics. 

Key Insights: 

  • Custom malware and bespoke ransomware distinguish BlackLock from competitors, making it harder for security tools to detect and defend against. 

  • The data-leak site uses unique tricks to pressure victims into paying ransoms before assessing the full scope of the breach. 

  • BlackLock’s growing influence on the RAMP forum indicates a well-established network that supports its global ransomware activities. 

Further Reading: ReliaQuest 

 

 

Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal 

Black Basta and Cactus ransomware groups have expanded their attack methods by incorporating BackConnect malware. This malware creates an outbound connection, which enables attackers to remotely control compromised systems, bypassing security measures designed to block inbound attacks. By integrating BackConnect into their operations, these groups can maintain access to systems even after initial detection, facilitating long-term exploitation. Organizations must strengthen defenses to detect and block this new tactic and limit the potential damage. 

Key Insights: 

  • BackConnect malware allows attackers to maintain persistent access through outbound connections. 

  • This technique enables ransomware groups to bypass detection and continue exploiting compromised systems. 

  • Organizations should improve detection capabilities to identify and block BackConnect traffic. 

Further Reading: Trend Micro 

 

Scammers Mailing Ransom Letters While Posing as BianLian Ransomware 

A new scam has emerged where fraudsters are mailing fake ransom letters to businesses, posing as the notorious BianLian ransomware group. The letters, claiming to be from BianLian, demand large Bitcoin ransoms, threatening to release sensitive data if payment is not made within 10 days. However, cybersecurity experts quickly identified multiple red flags: inconsistencies in the language, uncharacteristic delivery via physical mail, and no evidence of data breaches. This scheme aims to exploit the fear and reputation of a known ransomware group for financial gain. 

Key Insights: 

  • Scammers are impersonating BianLian ransomware to demand Bitcoin payments via physical mail. 

  • The letters use fear tactics, mimicking legitimate ransomware practices, but with numerous inconsistencies. 

  • Organizations should educate employees on recognizing such scams and ensure cybersecurity defenses are up to date. 

Further Reading: HackRead 

 

 

 

In News Tags Newsletter, threat intelligence
Comment

November 2024 Threat Intelligence Newsletter

November 11, 2024

This is a monthly newsletter I put together for our internal security team with a lean towards phishing and healthcare. Created with help from ChatGPT.

Fake Job Applications Deliver Dangerous Malware 

Summary: A spear-phishing campaign is targeting HR professionals with fake job applications containing the More_eggs malware. Operated by the Golden Chickens group as part of a Malware-as-a-Service (MaaS) platform, More_eggs is a sophisticated backdoor used by multiple threat actors to infiltrate corporate networks. 

Key Insights (Technical): 

  • Delivery Method: The malware is delivered via malicious Windows Shortcut files (.LNK files) disguised as resumes. When opened, these files execute scripts without raising suspicion. 

  • Execution Technique: The attack leverages living-off-the-land binaries (LOLBins) like wscript.exe to run malicious JavaScript code, bypassing traditional security measures. 

  • Capabilities: 

  • Backdoor Access: Establishes a stealthy backdoor for persistent access. 

  • Payload Deployment: Can download and execute additional malware modules, including ransomware or credential stealers. 

  • Reconnaissance: Gathers system information and can move laterally within the network. 

  • Command and Control (C2): Communicates with C2 servers over HTTP/S protocols, using encrypted channels to evade detection. 

  • Avoidance of Detection: Uses legitimate Windows processes to mask malicious activities, making it harder for security solutions to detect the intrusion. 

For further details, read the full article on The Hacker News. 

 

New Ransomware Strain Targeting Healthcare 

The U.S. Department of Health and Human Services (HHS) issued a warning about a new ransomware strain, Trinity, which is actively targeting the healthcare sector. Trinity uses techniques like encrypting data and demanding ransoms within 24 hours. It has connections to other ransomware families such as Venus and 2023Lock. 

Technical Key Insights: 

  • Exploits Remote Desktop Protocol (RDP) and open ports 

  • Uses privilege escalation to gain higher access 

  • Encrypts critical systems rapidly after infiltration 

Further reading: The Record - Trinity Ransomware Alert. 

 

 

Emerging Cybersecurity Threats Highlighted in HP Wolf Security Report 

The September 2024 HP Wolf Security Threat Insights Report identifies key trends in cyberattacks, including a surge in document-based malware, with 61% of threats delivered via email attachments. Attackers are increasingly using malicious archives and PDFs to bypass detection, leveraging techniques like HTML smuggling and exploiting vulnerabilities in outdated software. Threat actors are also using Generative AI to write sophisticated malware, such as AsyncRAT. 

Key Insights: 

  • 39% of threats delivered in archives 

  • Rise in AI-generated malware 

  • Increased exploitation of known vulnerabilities 

Further reading: HP Wolf Security Threat Insights Report. 

 

 

North Korean IT Worker Incident Highlights Hiring Risks 

A recent cyberattack on a company underscores the dangers of unknowingly hiring North Korean operatives. The organization accidentally hired a North Korean IT worker who accessed sensitive data and demanded a ransom. This highlights the need for stringent vetting in remote hiring practices, especially as North Korea increasingly infiltrates global companies. 

Recommended Protections: 

  • Implement strict identity verification for remote workers. 

  • Conduct thorough background checks with global databases. 

  • Regularly monitor employee network activity for unusual behavior. 

Further reading: GBHackers - North Korean IT Worker Incident. 

 

 

User-Centric Security Design Inspired by Disney 

A recent article from KnowBe4 discusses how organizations can improve security by observing how employees naturally work, similar to Disney’s strategy of observing guests before building paths. The concept of "desire paths" shows that security controls should be designed around actual workflows, reducing friction and improving compliance. By aligning security with user behavior, organizations can mitigate risky workarounds and foster a more secure environment. 

Further reading: KnowBe4 - Security Highways. 

 

 

Healthcare Supply Chain Attacks on the Rise 

A recent Proofpoint report reveals that 68% of healthcare workers have faced a supply chain cyberattack, with 82% of these incidents affecting patient care. 

Key Insights: 

  • 68% of healthcare workers report supply chain cyberattacks. 

  • 82% of incidents resulted in disruptions to patient care. 

  • Attacks cause delays in procedures and increase patient risks. 

  • Ransomware and business email compromise are growing threats. 

Further reading: Security Magazine - Supply Chain Attacks. 

 

 

Microsoft’s Deceptive Honeypot Strategy Targets Phishers 

Microsoft has launched a clever security strategy by creating fake Azure tenants to lure phishing attackers into honeypots. These realistic tenant environments mimic legitimate setups, tricking attackers into interacting with them. This allows Microsoft to gather valuable intelligence on phishing methods and infrastructure, which can be used to strengthen defenses and share with the wider security community. By engaging with these fake environments, phishers waste time while Microsoft gains crucial insights. 

Further reading: BleepingComputer - Microsoft Honeypots. 

 

 

Mobile-First Cyber Attacks on the Rise 

Cyber attackers are increasingly adopting a "mobile-first" strategy, as highlighted by a new report from Zimperium. With 83% of phishing sites now targeting mobile devices and a 13% rise in mobile malware, employees’ personal devices pose a growing risk to organizations. As more employees use their smartphones for work-related tasks, organizations need to bolster mobile security and educate employees on safe practices through security awareness training. 

Further reading: KnowBe4 - Mobile-First Attack Strategy. 

 

 

Cybercriminals Exploiting Steam for Malware Distribution 

A recent investigation highlights how cybercriminals are using Steam profiles to exploit a technique called Dead Drop Resolver (DDR) to hide Command and Control (C2) addresses within user profiles. Attackers have leveraged well-known infostealers like Vidar, Lumma, and MetaStealer to extract sensitive data from infected systems by using platforms like Steam and Telegram to evade detection. 

Technical Key Insights: 

  • Attackers embed C2 addresses in Steam profiles. 

  • Infostealers target credentials and system data. 

  • Use of obfuscated code and stolen certificates. 

Further reading: RT Solar Blog. <---- .ru site 

 

 

Rise in Phishing Attacks with AI and Impersonation Tactics 

A new report from KnowBe4 reveals a 28% rise in phishing attacks during Q2 2024, with 89% of attacks involving brand impersonation. Cybercriminals are increasingly using AI-powered phishing toolkits, making it easier for less-skilled attackers to execute sophisticated campaigns. Commodity phishing attacks, primarily using hyperlinks, have surged, overwhelming organizations' defenses. With impersonation tactics being a dominant trend, organizations must enhance defenses against these evolving threats. 

Key Insights: 

  • 28% increase in phishing attacks in Q2 2024. 

  • 89% of phishing emails involve impersonation. 

  • Commodity phishing attacks up 2,700% compared to normal baselines. 

Further reading: KnowBe4 Report. 

 

 

Phishing-as-a-Service Platform "Sniper Dz" Exposed 

A recent investigation reveals the rise of the phishing-as-a-service (PhaaS) platform "Sniper Dz," which is responsible for over 140,000 phishing websites. The platform offers phishing templates targeting major brands and hides malicious content behind proxy servers to evade detection. Additionally, attackers can exfiltrate credentials to centralized servers controlled by Sniper Dz. This growing platform enables less-skilled attackers to launch sophisticated phishing attacks with ease. 

Further reading: Unit 42 - Sniper Dz PhaaS. 

 

 

Dark Angels Ransomware Group Exposed 

A recent investigation uncovers the stealth tactics of the Dark Angels ransomware group, which targets high-value systems with Babuk and RagnarLocker-based ransomware. Their techniques include double extortion, data exfiltration, and selective ransomware deployment to minimize detection. 

Technical Key Insights: 

  • Uses Babuk ransomware on Windows and RagnarLocker variants on Linux/ESXi servers. 

  • Employs double extortion tactics, stealing data before encryption. 

  • Leverages encrypted communication channels to evade detection. 

Further reading: Zscaler - Dark Angels Ransomware Group. 

 

 

North Korean IT Worker Fraud 

SecureWorks reports that North Korean IT workers are fraudulently obtaining remote jobs to access sensitive systems and generate revenue for the regime. These individuals disguise their identities, use VPNs to hide their location, and exploit company resources once hired. 

Key Insights: 

  • Perform thorough background checks on freelance and remote candidates. 

  • Monitor network access for unusual activity, especially from VPNs. 

  • Educate hiring managers on this growing threat. 

Further Reading: Fraudulent North Korean IT Worker Schemes 

 

 

Health Care and Social Assistance Sector at Risk 

Cyber threats in the Health Care and Social Assistance sector are intensifying, with phishing and social engineering attacks being the most prevalent. Organizations need to prioritize automation and Digital Risk Protection strategies to defend against these sophisticated threats. 

Key Insights: 

  • 51.55% of incidents are phishing attacks using spearphishing links. 

  • 24.76% of attacks exploit public-facing applications. 

  • Automation reduces incident containment time to 1 minute, compared to 2 hours 34 minutes for manual responses. 

Further Reading: ReliaQuest Health Care Threat Landscape 

 

 

AI-Driven Malware and Persistent Ransomware Threats 

Check Point's Global Threat Index for September 2024 highlights the rising use of AI in malware creation, with AsyncRAT becoming one of the top threats. AI-powered scripts are being used to deliver malware like AsyncRAT through techniques such as HTML smuggling, showcasing how threat actors with limited technical skills can now leverage AI to create sophisticated attacks. This evolution underscores the need for organizations to adopt proactive security strategies. 

In addition, RansomHub, a rebranded Ransomware-as-a-Service group, continues to dominate the ransomware scene, accounting for 17% of reported attacks. Other prominent malware families include FakeUpdates, targeting organizations worldwide, and Androxgh0st, which exploits vulnerabilities across platforms. 

Key Insights: 

  • 51.55% of the most prevalent malware was related to phishing campaigns, with AI-driven techniques emerging. 

  • RansomHub remains the top ransomware group with a significant global impact. 

  • Joker leads mobile malware, targeting Android users via SMS theft and premium service fraud. 

Further Reading: Check Point Threat Intelligence Report 

 

 

Trinity Ransomware Hits Healthcare Sector 

The Trinity ransomware group is targeting healthcare organizations with double-extortion tactics, gaining access through phishing emails and software vulnerabilities. This ransomware not only encrypts data but also steals it, pressuring victims to pay or risk exposure of sensitive information. Two healthcare providers have already been attacked, with 330GB of data compromised from a U.S.-based provider. 

Key Insights: 

  • Double extortion tactics increase the urgency for victims to pay. 

  • Initial access often occurs through phishing or vulnerabilities. 

  • Healthcare is a prime target due to critical operations needing quick recovery. 

Further Reading: Trinity Ransomware Targets Healthcare 

 

 

Threat Intelligence Update: Black Basta’s Social Engineering Tactics via Microsoft Teams 

The Black Basta ransomware group has employed a sophisticated social engineering campaign targeting organizations through Microsoft Teams. By signing user emails up for multiple spam sources, Black Basta overwhelms the target with unwanted messages. Threat actors then contact the user, impersonating IT support and offering assistance with the email flood. During this call, the attacker convinces the user to install remote access software like Quick Assist or AnyDesk, providing them unauthorized access to the network. Once inside, the attackers can harvest credentials and potentially deploy ransomware. 

Key Insights: 

  • Attackers use a flood of spam emails to distract and stress targets. 

  • Impersonation of IT support builds credibility and increases the chance of remote access. 

  • This tactic highlights the need for training employees to verify unexpected IT requests and avoid downloading unapproved software. 

Further Reading: ReliaQuest Blog on Black Basta's Techniques 

 

 

Q3 2024 Ransomware Trends 

The ReliaQuest Q3 2024 ransomware report highlights significant shifts in the ransomware landscape, with new groups gaining prominence and using sophisticated tactics to escalate their attacks. RansomHub has overtaken LockBit as the most active group, experiencing an 800% rise in postings from Q1 to Q3. Their growth is attributed to aggressive recruiting and lucrative profit-sharing, which has drawn affiliates from other disrupted groups. This group, along with Play ransomware, continues to exploit vulnerabilities in VPNs and public-facing applications, demonstrating the persistent risk posed by unpatched systems. 

Key Insights: 

  • RansomHub’s Rapid Rise: RansomHub posted 195 times in Q3, an 800% increase from Q1, leveraging a 90/10 profit-sharing model to attract affiliates. 

  • Expansion into ESXi Environments: Play ransomware’s new Linux variant targets VMware ESXi servers, broadening its impact across platforms. 

  • High-Risk Sectors: Professional services, healthcare, and manufacturing sectors are top targets due to potential operational disruptions. 

  • Vulnerability Exploits: Attackers frequently gain access through unpatched VPNs and other internet-facing applications, emphasizing the need for timely patch management. 

Further Reading: ReliaQuest Q3 Ransomware Report 

 

 

Update: Q3 2024 Brand Phishing Trends 

Check Point Research’s Q3 2024 report reveals that Microsoft continues as the most impersonated brand in phishing attacks, accounting for 61% of brand phishing attempts. Apple (12%) and Google (7%) follow, with new additions Alibaba and Adobe rounding out the top 10. These attacks commonly target the technology, social media, and banking sectors, as cybercriminals exploit brand familiarity to deceive users and capture credentials or payment information. Notably, new phishing sites targeting WhatsApp and Alibaba highlight the evolving strategies of threat actors seeking to exploit user trust. 

Key Insights: 

  • Microsoft Dominance: Microsoft phishing attempts made up 61% of brand impersonation attacks, with Apple and Google also highly targeted. 

  • Sector Focus: Technology and social networks were the most impersonated sectors, followed by banking. 

  • Evolving Phishing Tactics: Phishing websites like whatsapp-io.com and alibabashopvip.com show attackers adapting to impersonate new brands. 

Further Reading: Check Point’s Q3 2024 Brand Phishing Report. 

 

 

Global Surge in Cyber Attacks in Q3 2024 

Check Point’s Q3 2024 report highlights a significant 75% increase in global cyber attacks compared to last year, with each organization facing an average of 1,876 weekly attacks. Sectors most impacted include Education/Research (3,828 weekly attacks), Government/Military (2,553), and Healthcare (2,434), reflecting the increased focus on these industries. Africa saw the highest regional attack rate, averaging 3,370 weekly, up 90% from 2023, while North America experienced the most ransomware attacks, making up 57% of incidents worldwide. Manufacturing was the top ransomware target, followed by Healthcare and Retail/Wholesale. 

Key Insights: 

  • Attack Growth by Sector: The Hardware Vendor industry had the largest increase in attacks, surging by 191%. 

  • Regional Hotspots: Africa, Latin America, and Europe saw the steepest rises, with Europe experiencing an 86% year-over-year spike. 

  • Ransomware Targets: The Manufacturing sector accounted for 30% of ransomware incidents, underscoring cybercriminals' focus on high-disruption industries. 

Further Reading: Check Point Q3 2024 Report. 

 

 

North Korean Cybercriminal Infiltrates UK Company 

A UK-based organization recently suffered a breach after inadvertently hiring a North Korean cybercriminal posing as a remote IT worker. Once hired, the attacker used insider access to extract sensitive information and eventually demanded a ransom for its non-disclosure. This case highlights the importance of strict hiring processes for remote roles and enhanced security practices. 

Key Insights: 

  • Vetting Remote Employees: Conduct rigorous background checks to confirm credentials. 

  • Data Security: Monitor access and behavior for early threat detection. 

  • Remote Work Risks: Be mindful of cyber threats exploiting virtual roles. 

Further Reading: KnowBe4 Article; KnowBe4 10 Hiring Updates 

 

 

Partnership Between Scattered Spider and RansomHub 

ReliaQuest reports a new collaboration between the Scattered Spider and RansomHub groups, merging advanced social engineering skills with network-compromising expertise to target enterprises globally. The partnership leverages RansomHub's effective 90/10 profit-sharing model, attracting experienced threat actors from disrupted groups. This collaboration allows attackers to target critical virtual infrastructures, such as ESXi servers, which host key applications, enabling high-impact ransomware attacks that pressure victims to pay swiftly. 

Key Insights: 

  • Targeting of ESXi Servers: These servers, often running multiple virtual machines, are attractive for ransomware attacks as they disrupt operations across organizations. 

  • Social Engineering Tactics: Scattered Spider's expertise in impersonating IT staff aids in gaining unauthorized access to organizational networks. 

  • Rising Threat of RansomHub: RansomHub has rapidly gained dominance, surpassing groups like LockBit, indicating a strategic shift in ransomware collaborations and effectiveness. 

For more details, explore the full article at ReliaQuest. 

 

 

Social Engineering Exploits Valid Accounts 

Recent incidents highlight how threat actors are compromising legitimate accounts through social engineering tactics. By manipulating individuals into divulging sensitive information or performing specific actions, attackers gain unauthorized access to systems and data. This method often involves impersonating trusted entities or creating convincing scenarios to deceive targets. 

Key Insights: 

  • Impersonation Tactics: Attackers frequently pose as IT support or company executives to extract credentials. 

  • Phishing Campaigns: Sophisticated emails and messages are crafted to appear authentic, luring recipients into providing access details. 

  • Insider Threats: Compromised accounts can be used to launch further attacks within an organization, making detection challenging. 

Further Reading: KnowBe4 Article on Social Engineering Exploits. 

 

 

North Korean Group Adopts Play Ransomware 

Unit 42 has identified that the North Korean state-sponsored threat group, Jumpy Pisces (also known as Andariel), has begun collaborating with the Play ransomware group, Fiddling Scorpius. This marks a significant shift in Jumpy Pisces' tactics, moving from traditional cyber espionage to active participation in ransomware operations. The group gained initial access to networks via compromised user accounts, deploying tools like Sliver and their custom malware, DTrack, to facilitate lateral movement and persistence. This collaboration underscores the evolving ransomware landscape, where nation-state actors are increasingly engaging in financially motivated cybercrime. 

Key Insights: 

  • Tactical Shift: Jumpy Pisces is now utilizing existing ransomware infrastructures, indicating a move towards financial cybercrime. 

  • Advanced Tools: The group employs sophisticated tools such as Sliver and DTrack for network infiltration and persistence. 

  • Global Targeting: Their activities are expected to target a wide range of victims worldwide, necessitating heightened vigilance. 

Further Reading: Unit 42 Article on Jumpy Pisces and Play Ransomware. 

 

 

Key Cyber Threat Actors in 2024 

ReliaQuest's recent analysis identifies five prominent cyber threat actors significantly impacting the cybersecurity landscape in 2024: 

  • RansomHub: Emerging as a dominant ransomware group, RansomHub has surpassed previous leaders like LockBit and ALPHV, posing substantial risks to organizations globally. 

  • IntelBroker: As the acting administrator of BreachForums, IntelBroker oversees activities on one of the largest English-language cybercriminal forums, facilitating various malicious operations. 

  • APT41: A Chinese state-affiliated group, APT41 continues to engage in espionage activities, targeting sectors such as healthcare, telecommunications, and finance. 

  • APT29: Known for its sophisticated espionage campaigns, this Russian state-affiliated group remains active in infiltrating governmental and private sector networks. 

  • KillSec: Originally aligned with the "Anonymous" hacktivist collective, KillSec has recently shifted towards financially motivated ransomware activities, increasing its threat profile. 

Further Reading: ReliaQuest Article on Critical Threat Actors. 

 

Halloween’s Digital Threats of 2024 

Halloween brings tales of horror, but in 2024, some of the scariest threats come from the digital realm. Cybercriminals are increasingly using advanced tools to target individuals and organizations with new forms of AI-driven malware, IoT exploits, and social engineering tricks that play on our trust. 

Key Insights: 

  • AI-Powered Attacks: These cyber “ghosts” can adapt to evade detection, making attacks like spear-phishing and deepfakes more convincing. 

  • IoT Vulnerabilities: Over 20,000 vulnerable IoT devices, including cameras and routers, have become entry points for attackers, posing risks to privacy and security. 

  • Social Media Exploitation: Personal data scraped from social platforms is being weaponized for phishing and blackmail, creating "digital dossiers" for targeted attacks. 

  • Fake Calls and Malware: Scammers posing as bank representatives are using fake calls to steal sensitive information, a trick that’s led to an increase in identity theft and financial loss. 

  • Dating Apps and Location Data: Privacy risks on dating apps, including inadvertent location sharing, are turning digital encounters into real-life safety concerns. 

Further Reading: Check Point’s guide on Halloween Cyber Threats. 

 

In News Tags Newsletter, threat intelligence, phishing
Comment

Created by ChatGPT

Phishing Threat Intelligence Newsletter for October 2024

October 18, 2024

This is a monthly newsletter I put together for our internal security team with a lean towards phishing and healthcare. Created with help from ChatGPT.

Phishing via Google Ads Targets Lowe’s Employees 

Summary: Interesting technicque to watch. A recent malvertising campaign targeted Lowe’s employees by impersonating the company’s employee portal through fraudulent Google ads. Threat actors used phishing pages that closely resembled the legitimate MyLowesLife site to steal login credentials. These attacks underline the need for caution when clicking on sponsored links, especially for accessing internal portals.  

Key Insight: Avoid using search engines to access internal portals—bookmark them instead to reduce exposure to phishing. 

Further Reading: Malwarebytes Blog 

 

 

Emerging Phishing Threats: Typosquatting and Brand Impersonation Trends 

Summary: Zscaler's research uncovers a growing trend in phishing attacks involving typosquatting and brand impersonation. Attackers are increasingly mimicking popular brands using lookalike domains to trick users into divulging sensitive information. 

Key Insights: 

  • Over 10,000 malicious domains detected between February and July 2024. 

  • Google, Microsoft, and Amazon are the top impersonated brands. 

  • Attackers use free TLS certificates to evade detection. 

  • Sectors like Internet Services and Online Shopping are prime targets. 

For more details, visit Zscaler's blog. 

 

 

Suspected Espionage Campaign Delivers “Voldemort” Malware 

Summary: Proofpoint researchers identified a sophisticated espionage campaign distributing custom malware named "Voldemort." This campaign used advanced techniques like abusing Google Sheets for command and control (C2) and targeting organizations globally by impersonating tax authorities. The malware, likely tied to an APT actor, has intelligence-gathering capabilities and is suspected of espionage rather than financial gain. 

Key Insights: 

  • Targeted over 70 organizations across multiple sectors. 

  • Abuses Windows file protocols and advanced C2 mechanisms. 

For more details, visit Proofpoint's blog. 

 

 

Scattered Spider Targets Insurance and Financial Sectors Using Cloud Ransomware 

Summary: The Scattered Spider group has intensified its ransomware attacks on the insurance and financial industries, leveraging cloud vulnerabilities and phishing campaigns to compromise high-privileged accounts. The group uses social engineering tactics, including SIM swapping, smishing, and cloud credential theft, to gain unauthorized access. Their advanced techniques, combined with partnerships like BlackCat, have made them a formidable threat to cloud-based infrastructures. 

Further Reading: EclecticIQ Blog 

 

 

Top Cyber Attacker Techniques: May-July 2024 Insights 

Summary: ReliaQuest’s report from May to July 2024 highlights the growing threat of phishing, accounting for 37% of incidents. The “SocGholish” malware, delivered via fake browser updates, remains widespread. Additionally, exposed credentials make up 88.75% of alerts, posing significant risks. Key sectors targeted by ransomware include manufacturing and tech. To defend against these threats, organizations should enhance multi-factor authentication, monitor user behavior, and deploy rapid response measures. 

Key Insights: 

  • Phishing remains a top threat. 

  • Credential exposure is a major risk. 

  • Ransomware is heavily targeting manufacturing and tech sectors. 

Further Reading: ReliaQuest Blog 

 

 

Unveiling RECORDSTEALER: A Persistent Infostealer Targeting Sensitive Data 

Summary: RECORDSTEALER (Raccoon Stealer V2) is a malware targeting sensitive information like passwords, payment data, and cryptocurrency wallets. It infects systems through malvertising and fake downloads, focusing on web browsers for data exfiltration. RECORDSTEALER’s infrastructure has been disrupted, but related malware such as VIDAR and STEALC are still active. 

Key Insights: 

  • Uses browser exploits for credential harvesting. 

  • Communicates with command-and-control servers using encrypted channels. 

  • Evades detection via obfuscation and process injection. 

Further Reading: Google Cloud Blog 

 

 

Splinter: A New Post-Exploitation Red Team Tool 

Summary: Splinter, a post-exploitation tool developed in Rust, allows for remote command execution, file uploads, and process injection. It uses encrypted HTTPS for command-and-control (C2) communication, making it harder to detect. Initially built for red team operations, the tool's misuse poses significant risks to compromised systems. 

Technical Key Insights: 

  • Splinter supports process injection into system processes. 

  • Uses encrypted C2 channels for communication. 

  • Built with Rust for enhanced performance and cross-platform compatibility. 

Further Reading: Unit 42 Article 

 

 

Supershell Malware Targeting Linux SSH Servers 

Summary: Supershell, a Go-based backdoor, is being deployed on Linux SSH servers through brute-force attacks. Once installed, it provides attackers with remote access via a reverse shell, enabling them to hijack systems and deploy additional payloads like cryptocurrency miners. 

Key Insights: 

  • Uses reverse shell for remote control. 

  • Exploits weak SSH credentials via brute-force attacks. 

  • Can execute additional malicious payloads, such as XMRig miners. 

  • Written in Go, enhancing cross-platform capabilities. 

Further Reading: AhnLab ASEC Report 

 

 

Cybercriminals Exploit Legitimate Software with CAMO Techniques 

Summary: ReliaQuest's latest findings reveal the growing use of legitimate IT tools by cybercriminals in "Commercial Applications, Malicious Operations" (CAMO). These tools, such as PDQ Deploy and SoftPerfect, are used for spreading ransomware, exfiltrating data, and evading detection by blending into normal network operations. This trend complicates incident detection and response. 

Key Insights: 

  • CAMO tools can bypass detection by leveraging legitimate system capabilities. 

  • Attackers use trusted tools to move laterally and exfiltrate data. 

  • Network segmentation, monitoring, and whitelisting can mitigate these threats. 

Further Reading: ReliaQuest Blog 

 

 

Phishing Attack Uses Two-Step Approach to Evade Detection 

Summary: A new phishing attack leverages a two-step process, using legitimate platforms like Microsoft Office Forms as an intermediary to evade detection. After clicking the phishing email link, users are directed to a legitimate form before being redirected to a fake login page designed to steal credentials. This sophisticated approach helps attackers bypass security filters by exploiting trusted platforms. 

Key Insight: Be cautious of phishing links that utilize legitimate services as intermediaries before redirecting to malicious sites. 

Further Reading: KnowBe4 Blog 

 

Surge in Malicious Links Marks 133% Increase in Q1 2024 

Summary: Phishing attacks using malicious links surged by 133% in the first quarter of 2024, as attackers shift away from traditional attachments to evade detection. Links allow attackers to obfuscate malicious content and use redirects, CAPTCHA, and legitimate services to conceal their payloads. This growing trend emphasizes the need for organizations to enhance email security and continuously train employees to spot suspicious links. 

Further Reading: KnowBe4 Blog 

 

 

HR-Related Phishing Tactics Grow More Sophisticated 

Summary: Threat actors are increasingly using HR-related phishing emails, disguised as official company communications, to trick employees into providing credentials. These phishing attacks often use urgent subjects like “Revised Employee Handbook,” leading victims to a fake Microsoft login page. Attackers use the stolen credentials for further exploitation. The campaign evades email security platforms by leveraging legitimate-looking content and psychological manipulation. 

Further Reading: Cofense Blog 

 

 

Inc Ransom Attack: Advanced Extortion Techniques Emerge 

Summary: The Inc Ransom group uses advanced techniques like data exfiltration without encryption, exploiting firewall vulnerabilities and hiding within legitimate network traffic using tools like Impacket and PowerShell. By deploying Rclone for data transfer, they evade detection while pressuring victims through extortion. The report includes details on a recent attack against a healthcare organization. 

Technical Key Insights: 

  • Use of Rclone for stealth data exfiltration. 

  • Abuse of firewall vulnerabilities for initial access. 

  • Impacket and PowerShell used to blend into legitimate traffic. 

  • Data theft replaces encryption in the extortion strategy. 

Further Reading: ReliaQuest Blog 

 

 

RansomHub Reigns, Meow Ransomware Surges in August 2024 

Summary: RansomHub leads ransomware threats, targeting Windows, macOS, Linux, and VMware ESXi systems using sophisticated encryption techniques. Meanwhile, Meow ransomware shifts focus from encryption to selling stolen data on leak marketplaces, employing the ChaCha20 encryption algorithm. Both groups aggressively target exposed RDP configurations and vulnerable systems. 

Technical Analysis: 

  • RansomHub uses robust encryption across multi-platform environments, complicating recovery. 

  • Meow exploits ChaCha20 for file encryption and omits .exe files, leveraging leak sites for extortion. 

  • Both utilize exposed RDP ports for initial access. 

Further Reading: Checkpoint Blog 

 

 

Phishing-as-a-Service Platform Sniper Dz Gains Traction with Unique Tactics 

Summary: The Sniper Dz Phishing-as-a-Service (PhaaS) platform has facilitated the creation of over 140,000 phishing websites. It offers pre-made phishing templates targeting major brands, leveraging public proxy servers and SaaS platforms to evade detection. Sniper Dz uses unique obfuscation techniques, enabling phishing campaigns to bypass traditional security measures while collecting stolen credentials. 

Key Insights: 

  • Sniper Dz uses proxy servers to hide phishing activities, making detection more difficult. 

  • Phishers can easily launch campaigns targeting popular services without needing technical expertise. 

  • Integrating proxy detection mechanisms and monitoring SaaS usage can help identify such attacks. 

Further Reading: Unit42 Article 

 

 

DragonForce Ransomware: Advanced Tactics and Affiliate Program 

Summary: DragonForce, using both LockBit and ContiV3 forks, targets critical sectors through its RaaS affiliate program. The ransomware employs sophisticated tactics like BYOVD to disable EDR/XDR systems, coupled with SystemBC for persistence and lateral movement. Affiliates can customize attacks using the builder to encrypt files, terminate security processes, and evade detection through advanced anti-analysis features. Mimikatz and Cobalt Strike are used for credential harvesting and system reconnaissance. 

Key Technical Insights: 

  • BYOVD: Drivers like TrueSight.sys and RentDrv.sys disable security. 

  • RSA-1024 & Salsa20 encryption for ransomware payloads. 

  • Use of PowerShell and Cobalt Strike for malware execution and persistence. 

Further Reading: Group-IB Blog 

 

 

RDP Brute-Force Attacks 

Summary: Remote Desktop Protocol (RDP) brute-force attacks remain a high-risk method for attackers to gain unauthorized access to networks. Cybercriminals exploit weak/default credentials and exposed RDP ports using automated tools, making it a preferred method for both nation-state and cybercriminal groups. Attackers can use compromised access for data theft, deploying ransomware, or selling credentials on dark web forums. 

Technical Highlights: 

  • Attackers use tools like Hydra and Medusa for brute-forcing RDP. 

  • RDP exploits involve enumeration via port scans and credential stuffing. 

  • Initial access brokers often sell RDP access for further attacks. 

Defense Recommendations: 

  • Use strong, unique passwords and multi-factor authentication. 

  • Limit RDP exposure to the internet, utilizing VPN and firewalls. 

  • Implement rate-limiting and robust monitoring to detect unusual RDP activity. 

For more details, you can visit ReliaQuest's article on RDP Brute-Force Attacks. 

 

 

New Phishing Tactic Exploits HTTP Headers for Stealthy Redirects 

Summary: Attackers are using a new technique involving HTTP response headers to automatically redirect users to phishing pages. The tactic leverages compromised websites, making the phishing links appear legitimate. This technique is particularly challenging to detect and has been observed in phishing campaigns targeting various industries. 

Key Insights: 

  • HTTP headers are manipulated for silent phishing page redirects. 

  • Attackers pre-populate victim data (like email addresses) to enhance credibility. 

  • Detection is difficult, requiring heightened user vigilance and advanced security monitoring. 

For more details, visit KnowBe4. 

 

 

Cyber Predators Exploit Healthcare Vulnerabilities with Ransomware and Data Theft 

Summary: Cybercriminals are increasingly targeting healthcare organizations, exploiting weaknesses to steal patient data and extort hospitals via ransomware attacks. These criminals collaborate through darknet marketplaces, offering ransomware-as-a-service, and trading access to compromised healthcare systems. With attacks up 32% globally in 2024, healthcare remains a prime target due to its valuable data and often outdated security infrastructure. 

Key Insights: 

  • Healthcare sees an average of 2,018 attacks weekly, with APAC and Latin America hit hardest. 

  • Ransomware-as-a-service empowers less experienced criminals. 

  • Hospitals face high risks due to the critical nature of their operations. 

Read more: Checkpoint Research. 

 

 

Phishing Campaign Exploits Google Apps Script for Sophisticated Attacks 

Summary: A new phishing campaign manipulates Google Apps Script macros to target users across multiple languages. The phishing emails falsely claim to provide “account details” and include links to malicious pages mimicking legitimate Google services. Victims are tricked into disclosing sensitive information, leading to data theft and operational disruption. 

Key Insights: 

  • Attack uses Google’s infrastructure to appear legitimate. 

  • Affected users may disclose sensitive data via a deceptive Google Apps Script URL. 

  • Advanced email filtering, real-time URL scanning, and phishing awareness training are crucial defenses. 

For more details, visit Checkpoint Research. 

 

 

New Windows PowerShell Phishing Campaign Highlights Serious Risks 

Summary: A recently discovered phishing campaign uses GitHub-themed emails to trick recipients into launching PowerShell commands, enabling the download of password-stealing malware. The attack uses social engineering techniques, disguising itself as a CAPTCHA verification process. By exploiting PowerShell’s automation capabilities, attackers gain unauthorized access to credentials stored on victims' systems. 

Key Insights: 

  • Attack targets GitHub users but could be adapted for broader use. 

  • Exploits PowerShell to execute malicious commands. 

  • Vigilance and disabling unnecessary PowerShell access are crucial defenses. 

For more, visit Krebs on Security. 

 

 

Phishing Attacks Exploit Content Creation and Collaboration Platforms 

Summary: A recent phishing campaign abuses popular content creation and collaboration tools to trick users into clicking malicious links. Cybercriminals use legitimate-looking posts and documents with embedded phishing URLs, leading to credential theft through fake login pages. These attacks have been seen in both business and educational environments. 

Key Insights: 

  • Phishing emails from trusted platforms contain hidden threats. 

  • Common platforms include design tools and document-sharing services. 

  • Users should be cautious of unexpected links and suspicious login requests. 

For more information, visit KnowBe4. 

 

 

Cyber Threats Looming for the 2024 U.S. Election 

Summary: As the 2024 U.S. election approaches, cyber threats from nation-state actors, hacktivists, and cybercriminals are expected to rise. These include disinformation campaigns, phishing attacks, and attacks on electoral infrastructure. Businesses should brace for phishing campaigns and SEO poisoning targeting politically charged topics. 

Key Insights: 

  • Nation-state groups may conduct hack-and-leak operations and influence campaigns. 

  • Expect a surge in phishing attacks and scams using election-related themes. 

  • Businesses should implement advanced cybersecurity measures to mitigate risks. 

For more details, visit ReliaQuest. 

In News Tags Newsletter, phishing, threat intelligence
Comment

Image created with ChatGPT

Phishing Threat Intelligence From August 2024

September 9, 2024

These are news articles from August 2024. Feel free to take and share with your internal cybersecurity team. A mention of explores.com would be great!

Dismantling Smart App Control 

Elastic Security Labs recently uncovered multiple vulnerabilities in Windows Smart App Control (SAC) and SmartScreen. These weaknesses allow attackers to bypass security measures using techniques such as signed malware, reputation hijacking, and LNK stomping. These methods enable initial access without triggering security warnings, posing significant risks. Security teams should focus on detecting these evasive tactics and not rely solely on OS-native features. 

Key Insights: 

  • Signed Malware: Attackers use valid certificates to bypass SAC. 

  • Reputation Hijacking: Leveraging trusted apps to execute malicious code. 

  • LNK Stomping: Crafting LNK files to evade MotW checks. 

For more details, visit the Elastic Security Labs article. 

 

 

Securing Domain Names from Takeover 

Recent research highlights vulnerabilities in domain name management that leave over a million domains susceptible to hijacking. This issue arises from weak authentication practices at several web hosting providers and domain registrars. Cybercriminals exploit these weaknesses to take control of domains, using them for phishing, spam, and malware distribution. To mitigate risks, it is crucial to ensure proper DNS configuration and use DNS providers with strong verification processes. 

Key Insights: 

  • Vulnerability: Over a million domains at risk. 

  • Exploitation: Hijacked domains used for malicious activities. 

  • Recommendation: Strengthen DNS configuration and provider verification. 

For more details, visit the Krebs on Security article. 

 

 

Exploitation of Google Drawings and WhatsApp 

A newly identified phishing campaign exploits Google Drawings and WhatsApp's URL shortener to create convincing redirects to malicious sites. This method allows attackers to bypass security filters and deceive users into thinking they are visiting legitimate sites like Amazon. These tactics highlight the increasing sophistication of phishing threats, emphasizing the need for heightened vigilance and advanced security measures. 

Key Insights: 

  • Exploited Tools: Google Drawings and WhatsApp's URL shortener. 

  • Attack Strategy: Redirects users to malicious sites mimicking trusted brands. 

  • Recommendation: Implement advanced phishing detection and maintain user vigilance. 

For more details, visit the Menlo Security article. 

 

 

Concerns Over Cloudflare’s Anti-Abuse Posture 

Spamhaus has raised concerns about Cloudflare's anti-abuse policies, highlighting that cybercriminals are exploiting Cloudflare’s services to mask malicious activities. Despite numerous abuse reports, Cloudflare's current approach often shields the true location of harmful content, complicating efforts to combat cybercrime. This situation underscores the need for stronger abuse management practices to prevent cybercriminals from leveraging trusted services to conduct illegal activities. 

Key Insights: 

  • Exploitation: Cybercriminals are using Cloudflare to hide malicious activities. 

  • Response: Current anti-abuse measures are inadequate in addressing the issue. 

  • Recommendation: Enhanced abuse management and accountability are needed. 

For more details, visit the Spamhaus article. 

 

 

Royal Ransomware Rebrands as BlackSuit 

The ransomware group formerly known as Royal has rebranded as BlackSuit, increasing their ransom demands to over $500 million. This shift indicates a more aggressive approach, with the group targeting larger organizations across various sectors. BlackSuit continues to use sophisticated tactics, including double extortion, where they threaten to release stolen data if their demands are not met. Organizations should strengthen their defenses and ensure incident response plans are up-to-date. 

Key Insights: 

  • Rebranding: Royal ransomware is now BlackSuit. 

  • Increased Ransom: Demands exceed $500 million. 

  • Tactics: Double extortion remains a primary threat. 

  • Recommendation: Strengthen defenses and update incident response plans. 

For more details, visit the KnowBe4 article. 

 

 

New Phishing Scam Using Cross-Site Scripting 

A recent phishing scam uncovered by KnowBe4 employs cross-site scripting (XSS) attacks to harvest personal details from unsuspecting victims. Attackers use this method to inject malicious scripts into legitimate websites, tricking users into entering sensitive information like login credentials. This technique bypasses traditional security measures, making it a particularly dangerous threat. Users should be cautious when clicking on links in emails and ensure that websites they interact with are secure. 

Key Insights: 

  • Attack Method: Cross-site scripting (XSS) used to steal personal details. 

  • Target: Login credentials and sensitive information. 

  • Recommendation: Verify website security before entering personal information. 

For more details, visit the KnowBe4 article. 

 

 

Surge in File-Sharing Phishing Attacks 

KnowBe4 reports a staggering 350% increase in file-sharing phishing attacks over the past year. These attacks often disguise themselves as notifications from popular file-sharing services, tricking users into revealing sensitive information or downloading malware. The rapid rise in these attacks highlights the need for enhanced email security and ongoing employee training. 

Key Insights: 

  • 350% Increase: Significant rise in file-sharing phishing attacks. 

  • Attack Method: Disguised as legitimate file-sharing notifications. 

  • Recommendation: Strengthen email security and employee awareness. 

For more details, visit the KnowBe4 article. 

 

 

Rising Use of URL Shorteners in Phishing Attacks 

Recent intelligence highlights a growing trend where cybercriminals use URL shorteners to obscure malicious links in phishing campaigns. This tactic effectively conceals the true destination of links, making it difficult for users and traditional security tools to detect threats. These shortened URLs often appear in seemingly legitimate emails or text messages, leading to fraudulent websites designed to steal credentials or deploy malware.  

For more details, visit the KnowBe4 article. 

 

 

Surge in Microsoft Brand Impersonation Attacks 

A recent report shows a 50% increase in phishing attacks impersonating Microsoft in just one quarter. These attacks target users by mimicking Microsoft’s branding to steal credentials or deploy malware. Given Microsoft’s widespread use in organizations, employees should be extra cautious when receiving emails claiming to be from Microsoft, especially those requesting login details or prompting downloads. Always verify the sender's address and report suspicious emails to IT. 

For more details, visit the KnowBe4 article. 

 

 

Dark Angels Ransomware Group Rakes in Record Ransoms 

The Dark Angels ransomware group has secured a record $75 million ransom payment from a fortune 50 company recently. Unlike other groups, Dark Angels avoid public leaks and minimize operational disruptions for their victims, making it easier to coerce payments quietly.  

For more details, visit the Krebs on Security article. 

 

 

Inc Ransom Attack Analysis 

Overview: In April 2024, the "Inc Ransom" group targeted a ReliaQuest customer, employing a double-extortion strategy without encrypting files. They exploited an unpatched Fortinet vulnerability to gain access, installed remote management tools like AnyDesk, and used techniques like pass-the-hash for lateral movement. Data was exfiltrated using unconventional tools such as Restic. 

Key Insights: 

  • Mitigations: Prioritize patch management, enforce network segmentation, and deploy host-based controls to prevent unauthorized software execution. 

  • Emerging Trends: Use of legitimate tools by attackers to blend in with normal activity. 

Actionable Steps: Strengthen defenses by regularly updating and auditing systems, ensuring proper segmentation, and limiting privileges to essential accounts. 

For a detailed analysis, visit the full report here. 

 

 

URL Rewriting Exploited by Threat Actors 

Overview: Threat actors are increasingly abusing URL rewriting, a security feature intended to protect against phishing, to mask malicious links. By compromising legitimate email accounts and using URL rewriting, attackers can disguise phishing URLs as safe, often leveraging the security vendor's domain to gain trust. 

Key Insights: 

  • Mitigations: Enhance vigilance when clicking on links, even those appearing to be from trusted sources. 

  • Emerging Trends: Attackers are exploiting the gap between initial scans and later weaponization of URLs. 

For a detailed analysis, visit the full report here. 

 

 

Exfiltration Tools on the Rise 

A recent analysis by ReliaQuest highlights the growing use of advanced exfiltration tools by cybercriminals to steal sensitive data. Tools like Rclone, WinSCP, and FileZilla are increasingly being leveraged to exfiltrate data from compromised networks. These tools are difficult to detect as they mimic legitimate traffic, making traditional defenses less effective.  

For more details, visit the ReliaQuest article. 

 

 

North Korean IT-Worker Scheme Exposed in Tennessee 

A Nashville resident, Matthew Isaac Knoot, was arrested for facilitating a scheme that funneled hundreds of thousands of dollars to North Korea’s illicit weapons program. Knoot allegedly helped North Korean IT workers secure remote jobs with U.S. and British companies by using stolen identities. The funds, earned through six-figure salaries, were laundered and funneled back to North Korea. This case underscores the growing threat of North Korean cyber operations targeting remote work environments. 

For more details, visit the full article. 

 

 

Top Malware in July 2024: Remcos and RansomHub 

The July 2024 Threat Index highlights a surge in activity by the RansomHub ransomware group and a new Remcos malware campaign. RansomHub continues to dominate as the most prevalent ransomware, accounting for 11% of attacks, while LockBit3 and Akira follow closely behind. A critical security lapse led to the distribution of Remcos via a malicious ZIP file disguised as a CrowdStrike update. Additionally, FakeUpdates remains a persistent threat, utilizing fake browser updates to deploy RATs like AsyncRAT. 

Key Insights: 

  • RansomHub: Leading ransomware, targeting Windows, macOS, Linux, and VMware ESXi. 

  • Remcos Campaign: Exploits a security software update issue, spreading via phishing attacks. 

  • FakeUpdates: Tops the malware list, leveraging compromised websites to deliver Remote Access Trojans. 

For a deeper dive, visit Checkpoint’s Threat Index. 

 

 

Focus on Malware Loaders: Evolving Threats in 2024 

In 2024, nearly 40% of malware incidents involved advanced loaders like SocGholish, GootLoader, and Raspberry Robin. These loaders are pivotal in deploying ransomware and Remote Access Trojans (RATs). SocGholish has notably enhanced its tactics with Python scripts, making it harder to detect, while GootLoader and Raspberry Robin use sophisticated evasion techniques, posing significant threats to critical sectors. 

Key Insights: 

  • SocGholish: Now using Python for persistence. 

  • GootLoader: Continues to exploit legitimate platforms. 

  • Raspberry Robin: Notable for its complex evasion tactics. 

For more detailed insights, visit the full article here. 

Emerging Malware Variants to Watch in 2024 

In recent months, several malware variants have gained prominence in the cyber threat landscape. Notable among them are LummaC2, Rust-based stealers, SocGholish, AsyncRAT, and Oyster, each posing significant risks to organizations across all sectors. 

Key Insights: 

  • LummaC2: A powerful infostealer with increasing reach. 

  • Rust-based Stealers: Notable for their advanced evasion techniques. 

  • SocGholish: Continues to be a persistent threat through fake browser updates. 

  • AsyncRAT: Versatile and widely used for remote access. 

  • Oyster: A backdoor linked to Wizard Spider, signaling targeted attacks. 

For more details, visit ReliaQuest. 

 

 

Exploring the Abuse of Impacket: A Growing Threat 

Impacket, a versatile Python-based toolkit, has become a favored tool among threat actors for lateral movement, privilege escalation, and remote code execution in Windows environments. Threat actors commonly exploit Impacket scripts like psexec.py, smbexec.py, and wmiexec.py to perform these actions stealthily. The toolkit’s ability to mimic legitimate network activity complicates detection, making it a significant challenge for organizations to defend against. 

Key Insights: 

  • psexec.py: Used for executing remote commands with elevated privileges. 

  • smbexec.py: Facilitates lateral movement without additional software installation. 

  • wmiexec.py: Enables stealthy command execution through WMI. 

For more information, visit ReliaQuest. 

Copybara Android Malware: A Rising Threat 

The latest variant of Copybara, an Android malware family, has evolved to use the MQTT protocol for command-and-control (C2) communication, enhancing its stealth. This malware exploits Android’s Accessibility Service for keylogging, screen capturing, and phishing attacks, particularly targeting cryptocurrency exchanges and financial institutions. Copybara’s ability to impersonate legitimate apps makes it especially dangerous. 

Key Insights: 

  • MQTT Protocol: Used for stealthy C2 communication. 

  • Accessibility Service Exploitation: Enables comprehensive device control. 

  • Targeted Attacks: Focus on financial institutions and cryptocurrency exchanges. 

For more details, visit Zscaler. 

 

 

Massive QR Code Phishing Campaign Abuses Microsoft Sway 

A significant phishing campaign has been detected, exploiting Microsoft Sway to host malicious landing pages targeting Microsoft 365 users. The campaign, identified by Netskope Threat Labs, saw a 2,000-fold increase in activity, primarily targeting sectors in Asia and North America. Attackers use QR codes embedded in phishing emails, redirecting victims to malicious sites. This method exploits the weaker security controls of mobile devices and evades email scanners, making it particularly effective and dangerous. 

Key Insights: 

  • Targeted Sectors: Technology, manufacturing, and finance. 

  • Attack Method: QR codes bypass traditional security by embedding in images. 

  • Risk Increase: Heightened threat to mobile device users. 

For more details, visit BleepingComputer. 

Malvertising Campaign Impersonates Google Products 

A recent malvertising campaign has been detected, impersonating various Google products to lure users into tech support scams. These malicious ads, exploiting Google’s Looker Studio, redirect victims to fake Microsoft or Apple warning pages, urging them to call a fraudulent support number. This campaign serves as a reminder to be cautious of online ads, even those that appear to represent trusted brands. 

Key Insights: 

  • Target: Users of Google products. 

  • Tactics: Fake tech support scams via malvertising. 

  • Impact: Potential malware installation and data theft. 

For more details, visit KnowBe4. 

 

 

Deceptive AI: A New Wave of Cyber Threats 

As AI technology advances, cybercriminals are increasingly using AI-generated content (AIGC) to deceive users on social media. This includes creating fake profiles, deepfake videos, and AI-crafted messages that are nearly indistinguishable from real content. A recent survey revealed that a significant portion of users struggle to identify these threats, which can lead to fraud, identity theft, and misinformation. It's crucial to be aware of these risks and stay vigilant online. 

For more details, visit KnowBe4. 

 

 

North Korean IT Workers Target U.S. Tech Companies 

North Korean IT workers are increasingly applying for remote jobs at U.S. tech firms using false identities. They employ AI-generated profile images and fake job histories, aiming to funnel earnings back to the North Korean regime, posing security risks and potential sanctions violations. Key insights include the importance of rigorous background checks and enhanced candidate verification processes to counter this threat. Collaboration with security experts and intelligence sharing is critical. 

For more insights, visit Cinder. 

 

 

Risks in Publicly Exposed GenAI Development Services 

A recent analysis highlights significant security risks in publicly exposed GenAI development services, particularly vector databases and low-code LLM tools. These platforms often handle sensitive data but can be misconfigured, leading to potential data leakage, data poisoning, and exploitation of vulnerabilities. To mitigate these risks, organizations should enforce strict access controls, monitor activity, and ensure all software is updated. 

For a deeper dive, visit Legit Security. 

 

 

How Attackers Exploit Digital Analytics Tools 

Cybercriminals are increasingly weaponizing digital analytics tools like link shorteners, IP geolocation services, and CAPTCHA challenges. These tools, often used for legitimate purposes, are repurposed to obscure malicious activity, evade detection, and tailor attacks to specific targets. Organizations should implement automated analysis and monitor suspicious patterns in these tools to mitigate risks. 

Key Insights: 

  • Threat actors use link shorteners to mask phishing URLs. 

  • IP geolocation data helps attackers target specific regions. 

  • CAPTCHA services are abused to bypass automated security scans. 

Further Reading: Google Cloud Blog 

 

 

GenAI and the Surge of AI-Driven Fraudulent Websites 

 Cybercriminals are increasingly leveraging large language models (LLMs) to scale the creation of fraudulent websites, including phishing sites and fake online stores. Netcraft reports a significant rise in AI-generated content for scams, with a 3.95x increase in such websites from March to August 2024. These AI tools enhance the credibility of scams by improving text quality, making malicious content more convincing and harder to detect. Organizations must enhance their defenses to mitigate the risks posed by this emerging threat. 

Key Insights: 

  • LLMs are used to generate convincing text for scams. 

  • AI-driven scams have seen a sharp increase in recent months. 

  • Monitoring and takedown strategies are essential to combat this trend. 

Further Reading: Netcraft Blog 

 

 

So-Phish-ticated Attacks: A New Wave of Social Engineering 

A sophisticated threat actor is conducting targeted social engineering attacks against over 130 U.S. organizations. These attacks, which include phishing via SMS and direct phone calls, are designed to harvest credentials and one-time passcodes. The use of native English speakers and tactics that bypass traditional security tools makes these attacks particularly challenging to detect.  

Key Insights: 

  • Attacks bypass traditional detection. 

  • Focus on credential harvesting. 

  • Targeting multiple industry verticals. 

Further Reading: GuidePoint Security Blog 

 Originally posted on exploresec.com

In News Tags newsletter, phishing, threat intelligence
Comment

Latest PoDCASTS

Featured
Jul 15, 2025
[RERELEASE] What are BEC attacks?
Jul 15, 2025
Jul 15, 2025
Jul 8, 2025
[RERELEASE] How to crack passwords
Jul 8, 2025
Jul 8, 2025
Jul 2, 2025
[RERELEASE] How to find vulnerabilites
Jul 2, 2025
Jul 2, 2025
Jun 24, 2025
[RERELEASE] What is data driven security?
Jun 24, 2025
Jun 24, 2025
Jun 17, 2025
[RERELEASE] What is a CISSP?
Jun 17, 2025
Jun 17, 2025
Jun 10, 2025
[RERELEASE] From ShowMeCon 2017: Dave Chronister, Johnny Xmas, April Wright, and Ben Brown talk about Security
Jun 10, 2025
Jun 10, 2025
Jun 4, 2025
How to Perform Incident Response and Forensics on Drones with Wayne Burke
Jun 4, 2025
Jun 4, 2025
Jun 3, 2025
That Shouldn't Have Worked: A Red Teamer's Confessions with Corey Overstreet
Jun 3, 2025
Jun 3, 2025
May 28, 2025
when machines take over the world with Jeff Man
May 28, 2025
May 28, 2025
May 20, 2025
How to Disconnect From Cybersecurity
May 20, 2025
May 20, 2025

Powered by Squarespace