📱 Intrusion de 2 mois attribuĂ©e Ă  LUNAR SPIDER: chaĂźne Latrodectus → Brute Ratel → Cobalt Strike et exfiltration via rclone
📝 Source: The DFI...
📖 cyberveille : https://cyberveille.ch/posts/2025-09-30-intrusion-de-2-mois-attribuee-a-lunar-spider-chaine-latrodectus-brute-ratel-cobalt-strike-et-exfiltration-via-rclone/
🌐 source : https://thedfirreport.com/2025/09/29/from-a-single-click-how-lunar-spider-enabled-a-near-two-month-intrusion/
#Brute_Ratel #Cobalt_Strike #Cyberveille
Intrusion de 2 mois attribuĂ©e Ă  LUNAR SPIDER: chaĂźne Latrodectus → Brute Ratel → Cobalt Strike et exfiltration via rclone

Source: The DFIR Report (30 sept. 2025). Contexte: incident survenu en mai 2024, dĂ©marrĂ© par l’exĂ©cution d’un JavaScript Latrodectus 1.3 dĂ©guisĂ© en formulaire fiscal W‑9, menant au dĂ©ploiement de Brute Ratel puis Cobalt Strike, et Ă  une prĂ©sence quasi continue durant prĂšs de deux mois. ‱ ChaĂźne d’intrusion: un JS fortement obfusquĂ© tĂ©lĂ©charge un MSI qui lance un DLL Brute Ratel (via rundll32), lequel injecte Latrodectus dans explorer.exe et Ă©tablit des C2 (souvent derriĂšre Cloudflare). Le stealer Latrodectus est rĂ©cupĂ©rĂ©, puis, ~1 h aprĂšs l’accĂšs initial, dĂ©but de la reconnaissance (ipconfig, systeminfo, nltest, whoami). ~6 h aprĂšs, mise en place d’un BackConnect/VNC opĂ©rationnel pour navigation, dĂ©pĂŽts d’outils et contrĂŽle Ă  distance.

CyberVeille
Threat actors using MacroPack to deploy Brute Ratel, Havoc and PhantomCore payloads - Cisco Talos recently discovered several related Microsoft Office documents uploade... https://blog.talosintelligence.com/threat-actors-using-macropack/ #brute_ratel #macropack #threats #securex #havoc
Threat actors using MacroPack to deploy Brute Ratel, Havoc and PhantomCore payloads

Cisco Talos recently discovered several related Microsoft Office documents uploaded to VirusTotal by various actors between May and July 2024 that were all generated by a version of a payload generator framework called “MacroPack.”

Cisco Talos Blog