Sophos X-Ops

3.1K Followers
14 Following
807 Posts
A task force composed of our SophosLabs, SecOps, MDR, and SophosAI teams working together towards one goal: protecting our customers.
The Sophos X-Ops bloghttps://news.sophos.com/en-us/category/threat-research/

This latest variant also has the ability to patch Ledger Live with malicious logic – which could lead to crypto wallets being drained of funds.

It’s important to take into account the wider context of the increased risk to macOS users. Mainstream malware now regularly affects macOS users – particularly infostealers, which regularly account for a significant portion of the macOS detections we see in telemetry.

We expect this region of the threat landscape to keep evolving, and rapidly. Read the full article here: https://www.sophos.com/en-us/blog/evil-evolution-clickfix-and-macos-infostealers

Evil evolution: ClickFix and macOS infostealers

Across three recent campaigns, Sophos X-Ops notes shifts in both lures and malware capabilities, as threat actors leveraging ClickFix techniques increasingly target macOS users with infostealers

SOPHOS

For example: in Dec 2025, we observed a ClickFix campaign that leveraged shared ChatGPT conversations containing malicious links, leading to MacSync infections.

A more recent campaign, in February, featured an updated MacSync variant – a multistage loader-as-a-service model, using shell-based loaders, API key-gated C2 infrastructure, dynamic AppleScript payloads, and aggressive in-memory execution.

Shell-based implementations provide threat actors with greater effectiveness and evasive capabilities, compared to native MachO binaries.

ClickFix is an increasingly common social engineering technique, which threat actors use to trick users into installing malicious software on their devices. Historically, it’s been aimed at Windows users – but recently we’ve seen three ClickFix campaigns targeting macOS users.

These campaigns, which involve the MacSync infostealer, suggest that approaches and tactics are evolving – possibly in response to investigation and disruption efforts, but also perhaps reflecting wider social and technological trends.

The 2026 Sophos Active Adversary Report is out — and despite the hype, we saw no AI-driven sea change in the threat landscape, based on the 600+ IR and MDR cases that made up our dataset. Attackers mostly stuck with what already works.

Abuse of legitimate tools remained consistent, as did the lack of blocking categories of tools that are known to be routinely abused.

Missing telemetry continued to make it difficult for blue teamers to spot the signal in the noise, and an ongoing lack of phishing-resistant multifactor authentication (MFA) gave the criminals a quiet way in.

The most concerning change has been years in the making: The dominance of identity-related root causes — brute-force attacks, phishing, and other compromised-credential tactics — for successful initial access.

This constellation of tactics leverages weaknesses that can’t be addressed by simple patch hygiene and occasionally acts as a bonus multiplier for attacks in progress.

Key takeaways:

1️⃣ GenAI adds speed, volume, and noise to the threat landscape… but for now, that’s about it.

2️⃣ Identity-related tactics such as compromised credentials, brute-force attacks, and phishing, are by far the most common reason attackers gain initial access.

3️⃣ Attackers have made few changes to specific tools, tactics, or procedures — though one weird blocking trick may make a huge difference for many enterprises.

4️⃣ Saving money by minimizing telemetry collection might be penny-wise, but it’s definitely pound-foolish.

5️⃣ Prevention still beats detection, both in outcomes and in time and effort spent defending.

Read the report here: https://www.sophos.com/en-us/blog/2026-sophos-active-adversary-report

Nowhere, man: The 2026 Active Adversary Report

AI headline hype didn’t deliver a sea change for practical defense — but one below-the-radar development should.

In September 2025, Sophos Managed Detection and Response (MDR) teams identified a malvertising campaign distributing an infostealer dubbed TamperedChef – believed to be part of a wider campaign known as EvilAI.

Previous coverage of this campaign suggests it began on June 26, 2025, with many of the associated websites being registered or first identified on that date. The sites were promoting a trojanized PDF editing application called AppSuite PDF Editor via Google Ads.

This application appeared legitimate to users, but silently deployed an infostealer upon installation, targeting Windows devices.

Although there was a significant proportion of victims in Germany and the UK, it likely reflects the campaign’s widespread global reach, rather than any deliberate targeting of specific regions; we identified 19 countries affected in total.

This large, multi-layered distribution network featured a delayed activation/dormancy period, decoy software, staged payload delivery, abuse of code-signing certificates, and efforts to evade endpoint protection mechanisms.

Users who installed AppSuite PDF Editor should consider any credentials stored in their browsers to be compromised.

Threat actors are well aware that malvertising can be a fruitful and effective infection vector. It’s very possible that the adversaries behind TamperedChef, and others, will cook from a similar recipe in the future.

Read the full article here: https://www.sophos.com/en-us/blog/tamperedchef-serves-bad-ads-with-infostealers-as-the-main-course

TamperedChef serves bad ads, with infostealers as the main course

Sophos X-Ops explores a malvertising campaign that leverages Google Ads to distribute an infostealer

We’ve recently observed an increase in a malicious threat actor campaign leveraging GoTo LogMeIn installers distributed via phishing emails. X-Ops’ Labs and MDR teams are currently huddling on an investigation that’s delivering some interesting detection twists.

The trouble starts, as trouble often does, with phishing emails. We’ve seen a wide variety in this investigation so far, from invitations spoofing well-known event-planning sites to unostentatious requests for bids on construction projects.

It got interesting when we looked at the installer itself. GoTo is of course a legitimate enterprise; our investigation found that the installer involved in these attempts is in fact legitimately signed with a valid certificate. That means it’s not simply a matter of flagging any LogMeIn installer as malicious or potentially unwanted.

The X-Ops team is closely monitoring the attacks abusing LogMeIn installers and is updating protection logic as needed, focusing on quick response to new indicators as well as developing proactive behavioral protection strategies. We’ll keep you posted.

In a new blog post out today, we discuss the pros and cons of phishing simulations, and our own philosophy and approach at Sophos. We also provide ten tips for organizations when planning simulations (full details in the article, link below):

  • Find the right cadence
  • Pretexts should be realistic, but not unreasonable.
  • Reinforce positive behaviors rather than trying to catch people out.
  • Prioritize reports (and speed) over clicks.
  • Look beyond the click.
  • Doing nothing helps no one.
  • Complement simulations with novels forms of learning.
  • Use them to train security teams as well as end users.
  • Include everyone.
  • Build systems tolerant to human failure.
  • Read the full article here: https://news.sophos.com/en-us/2025/10/31/phake-phishing-phundamental-or-pholly/

    Phake phishing: Phundamental or pholly?

    Debates over the effectiveness of phishing simulations are widespread. Sophos X-Ops looks at the arguments for and against – and our own phishing philosophy

    Sophos News

    At Sophos, we think there is. We’ve been running internal simulations since 2019 – but, crucially, we don’t measure by failure. We measure by success.

    Click rates aren’t that helpful, because it only takes one user to click – and they frame users as potential problems rather than potential assets. Instead, our key metric is how many users report phishing emails, and how quickly.

    Why? Because reports are a highly tailored source of actionable threat intelligence. They allow us to triage, and follow an established process involving detonating attachments, looking up IOCs, threat hunting, blocking malicious domains, and clawing back emails from inboxes.

    And we don’t want users to simply delete/ignore phishing emails. That puts us behind the pace during a real attack. We don’t congratulate people for something they DIDN’T do, but for something they DID. This empowers users to be a crucial line of defence, not the ‘weakest link.’

    Our simulations are not about trying to catch users out, but training them to remember to hit Report. We frame it like this: we’re not trying to deceive people. We’re playing a game to help refresh their memory.

    Debates around the effectiveness of phishing simulations are widespread. Supporters claim they can boost learning retention rates, help train users’ instincts, reduce risk, and contribute to developing a ‘security-first’ culture.

    Detractors point to tick-box compliance, fatigue, unfair and unethical lures, punishing users who ‘fail’ phishing tests (e.g., extra-dull mandatory training, naming and shaming, disciplinary measures), and focusing on failure rather than success.

    In fact, two recent (2021 and 2025) studies suggest that phishing training makes no significant difference to susceptibility, and could, counter-intuitively, make users more susceptible (although there are some important caveats to this).

    But phishing is often the most prevalent entry mechanism for attackers. It’s cheap and easy, and generative AI may make it even easier. And threat actors know it works. So is there a way to make phishing exercises effective?

    Sophos researchers have identified real-world exploitation of a newly disclosed vulnerability in Windows Server Update Services (WSUS), where threat actors are harvesting sensitive data from organizations.

    Following public release of proof-of-concept code, attackers began abusing the flaw to steal data from exposed servers across multiple industries — including universities, technology, manufacturing, and healthcare.

    “This activity shows that threat actors moved quickly to exploit this critical vulnerability in WSUS to collect valuable data from vulnerable organizations.” — Rafe Pilling, Director of Threat Intelligence, Sophos.

    Sophos telemetry has identified six incidents so far, though the real number is likely higher.

    Organizations should apply patches promptly and review WSUS configurations to reduce the risk of exploitation.

    🔗 Read more and get the full guidance:

    https://news.sophos.com/en-us/2025/10/29/windows-server-update-services-wsus-vulnerability-abused-to-harvest-sensitive-data/

    Windows Server Update Services (WSUS) vulnerability abused to harvest sensitive data

    Exploitation of CVE-2025-59287 began after public disclosure and the release of proof-of-concept code

    Sophos News