๐Ÿšจ ๐—ฃ๐—ต๐—ถ๐˜€๐—ต๐—ถ๐—ป๐—ด ๐˜ƒ๐—ถ๐—ฎ ๐—š๐—ผ๐—ผ๐—ด๐—น๐—ฒ ๐—ฆ๐˜๐—ผ๐—ฟ๐—ฎ๐—ด๐—ฒ ๐—”๐—ฏ๐˜‚๐˜€๐—ฒ ๐—Ÿ๐—ฒ๐—ฎ๐—ฑ๐—ถ๐—ป๐—ด ๐˜๐—ผ ๐—ฅ๐—”๐—ง ๐——๐—ฒ๐—ฝ๐—น๐—ผ๐˜†๐—บ๐—ฒ๐—ป๐˜: ๐——๐—ฒ๐˜๐—ฒ๐—ฐ๐˜ ๐—œ๐˜ ๐—˜๐—ฎ๐—ฟ๐—น๐˜†
We identified a multi-stage #phishing campaign using a Google Drive-themed lure and delivering #Remcos RAT. Attackers place the HTML on storage[.]googleapis[.]com, abusing trusted infrastructure instead of hosting the phishing page on a newly registered domain.

โ—๏ธ ๐—ง๐—ต๐—ฒ ๐—ฐ๐—ต๐—ฎ๐—ถ๐—ป ๐—น๐—ฒ๐˜ƒ๐—ฒ๐—ฟ๐—ฎ๐—ด๐—ฒ๐˜€ ๐—ฅ๐—ฒ๐—ด๐—ฆ๐˜ƒ๐—ฐ๐˜€.๐—ฒ๐˜…๐—ฒ, ๐—ฎ ๐—น๐—ฒ๐—ด๐—ถ๐˜๐—ถ๐—บ๐—ฎ๐˜๐—ฒ ๐˜€๐—ถ๐—ด๐—ป๐—ฒ๐—ฑ ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜/.๐—ก๐—˜๐—ง ๐—ฏ๐—ถ๐—ป๐—ฎ๐—ฟ๐˜† ๐˜„๐—ถ๐˜๐—ต ๐—ฎ ๐—ฐ๐—น๐—ฒ๐—ฎ๐—ป ๐—ฉ๐—ถ๐—ฟ๐˜‚๐˜€๐—ง๐—ผ๐˜๐—ฎ๐—น ๐—ต๐—ฎ๐˜€๐—ต. Combined with trusted hosting, this makes reputation-based detection unreliable and lowers alert priority during triage. File reputation alone is not enough. Detection depends on behavioral analysis and sandboxing.

โš ๏ธ The page mimics a Google Drive login form, collecting email, password, and OTP. After a โ€œsuccessful login,โ€ the victim is prompted to download Bid-Packet-INV-Document.js, triggering a multi-stage delivery chain:

JS (WSH launcher + time-based evasion) โžก๏ธ VBS Stage 1 (download + hidden execution) โžก๏ธ VBS Stage 2 (%APPDATA%\WindowsUpdate + Startup persistence) โžก๏ธ DYHVQ.ps1 (loader orchestration) โžก๏ธ ZIFDG.tmp (obfuscated PE / Remcos payload) โžก๏ธ Textbin-hosted obfuscated .NET loader (in-memory via Assembly.Load) โžก๏ธ %TEMP%\RegSvcs.exe hollowing/injection โžก๏ธ Partially fileless Remcos + C2 ๐Ÿšจ

๐Ÿ‘จโ€๐Ÿ’ป See the analysis session and collect #IOCs to speed up detection and response: https://app.any.run/tasks/0efd1390-c17a-49ce-baef-44b5bd9c4a97/?utm_source=mastodon&utm_medium=post&utm_campaign=google_storage_abuse_phishing&utm_term=080426&utm_content=linktoservice

๐Ÿ” Use this TI Lookup query to pivot from IOCs, review related activity, and validate your detection coverage: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=google_storage_abuse_phishing&utm_content=linktotilookup&utm_term=08042026#%7B%22query%22:%22domainName:%5C%22www.freepnglogos.com%5C%22%20and%20domainName:%5C%22storage.googleapis.com%5C%22%20and%20threatLevel:%5C%22malicious%5C%22%22,%22dateRange%22:30%7D

โšก๏ธ Equip your SOC with stronger phishing detection and contain incidents faster: https://any.run/phishing/?utm_source=mastodon&utm_medium=post&utm_campaign=google_storage_abuse_phishing&utm_term=080426&utm_content=linktophishingpage

#cybersecurity #infosec

Top 10 last week's threats by uploads ๐ŸŒ
โฌ†๏ธ #Asyncrat 695 (490)
โฌ†๏ธ #Xworm 640 (460)
โฌ‡๏ธ #Stealc 409 (581)
โฌ†๏ธ #Gh0st 396 (274)
โฌ‡๏ธ #Vidar 343 (371)
โฌ†๏ธ #Salatstealer 320 (243)
โฌ‡๏ธ #Remcos 297 (385)
โฌ†๏ธ #Quasar 283 (221)
โฌ†๏ธ #Dcrat 239 (100)
โฌ†๏ธ #Agenttesla 196 (196)
Explore malware in action: https://app.any.run/?utm_source=mastodon&utm_medium=post&utm_campaign=top_ten&utm_term=060426&utm_content=linktoregister#register

#cybersecurity #infosec

Advanced Fileless Remcos RAT Abusing Native Windows Tools

Pulse ID: 69d2ba26efd7dcef6be56abc
Pulse Link: https://otx.alienvault.com/pulse/69d2ba26efd7dcef6be56abc
Pulse Author: cryptocti
Created: 2026-04-05 19:38:14

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #OTX #OpenThreatExchange #RAT #Remcos #RemcosRAT #Windows #bot #cryptocti

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

From Inbox to Intrusion: Multiโ€‘Stage Remcos RAT and C2โ€‘Delivered Payloads in Network

This multi-stage fileless Remcos RAT attack leverages a phishing-delivered JavaScript dropper to trigger a reflective PowerShell loader that executes payloads entirely in memory. The infection chain utilizes obfuscation techniques like rotational XOR and Base64 encoding to reconstruct .NET payloads, significantly reducing the disk-based detection footprint. Stealth is maintained by using aspnet_compiler.exe as a LOLBin to proxy malicious execution and dynamically retrieving the final payload from a remote C2 server.

Pulse ID: 69cd1ac8518646002a1a0fbc
Pulse Link: https://otx.alienvault.com/pulse/69cd1ac8518646002a1a0fbc
Pulse Author: AlienVault
Created: 2026-04-01 13:16:56

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#ASPNet #ASPNet_Compiler #CyberSecurity #InfoSec #Java #JavaScript #NET #OTX #OpenThreatExchange #Phishing #PowerShell #Proxy #RAT #Remcos #RemcosRAT #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Top 10 last week's threats by uploads ๐ŸŒ
โฌ‡๏ธ #Stealc 581 (600)
โฌ‡๏ธ #Asyncrat 493 (541)
โฌ‡๏ธ #Xworm 460 (509)
โฌ†๏ธ #Remcos 389 (272)
โฌ†๏ธ #Vidar 371 (368)
โฌ‡๏ธ #Gh0st 274 (298)
โฌ†๏ธ #Salatstealer 243 (195)
โฌ†๏ธ #Quasar 221 (185)
โฌ†๏ธ #Lokibot 217 (119)
โฌ‡๏ธ #Agenttesla 196 (216)
Explore malware in action: https://app.any.run/?utm_source=mastodon&utm_medium=post&utm_campaign=top_ten&utm_term=300326&utm_content=linktoregister#register

#cybersecurity #infosec

Tracing a Multi-Vector Malware Campaign: From VBS to Open Infrastructure

A multi-stage malware delivery campaign was uncovered, initially detected through a suspicious VBS file. The investigation revealed a complex attack infrastructure using Unicode obfuscation, PNG-based payload staging, and reflectively loaded .NET execution. The attacker utilized open directories to host multiple obfuscated VBS files, each mapping to different malware payloads including XWorm and Remcos RAT. A secondary infection vector involving a weaponized 'PDF' and batch script was also discovered. The campaign demonstrated a modular approach, allowing for payload rotation and multiple attack vectors from the same domain. This sophisticated infrastructure design enables rapid modification and expansion of available payloads without altering the initial delivery mechanism.

Pulse ID: 69c2502fe450207e3f4855c3
Pulse Link: https://otx.alienvault.com/pulse/69c2502fe450207e3f4855c3
Pulse Author: AlienVault
Created: 2026-03-24 08:49:51

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #InfoSec #Malware #NET #OTX #OpenThreatExchange #PDF #RAT #Remcos #RemcosRAT #VBS #Worm #XWorm #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange
Top 10 last week's threats by uploads ๐ŸŒ
โฌ†๏ธ #Stealc 600 (403)
โฌ‡๏ธ #Asyncrat 541 (782)
โฌ†๏ธ #Xworm 510 (431)
โฌ†๏ธ #Vidar 368 (351)
โฌ†๏ธ #Gh0st 298 (281)
โฌ†๏ธ #Remcos 272 (267)
โฌ‡๏ธ #Agenttesla 216 (307)
โฌ‡๏ธ #Dcrat 201 (427)
โฌ†๏ธ #Salatstealer 195 (181)
โฌ‡๏ธ #Quasar 185 (187)
Explore malware in action: https://app.any.run/?utm_source=mastodon&utm_medium=post&utm_campaign=top_ten&utm_term=230326&utm_content=linktoregister#register

Analysis of the Spear-Phishing and KakaoTalk-Linked Threat Campaign

The Konni Group conducted a sophisticated multi-stage attack campaign, initiating with a spear-phishing email disguised as a North Korean human rights lecturer appointment. The attack progressed through execution of a malicious LNK file, installation of remote access malware, and long-term persistence for data theft. A key feature was the unauthorized access to victims' KakaoTalk PC applications, used to distribute additional malicious files to selected contacts. The campaign employed multiple RAT families, including EndRAT, RftRAT, and RemcosRAT, with a distributed C2 infrastructure across Finland, Japan, and the Netherlands. The threat actor's tactics included trust-based propagation, account session abuse, and modular payload deployment, highlighting the need for advanced behavior-based detection and multi-layered defense strategies.

Pulse ID: 69ba831f2287b29db4e4645e
Pulse Link: https://otx.alienvault.com/pulse/69ba831f2287b29db4e4645e
Pulse Author: AlienVault
Created: 2026-03-18 10:49:03

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#CyberSecurity #DRat #DataTheft #Email #Finland #ICS #InfoSec #Japan #Konni #Korea #LNK #Malware #NorthKorea #OTX #OpenThreatExchange #Phishing #RAT #Remcos #RemcosRAT #Rust #SpearPhishing #TheNetherlands #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

Top 10 last week's threats by uploads ๐ŸŒ
โฌ†๏ธ #Asyncrat 782 (533)
โฌ†๏ธ #Xworm 431 (350)
โฌ†๏ธ #Dcrat 427 (268)
โฌ†๏ธ #Stealc 403 (215)
โฌ†๏ธ #Vidar 351 (249)
โฌ†๏ธ #Agenttesla 309 (241)
โฌ†๏ธ #Gh0st 281 (143)
โฌ†๏ธ #Remcos 270 (193)
โฌ†๏ธ #Quasar 187 (158)
โฌ‡๏ธ #Salatstealer 181 (189)
Explore malware in action: https://app.any.run/?utm_source=mastodon&utm_medium=post&utm_campaign=top_ten&utm_term=160326&utm_content=linktoregister#register

#cybersecurity #infosec