VPN Central https://vpncentral.com/ Expert VPN reviews, news, how-to, and more! Tue, 17 Mar 2026 08:50:17 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 https://vpncentral.com/wp-content/uploads/2021/01/favicon-3.png VPN Central https://vpncentral.com/ 32 32 Phishers abuse LiveChat support tools to steal sensitive data in new SaaS-based tactic https://vpncentral.com/phishers-abuse-livechat-support-tools-to-steal-sensitive-data-in-new-saas-based-tactic/ https://vpncentral.com/phishers-abuse-livechat-support-tools-to-steal-sensitive-data-in-new-saas-based-tactic/#respond Tue, 17 Mar 2026 08:50:16 +0000 https://vpncentral.com/?p=246778 A newly documented phishing campaign is abusing LiveChat-hosted pages to trick victims into handing over personal, financial, and authentication data through what looks like a legitimate support session. Cofense says the attacks use refund and order-confirmation lures, then move victims into live chat windows hosted under the lc.chat domain, where attackers harvest details in stages. […]

The post Phishers abuse LiveChat support tools to steal sensitive data in new SaaS-based tactic appeared first on VPN Central.

]]>
A newly documented phishing campaign is abusing LiveChat-hosted pages to trick victims into handing over personal, financial, and authentication data through what looks like a legitimate support session. Cofense says the attacks use refund and order-confirmation lures, then move victims into live chat windows hosted under the lc.chat domain, where attackers harvest details in stages.

The tactic matters because it changes how phishing feels to the victim. Instead of sending users straight to a fake login page, the attackers place them inside a support-style conversation that looks more personal and more trustworthy. Cofense says that real-time interaction lowers suspicion and increases the chance that victims will share sensitive information.

Cofense documented two variants. One spoofed PayPal and promised a $200 refund through a “View Transaction Details” button. The other used a generic order-confirmation lure with a “View Update” link and no visible brand until the victim clicked through. Both routes ended on LiveChat-hosted pages impersonating well-known brands.

How the attack works

In the PayPal-themed version, the victim lands in a LiveChat session that quickly pushes them toward a fake PayPal login page. Cofense says the victim enters login credentials, then submits a multi-factor authentication code sent to their phone. After that, the phishing flow asks for billing details, including payment card information and date of birth, before returning the victim to the LiveChat window with a fake refund confirmation.

Email 1 and Email 2 Body (Source – Cofense)

The Amazon-themed version uses a slightly different flow. Cofense says the page first requests the user’s email address before a supposed live agent appears. From there, the attacker asks for identity details such as a phone number, date of birth, home address, and then full payment card data, including the card number, expiration date, and CVC.

Cofense notes that the attacker language in at least one chat included misspellings and awkward phrasing, which suggests a human operator working from a script rather than a polished automated chatbot. That roughness did not stop the scam from progressing through multiple data collection stages.

Why this tactic is more dangerous than it looks

The biggest advantage for the attackers is trust transfer. Because the links use a legitimate SaaS support environment, the domain and interface may feel safer than a typical phishing page on a random site. That can make victims less cautious, especially when the lure involves a refund or a suspicious order they want to resolve quickly.

Email 2 – LiveChat Harvesting (Source – Cofense)

The tactic also helps phishers collect more than one kind of data in one session. Instead of grabbing only credentials, they can move from identity details to card data to MFA codes in a single guided conversation. That gives them a fuller victim profile and increases the chance of account takeover or payment fraud. This is an inference from Cofense’s documented multi-stage collection flow.

Key details at a glance

ItemDetail
Platform abusedLiveChat
Hosted domain used in lure flowlc.chat
Main lure themesRefund notice, order confirmation
Brands impersonatedPayPal, Amazon
Data targetedCredentials, MFA codes, personal details, payment card data
Collection methodLive chat interaction plus fake login and billing forms

The details in this table come from Cofense’s March 2026 analysis.

CC MFA and Confirmation Message (Source – Cofense)

What users and security teams should watch for

  • Be suspicious of unsolicited refund or order-confirmation emails that push you into chat instead of the brand’s official website or app.
  • Never share MFA codes, full card details, or date of birth inside a support chat opened from an email link. This advice follows directly from the collection steps Cofense observed.
  • Verify transactions by going to the official PayPal, Amazon, or merchant site yourself rather than clicking through an email.
  • Monitor for traffic to suspicious lc.chat URLs and review email security controls for SaaS-hosted phishing links. This recommendation is based on the use of LiveChat-hosted infrastructure in the campaign.

FAQ

What is new about this phishing tactic?

It uses a legitimate live support platform to make the phishing flow feel like a real customer service conversation instead of a standard fake login trap.

Which brands were impersonated?

Cofense documented PayPal-themed and Amazon-themed phishing pages in the campaign.

What information did the attackers try to steal?

The campaign targeted email addresses, phone numbers, dates of birth, home addresses, account credentials, MFA codes, and full payment card details.

Why does the lc.chat domain matter?

Because it belongs to LiveChat infrastructure, which can make phishing links look more legitimate to victims and sometimes less suspicious to basic filters. This is an inference from Cofense’s description of the tactic.

The post Phishers abuse LiveChat support tools to steal sensitive data in new SaaS-based tactic appeared first on VPN Central.

]]>
https://vpncentral.com/phishers-abuse-livechat-support-tools-to-steal-sensitive-data-in-new-saas-based-tactic/feed/ 0
Researchers decrypt Palo Alto Cortex XDR BIOC rules and expose major evasion blind spot https://vpncentral.com/researchers-decrypt-palo-alto-cortex-xdr-bioc-rules-and-expose-major-evasion-blind-spot/ https://vpncentral.com/researchers-decrypt-palo-alto-cortex-xdr-bioc-rules-and-expose-major-evasion-blind-spot/#respond Tue, 17 Mar 2026 08:45:18 +0000 https://vpncentral.com/?p=246775 Security researchers say they were able to decrypt Palo Alto Networks Cortex XDR’s preconfigured Behavioral Indicators of Compromise, or BIOC, rules and uncover a major evasion weakness inside them. InfoGuard Labs found that some rules relied on broad built-in exceptions, including one tied to the string \Windows\ccmcache, which could let common attacker actions slip past […]

The post Researchers decrypt Palo Alto Cortex XDR BIOC rules and expose major evasion blind spot appeared first on VPN Central.

]]>
Security researchers say they were able to decrypt Palo Alto Networks Cortex XDR’s preconfigured Behavioral Indicators of Compromise, or BIOC, rules and uncover a major evasion weakness inside them. InfoGuard Labs found that some rules relied on broad built-in exceptions, including one tied to the string \Windows\ccmcache, which could let common attacker actions slip past behavioral detections.

The finding did not mean attackers could disable Cortex XDR outright. The bigger issue was logic. Once the researchers decrypted the rule set, they found allowlist conditions that could be abused to bypass a large share of detections, including a demonstration that used Sysinternals ProcDump to dump LSASS memory without triggering those BIOC rules when the command line included the ccmcache path string.

InfoGuard Labs says it disclosed the issue to Palo Alto Networks in July 2025. Palo Alto later addressed the problem, and the researchers say the bypass is fixed in Cortex XDR Agent 9.1 when paired with Content version 2160, largely by removing the broad global allowlists that made the evasion possible.

What the researchers found

Palo Alto Cortex XDR uses BIOC rules to detect suspicious behavior on endpoints. Palo Alto’s own documentation says these rules cover behaviors tied to processes, registry activity, files, and network events, and that tenants automatically receive preconfigured global BIOC rules through content updates.

InfoGuard Labs says it analyzed Cortex Windows agent versions 8.7 and 8.8 during a red team engagement and traced how the encrypted rules were decrypted. According to the researchers, the decryption process depended on a hardcoded string in the agent files plus values from a plaintext Lua configuration file, which let them recover the rule set in readable form.

Once decrypted, the rule set revealed what InfoGuard described as numerous exceptions and global whitelists. The most important was a rule condition tied to the exact string \Windows\ccmcache in command-line arguments. The researchers say that condition bypassed about half of the platform’s behavioral detections.

Why the ccmcache exception matters

The exception mattered because it was simple to abuse. An attacker did not need a rare exploit or a complex loader. They only needed to append the allowlisted path string to a tool or command that would normally trigger a behavioral rule. InfoGuard’s example used ProcDump from Microsoft Sysinternals to dump LSASS memory, a well-known credential theft technique.

That does not mean every Cortex XDR protection failed at once. This issue centered on BIOC-based behavioral detections, not every possible detection layer in the product. Still, BIOC rules are a major part of Cortex XDR’s behavior-focused detection model, so a broad exception inside them created a serious blind spot. This is an inference based on Palo Alto’s own description of how BIOCs work and InfoGuard’s analysis of the evasion path.

What Palo Alto changed

InfoGuard says Palo Alto Networks fixed the issue at the end of February 2026. According to the researchers, the important fix was not stronger encryption by itself. It was the removal of the permissive global allowlists that made the bypass possible in the first place.

The researchers also say Palo Alto modified how the key generation process works, but they describe the whitelist removal as the main security improvement. They add that a single implant bypassing all rules at once is no longer possible, though they caution that attackers who study the decrypted rules may still find narrower exceptions worth abusing.

Palo Alto’s documentation confirms that Cortex XDR Agent 9.1 became available on January 25, 2026, and that global BIOC rules are delivered through content updates.

Key details at a glance

ItemDetail
ProductPalo Alto Cortex XDR
ResearcherInfoGuard Labs
Main issueDecrypted BIOC rules exposed broad evasion exceptions
Key evasion string\Windows\ccmcache
Demonstrated impactBIOC bypass during LSASS dump with ProcDump
Affected research focusCortex Windows agent 8.7 and 8.8
Reported fixAgent 9.1 with Content version 2160

Why this raises a bigger security question

This case adds to the debate around closed detection ecosystems. InfoGuard argues that hiding rule logic through encryption can create a false sense of safety if the rules themselves contain flawed assumptions or overbroad exceptions. The weakness here was not just secrecy. It was trust in hidden logic that turned out to be easier to abuse than expected.

Palo Alto’s platform does let tenants manage user-defined and global BIOC rules, disable them, copy them, and create exceptions. That flexibility is useful for tuning, but it also shows why rule design matters as much as rule confidentiality.

What defenders should do

  • Update Cortex XDR agents and content so systems run the fixed rule set described by InfoGuard.
  • Review whether operational workflows rely on path-based exceptions or broad allowlists that attackers could mimic. This recommendation follows from the evasion path InfoGuard described.
  • Test detection coverage against common living-off-the-land tools such as ProcDump, especially when arguments or paths can influence rule behavior.
  • Treat preconfigured global detections as useful starting points, not as logic that never needs validation.

FAQ

What are BIOC rules in Cortex XDR?

They are behavioral indicators of compromise that monitor process, file, registry, and network behaviors for suspicious activity.

What was the main evasion method?

InfoGuard says attackers could abuse a broad allowlist tied to the command-line string \Windows\ccmcache, which bypassed many behavioral detections.

Did the researchers break Cortex XDR encryption completely?

They say they decrypted the shipped BIOC rule set for the tested agent versions by reconstructing the key material from values present in the product files.

Is the issue fixed?

InfoGuard says Palo Alto fixed the bypass in Cortex XDR Agent 9.1 with Content version 2160 by removing the broad allowlists and changing parts of the key generation process.

The post Researchers decrypt Palo Alto Cortex XDR BIOC rules and expose major evasion blind spot appeared first on VPN Central.

]]>
https://vpncentral.com/researchers-decrypt-palo-alto-cortex-xdr-bioc-rules-and-expose-major-evasion-blind-spot/feed/ 0
New CondiBot variant and ‘Monaco’ cryptominer expand threats to network devices https://vpncentral.com/new-condibot-variant-and-monaco-cryptominer-expand-threats-to-network-devices/ https://vpncentral.com/new-condibot-variant-and-monaco-cryptominer-expand-threats-to-network-devices/#respond Tue, 17 Mar 2026 08:41:39 +0000 https://vpncentral.com/?p=246771 Two newly documented malware strains show how quickly financially motivated attackers have moved deeper into network infrastructure. Eclypsium says a new CondiBot variant and a separate cryptomining operation called Monaco were both captured on March 6, 2026, targeting Linux-based devices that include routers, IoT systems, servers, and network appliances. The larger point is not just […]

The post New CondiBot variant and ‘Monaco’ cryptominer expand threats to network devices appeared first on VPN Central.

]]>
Two newly documented malware strains show how quickly financially motivated attackers have moved deeper into network infrastructure. Eclypsium says a new CondiBot variant and a separate cryptomining operation called Monaco were both captured on March 6, 2026, targeting Linux-based devices that include routers, IoT systems, servers, and network appliances.

The larger point is not just the malware itself. It is what the malware says about the threat landscape. Network devices used to sit mostly in the crosshairs of advanced espionage actors, but Eclypsium says the same weak spots now attract botnet operators and cryptojacking crews as well.

That trend matches broader industry data. Eclypsium cites the 2025 Verizon Data Breach Investigations Report as showing an almost eightfold increase in exploitation of edge and network devices, while Google’s threat intelligence work found that nearly a quarter of zero-days exploited in 2025 targeted network and security technologies.

What Eclypsium found

Eclypsium says the first malware sample is a previously undocumented CondiBot variant, a Mirai-derived DDoS botnet designed to turn Linux systems into attack nodes. The second is Monaco, a Go-based SSH scanner and Monero cryptominer that brute-forces weak SSH credentials, compromises exposed systems, and uses them for cryptocurrency mining.

Neither sample had been previously reported on major threat intelligence platforms when Eclypsium found them. The company says that included platforms such as VirusTotal, ThreatFox, Hybrid Analysis, and ELF Digest.

Why the new CondiBot variant stands out

Eclypsium says this CondiBot sample is a generic Linux botnet agent rather than something limited to one vendor. It supports ARM, ARM5, ARM6, ARM7, MIPS, x86, and x86_64, which gives it a broad reach across vulnerable Linux-based devices.

The malware uses a layered delivery routine that cycles through wget, curl, tftp, and ftpget so it can still pull down payloads even if some tools are missing on the target system. Once active, it connects to its command server, disables reboot utilities by setting permissions to 000, manipulates the hardware watchdog, and kills competing botnets running on the same machine.

Eclypsium also found a string inside the binary labeled QTXBOT, which had not appeared in earlier Condi reporting. The researchers say this may indicate a forked variant or an internal project name used by the developers. They also noted that the sample registers 32 attack handlers, more than earlier reported Condi versions, which suggests the addition of new flood techniques or protocol variants.

Mechanism of Attack (Source – Eclypsium)

What Monaco does after it gets in

Monaco takes a different path. Eclypsium says it is written in Go 1.24.0 and acts as both an SSH scanner and a Monero cryptominer. It brute-forces exposed SSH servers across the internet, steals valid credentials, and sends them back to its command-and-control server.

The malware supports multiple architectures, including x86-64, ARM32, ARM64, and MIPS big and little endian, which lets it target servers, routers, IoT gear, and even some Juniper equipment. Eclypsium says Monaco deploys XMRig or XMRigCC to mine Monero through MoneroOcean after it compromises a host.

Eclypsium traced Monaco’s C2 infrastructure to Alibaba Cloud Singapore at 8.222.206.6. The researchers said the operator left behind open directory listings, debug builds, and default tokens, which point to relatively weak operational security.

Key details at a glance

ThreatMain roleTarget typesNotable traits
CondiBot variantDDoS botnetLinux network devices, routers, IoT, serversMirai-derived, multi-architecture, 32 attack handlers, QTXBOT string
MonacoSSH scanner and cryptominerServers, IoT devices, routers, network equipmentGo 1.24.0, brute-force SSH, steals credentials, deploys Monero miner

Why network devices keep attracting attackers

Attackers like these devices because they sit at critical points in the network and often run embedded systems that do not support standard endpoint security tools. If an attacker gains control of a router, firewall, or switch, that foothold can support persistence, traffic interception, lateral movement, or large-scale abuse for botnets and mining.

Eclypsium argues that many organizations still treat network gear as opaque infrastructure rather than as endpoints that need the same level of monitoring and security review as servers and laptops. That visibility gap is one reason these campaigns keep working.

What organizations should do

  • Audit internet-facing network devices for unknown processes, suspicious outbound connections, and signs of cryptomining activity.
  • Replace weak or default SSH credentials immediately and restrict SSH access to trusted IP ranges.
  • Keep firmware and software up to date on routers, firewalls, VPN gateways, and IoT hardware.
  • Isolate or retire end-of-life devices that no longer receive vendor patches.
  • Treat network appliances as critical assets that require active monitoring, not as blind spots outside normal endpoint security programs. This last point follows directly from Eclypsium’s broader analysis.

FAQ

What is the new CondiBot variant?

Eclypsium says it is a previously undocumented Mirai-derived DDoS botnet sample that targets a wide range of Linux devices and supports several processor architectures.

What is Monaco?

Monaco is a Go-based SSH brute-forcer and Monero cryptominer that compromises exposed systems, steals credentials, and uses infected hosts for mining.

Are these threats limited to Fortinet devices?

No. Eclypsium says the CondiBot variant is a generic Linux botnet agent that can affect vulnerable Linux devices across vendors.

Why are network devices such a big target now?

Because they sit in high-value parts of the environment and often lack deep security visibility, which makes them attractive to both advanced actors and financially motivated attackers.

The post New CondiBot variant and ‘Monaco’ cryptominer expand threats to network devices appeared first on VPN Central.

]]>
https://vpncentral.com/new-condibot-variant-and-monaco-cryptominer-expand-threats-to-network-devices/feed/ 0
Stryker confirms destructive cyberattack as Handala-linked incident disrupts global operations https://vpncentral.com/stryker-confirms-destructive-cyberattack-as-handala-linked-incident-disrupts-global-operations/ https://vpncentral.com/stryker-confirms-destructive-cyberattack-as-handala-linked-incident-disrupts-global-operations/#respond Tue, 17 Mar 2026 08:38:11 +0000 https://vpncentral.com/?p=246768 Stryker has confirmed that a March 11 cyberattack caused a global disruption to its Microsoft environment, affecting internal systems used across the company. The medical technology giant says it activated its incident response plan immediately, engaged external cybersecurity experts, and is still working to restore key business systems. The company has not publicly confirmed that […]

The post Stryker confirms destructive cyberattack as Handala-linked incident disrupts global operations appeared first on VPN Central.

]]>
Stryker has confirmed that a March 11 cyberattack caused a global disruption to its Microsoft environment, affecting internal systems used across the company. The medical technology giant says it activated its incident response plan immediately, engaged external cybersecurity experts, and is still working to restore key business systems.

The company has not publicly confirmed that tens of thousands of devices were wiped. What Stryker has confirmed is a major cyberattack with broad operational impact, including disruption to ordering, manufacturing, shipping, and internal communications. Handala has claimed responsibility, and outside researchers have linked the actor to destructive operations associated with Iran-linked activity, but some of the larger public claims about device wipe counts and data theft remain unverified by Stryker itself.

Stryker has also said it has “no indication of ransomware or malware” and believes the incident is contained. That wording matters because it suggests the company has not publicly classified the event as a conventional ransomware attack, even though security researchers tracking Handala have described the group as one that uses destructive wiping techniques.

What Stryker has confirmed

In its March 11 SEC filing, Stryker said it identified a cybersecurity incident affecting certain information technology systems that caused a global disruption to its Microsoft environment. The company said it launched an internal investigation with external support to assess and contain the threat, and warned that the incident could continue to disrupt operations until recovery is complete.

In customer updates published after the filing, Stryker said it was prioritizing restoration of customer-facing ordering and shipping systems first. It also said there was no timeline yet for full recovery, though it described core transactional systems as being on a path to recovery.

The company also stressed that its medical products remain safe to use. Stryker said connected or clinical platforms such as LIFEPAK, Mako, SurgiCount, Vocera Ease, Vocera Edge, and care.ai were unaffected because they either are not connected in the same way or run on separate infrastructure.

What is still not confirmed

Handala and some outside reports have claimed very large-scale destruction, including wipes affecting more than 200,000 devices and the theft of tens of terabytes of data. Stryker has not confirmed those figures in its SEC filing or customer updates. Reuters also reported the group’s claims, but noted that they had not been independently verified.

Reports from Arctic Wolf and Unit 42 point to possible misuse of Microsoft Intune and destructive wipe activity in Handala-linked incidents, but Stryker itself has not publicly said Intune was the initial cause or confirmed the exact wipe mechanism used in its environment.

So the strongest accurate framing is this: Stryker has confirmed a serious cyberattack with major business disruption, while researchers and the threat actor itself claim the operation involved destructive wiping. The exact device count and full scope of data loss remain publicly unconfirmed by Stryker.

Why researchers believe this was a destructive operation

Check Point says Handala Hack, also tracked as Void Manticore, is an Iranian threat actor linked to Iran’s Ministry of Intelligence and Security. Its recent campaigns have used RDP, tunneling tools such as NetBird, custom wiping tools, and manual destructive actions to damage victim environments.

Unit 42 separately warned of an increased risk of Handala-linked wiper attacks and said recent destructive operations reportedly involved phishing and abuse of administrative access through Microsoft Intune. That aligns with the pattern seen in public reporting around the Stryker case, though again, Stryker has not itself confirmed the detailed kill chain.

Operational impact on Stryker

The company told customers that the attack disrupted order processing, manufacturing, and shipping. Reuters separately reported that Stryker’s shares fell after the incident became public and noted that the company had no immediate timeline for full restoration.

Stryker employs about 56,000 people and operates in 61 countries, so even a disruption limited to its internal Microsoft environment can create major downstream effects across support, logistics, and corporate operations.

Key details at a glance

ItemWhat is confirmed
Incident dateMarch 11, 2026
Confirmed by StrykerYes
Environment affectedGlobal Microsoft environment
Ransomware confirmedNo
Malware confirmed by StrykerNo indication publicly stated
Operational disruptionYes, including orders, manufacturing, shipping
Medical product safetyStryker says products remain safe to use
Exact number of wiped devicesNot confirmed by Stryker

FAQ

Did Stryker confirm a wiper attack?

Not directly in those words. Stryker confirmed a cyberattack and major disruption, but it publicly said it had no indication of ransomware or malware. Researchers tracking Handala say the group uses destructive wiping tactics.

Did Stryker confirm tens of thousands of devices were wiped?

No. That scale of damage has appeared in threat actor claims and external reporting, but Stryker has not publicly confirmed a device wipe count.

Were patient-facing products affected?

Stryker says its medical products remain safe to use and that several named platforms were unaffected.

Who is believed to be behind the attack?

Handala claimed responsibility. Check Point and Unit 42 link Handala to Iran-linked destructive cyber activity.

The post Stryker confirms destructive cyberattack as Handala-linked incident disrupts global operations appeared first on VPN Central.

]]>
https://vpncentral.com/stryker-confirms-destructive-cyberattack-as-handala-linked-incident-disrupts-global-operations/feed/ 0
Handala Hack uses RDP, NetBird, and parallel wipers in MOIS-linked destructive intrusions https://vpncentral.com/handala-hack-uses-rdp-netbird-and-parallel-wipers-in-mois-linked-destructive-intrusions/ https://vpncentral.com/handala-hack-uses-rdp-netbird-and-parallel-wipers-in-mois-linked-destructive-intrusions/#respond Tue, 17 Mar 2026 08:32:13 +0000 https://vpncentral.com/?p=246763 An Iranian threat actor known as Handala Hack has been carrying out destructive intrusions that rely on remote desktop access, NetBird tunneling, and multiple wiping tools launched in parallel to maximize damage. Check Point Research says the group is an online persona operated by Void Manticore, also tracked as Red Sandstorm and Banished Kitten, and […]

The post Handala Hack uses RDP, NetBird, and parallel wipers in MOIS-linked destructive intrusions appeared first on VPN Central.

]]>
An Iranian threat actor known as Handala Hack has been carrying out destructive intrusions that rely on remote desktop access, NetBird tunneling, and multiple wiping tools launched in parallel to maximize damage. Check Point Research says the group is an online persona operated by Void Manticore, also tracked as Red Sandstorm and Banished Kitten, and links the actor to Iran’s Ministry of Intelligence and Security, or MOIS.

These attacks focus on disruption and destruction rather than quiet intelligence collection alone. Check Point says the group conducts fast, hands-on operations inside victim networks, then deploys several wiping methods at once so recovery becomes much harder. The company says recent activity has targeted organizations in Israel and Albania, while the group has also expanded to U.S. organizations, including medical technology giant Stryker.

The newer campaigns show several tactical changes. Check Point says the actor has started using NetBird, a legitimate peer-to-peer networking tool, to tunnel traffic inside victim environments, and has also deployed an AI-assisted PowerShell script as part of its destructive toolkit. The researchers also said the group showed weaker operational security in some cases, with activity traced directly to Iranian IP addresses instead of commercial VPN services.

How the attacks begin

Check Point says the intrusion often starts with compromised VPN credentials. The actor obtains access through brute-force attempts or supply-chain compromises involving IT service providers, then moves manually through the environment over Remote Desktop Protocol. In at least one victim network, the researchers observed five attacker-controlled machines operating at the same time, which points to an effort to spread damage as quickly as possible.

Once inside, the operators use built-in Windows tooling, credential theft, and lateral movement techniques that Check Point says have stayed fairly consistent from 2024 through 2026. The newer additions, including NetBird, fit into that same playbook by giving the attackers another way to maintain internal access and route traffic around normal controls.

Operational interconnections of Void Manticore (Source – Check Point)

What makes the destructive phase different

Check Point says Handala’s destructive phase runs several wiping methods in parallel. One of the main tools is a custom Handala Wiper distributed through Group Policy logon scripts by way of a batch file named handala.bat. The report says this wiper overwrites file contents and corrupts the Master Boot Record, which adds deeper system damage beyond ordinary file deletion.

The researchers also describe an AI-assisted PowerShell wiper that deletes files from user directories and floods logical drives with a propaganda image named handala.gif. In parallel, the attackers use VeraCrypt, a legitimate encryption tool, to lock drives and make recovery harder. They also manually delete virtual machines and individual files over RDP, a tactic that Check Point says appears in the group’s own leaked videos.

That layered approach matters because it reduces the chance that defenders can stop the attack by blocking just one payload. If one wiping path fails or gets interrupted, others may still destroy enough data to cripple the victim. That conclusion follows directly from Check Point’s description of multiple simultaneous wiping tracks.

Wiper execution of Handala Wiper (Source – Check Point)

Why NetBird stands out

NetBird is not malware. It is a legitimate networking tool, which gives the attackers a practical way to tunnel traffic through the environment while blending in with allowed software. Check Point lists NetBird as one of the newly observed tactics in these intrusions, which suggests the actor is expanding its use of dual-use tools rather than relying only on custom malware.

That trend fits Check Point’s broader assessment of Iranian cyber activity. In a separate March 2026 report, the company said MOIS-linked actors increasingly mix state-directed operations with tools, infrastructure, and access patterns borrowed from the cybercrime ecosystem.

Key details at a glance

ItemDetail
Threat actorHandala Hack
Broader clusterVoid Manticore
Other namesRed Sandstorm, Banished Kitten
Assessed sponsor linkIran’s MOIS
Main access methodsCompromised VPN credentials, RDP, supply-chain footholds
Newly highlighted toolsNetBird, AI-assisted PowerShell wiper
Destructive methodsCustom wiper, MBR corruption, VeraCrypt, manual deletion over RDP
Main targeting noted by Check PointIsrael, Albania, and recent expansion to U.S. organizations

What defenders should do

  • Enforce multi-factor authentication on VPN, remote access, and privileged accounts. Check Point explicitly recommends this because compromised remote access remains a core entry point.
  • Monitor for logins from unusual countries, strange hours, unfamiliar devices, and abnormal VPN transfer patterns.
  • Disable RDP where it is not needed, especially on systems that should never allow broad remote administration.
  • Watch closely for NetBird and other tunneling tools in environments where they are not approved.
  • Prepare for multi-tool destructive activity, not just one malware family, because Handala’s impact comes from parallel wiping and manual operator actions together. This last point is an inference from Check Point’s case descriptions.

FAQ

Who is Handala Hack?

Check Point says Handala Hack is an online persona run by Void Manticore, an Iranian threat actor affiliated with MOIS.

What is new in these attacks?

Check Point says recent operations added NetBird tunneling and an AI-assisted PowerShell wiper to a long-running destructive playbook.

Why is RDP important here?

Because the attackers use hands-on remote access to move through victim environments, trigger deletion tasks, and manually destroy assets such as virtual machines.

Are these attacks linked to real-world victims?

Yes. Check Point says the group has targeted organizations in Israel and Albania and has recently expanded to U.S. enterprises such as Stryker.

The post Handala Hack uses RDP, NetBird, and parallel wipers in MOIS-linked destructive intrusions appeared first on VPN Central.

]]>
https://vpncentral.com/handala-hack-uses-rdp-netbird-and-parallel-wipers-in-mois-linked-destructive-intrusions/feed/ 0
CamelClone spy campaign abuses public file-sharing sites and Rclone in government-focused attacks https://vpncentral.com/camelclone-spy-campaign-abuses-public-file-sharing-sites-and-rclone-in-government-focused-attacks/ https://vpncentral.com/camelclone-spy-campaign-abuses-public-file-sharing-sites-and-rclone-in-government-focused-attacks/#respond Tue, 17 Mar 2026 08:27:03 +0000 https://vpncentral.com/?p=246760 A newly documented espionage campaign called Operation CamelClone is targeting government, defense, diplomatic, and strategic-sector entities across Algeria, Mongolia, Ukraine, and Kuwait. Seqrite says the attackers use spear-phishing ZIP files disguised as official government correspondence, then rely on public file-sharing sites and the legitimate tool Rclone to steal documents and Telegram session data without using […]

The post CamelClone spy campaign abuses public file-sharing sites and Rclone in government-focused attacks appeared first on VPN Central.

]]>
A newly documented espionage campaign called Operation CamelClone is targeting government, defense, diplomatic, and strategic-sector entities across Algeria, Mongolia, Ukraine, and Kuwait. Seqrite says the attackers use spear-phishing ZIP files disguised as official government correspondence, then rely on public file-sharing sites and the legitimate tool Rclone to steal documents and Telegram session data without using a traditional command-and-control server.

What makes the operation stand out is its infrastructure model. Instead of building dedicated attacker-controlled servers, the operators host payloads on the public file-sharing site filebulldogs[.]com and move stolen files to MEGA cloud storage. That approach helps the traffic blend into ordinary internet activity and makes network-based detection harder.

Seqrite says the campaign first surfaced in late February 2026, when a suspicious ZIP file themed around Algeria’s Ministry of Housing appeared on VirusTotal. The researchers later found additional samples using Mongolia, Algeria-Ukraine cooperation, and Kuwait Air Force themed lures, which pointed to a broader intelligence-focused operation rather than an isolated phishing run.

How the CamelClone attack works

Each observed archive contained a malicious Windows shortcut file and a decoy image or document designed to look official. Seqrite says that when the victim opens the shortcut, a hidden PowerShell command runs silently, switches to the Temp directory, downloads a JavaScript file named f.js from filebulldogs[.]com, saves it locally, and executes it to continue the infection chain.

Seqrite tracks that JavaScript loader as HOPPINGANT. The file runs under Windows Script Host and launches two Base64-encoded PowerShell commands. Those commands download a decoy PDF to distract the victim, then fetch another archive named a.zip, which contains a portable copy of Rclone version 1.70.3.

After extracting Rclone, the script rebuilds a password with a simple XOR routine using the key value 56, then uses those credentials to authenticate to a MEGA account registered with an onionmail.org address. Seqrite says the malware then collects .doc, .docx, .pdf, and .txt files from the Desktop and also tries to exfiltrate Telegram Desktop session data from the tdata directory.

Why researchers see this as espionage, not routine cybercrime

Seqrite says the targeting pattern points toward intelligence collection. The victims and lure themes focused on government bodies, defense procurement, foreign affairs, diplomatic cooperation, and strategic energy-linked environments. The company says that choice of targets, plus the geopolitical themes in the decoy files, aligns more closely with spying goals than with financially motivated cybercrime.

The campaign also shows discipline in how it separates its operations. Seqrite observed the same file-sharing domain across all four campaigns, but with different upload paths such as /uploads/AVQB61TVOX/, /uploads/OKW5RN48ZJ/, and /uploads/F1OQY9GU84/. The researchers believe that separation helps the attackers run multiple parallel campaigns while reducing the chance that one takedown removes every payload at once.

Key details at a glance

ItemDetail
Campaign nameOperation CamelClone
Main targetsGovernment, defense, diplomatic, and strategic sectors
Countries named by SeqriteAlgeria, Mongolia, Ukraine, Kuwait
Initial deliverySpear-phishing ZIP archive with malicious LNK
LoaderHOPPINGANT JavaScript
Payload abuseRclone v1.70.3 used for exfiltration
Payload hostingfilebulldogs[.]com
Exfiltration destinationMEGA accounts tied to onionmail.org emails

What makes CamelClone harder to detect

The campaign avoids the classic model of malware talking to a visible C2 server. Instead, it abuses public services that defenders often allow or treat as low-priority traffic. Seqrite says this model makes pure network detection less effective because the activity looks closer to standard web downloads and cloud storage use.

The attackers also reused key technical patterns across the campaigns. Seqrite says the same XOR key, the same HOPPINGANT loader family, and the same Rclone settings appeared in the different samples. Those overlaps strongly suggest a coordinated operation rather than unrelated attacks borrowing similar lures.

What organizations should do

  • Treat unsolicited ZIP files that reference ministries, defense deals, or diplomatic cooperation as high risk.
  • Restrict or monitor LNK execution from untrusted sources.
  • Watch for PowerShell launching JavaScript or downloading files into Temp paths.
  • Monitor outbound traffic to anonymous file-sharing sites and cloud storage services such as MEGA.
  • Hunt for suspicious use of Rclone on systems where it should not normally appear. This last point follows from Seqrite’s documented use of Rclone in the campaign.

FAQ

What is Operation CamelClone?

It is a multi-region espionage campaign that Seqrite says targeted government, defense, diplomatic, and strategic-sector entities using spear-phishing archives and a file-sharing based infection chain.

How does the malware avoid traditional C2 infrastructure?

Seqrite says the attackers host payloads on filebulldogs[.]com and upload stolen data to MEGA, rather than relying on dedicated attacker servers.

Why is Rclone important in this attack?

Because the attackers use the legitimate Rclone tool to transfer stolen files to MEGA, which helps the exfiltration blend in with normal cloud activity.

What data is at risk?

Seqrite says the campaign targets documents on the Desktop, including Word files, PDFs, text files, and Telegram Desktop session data.

The post CamelClone spy campaign abuses public file-sharing sites and Rclone in government-focused attacks appeared first on VPN Central.

]]>
https://vpncentral.com/camelclone-spy-campaign-abuses-public-file-sharing-sites-and-rclone-in-government-focused-attacks/feed/ 0
RondoDox botnet expands to 174 exploits, using residential IP infrastructure at scale https://vpncentral.com/rondodox-botnet-expands-to-174-exploits-using-residential-ip-infrastructure-at-scale/ https://vpncentral.com/rondodox-botnet-expands-to-174-exploits-using-residential-ip-infrastructure-at-scale/#respond Tue, 17 Mar 2026 08:22:45 +0000 https://vpncentral.com/?p=246753 A fast-growing botnet called RondoDox has expanded into a large exploitation operation that now uses 174 different vulnerabilities and leans on residential IP infrastructure to host parts of its malware delivery chain. Bitsight says the botnet peaked at 15,000 exploitation attempts in a single day, a scale that makes it one of the more aggressive […]

The post RondoDox botnet expands to 174 exploits, using residential IP infrastructure at scale appeared first on VPN Central.

]]>
A fast-growing botnet called RondoDox has expanded into a large exploitation operation that now uses 174 different vulnerabilities and leans on residential IP infrastructure to host parts of its malware delivery chain. Bitsight says the botnet peaked at 15,000 exploitation attempts in a single day, a scale that makes it one of the more aggressive exploit-driven botnet campaigns tracked in recent months.

Bitsight first observed RondoDox in May 2025 through heavy honeypot activity. The company says the malware reuses Mirai foundations, but unlike classic Mirai, RondoDox focuses on denial-of-service attacks rather than combining scanning, propagation, and DDoS activity inside one bot binary. Instead, the operators appear to split exploitation and hosting roles across separate infrastructure.

The standout detail is the size of the exploit arsenal. Bitsight says RondoDox implemented 174 different exploits, with 148 tied to known CVEs, 15 linked to public proof-of-concept code without formal CVEs, and 11 without public proof-of-concept code at all. That is an unusually broad set for a Mirai-style threat.

Researchers also found signs that the operators track vulnerability disclosures closely. Bitsight says the botnet adopted some exploits within days of public disclosure, including React2Shell, or CVE-2025-55182, which was added on December 6, 2025, just three days after disclosure. The researchers also said they saw one case where exploitation began before a CVE was officially published.

Number of Events and Moving Average for RondoDox Exploits (Source – Bitsight)

How RondoDox changed over time

Early in its campaign, RondoDox used what Bitsight described as a shotgun approach. The operators fired multiple exploits at the same target in hopes that one would work. According to the research, the number of distinct vulnerabilities used in a single day peaked at 49 on October 19, 2025.

That strategy later shifted. By January 2026, daily use dropped to just two active vulnerabilities, which Bitsight interprets as a move toward more selective and targeted exploitation instead of broad-volume probing.

Example of the Shotgun Approach Used by RondoDox (Source – Bitsight)

Why the residential IP angle matters

One of the most unusual parts of the operation is the infrastructure split. Bitsight tracked 32 IP addresses over the observation period, with 16 used for exploitation and 16 used for hosting. The exploitation IPs mostly mapped to hosting providers that accept cryptocurrency, while many hosting IPs appeared to belong to ordinary residential internet providers in countries including the United States, Canada, Sweden, China, and Tunisia.

Bitsight says this strongly suggests the operators used compromised home or consumer devices as hosting infrastructure. Using the Groma dataset, the researchers found that four of 11 residential hosting IPs exposed potentially vulnerable services, including a UniFi Protect interface, two Control4 smart home systems, and a TCL Android TV web server.

Page Returned When IP Is Blacklisted (Source – Bitsight)

That approach gives the botnet two advantages. It makes the infrastructure look less suspicious than traditional VPS hosting, and it can complicate takedown and attribution efforts because the servers may actually be hijacked consumer devices rather than rented attacker-owned systems. This second point is an inference from Bitsight’s findings about residential ISP usage and exposed consumer services.

Key details at a glance

ItemDetail
BotnetRondoDox
First observedMay 2025
Core baseMirai-derived
Main purposeDoS attacks
Exploit count174
Peak activity15,000 exploitation attempts in one day
Infrastructure tracked32 IPs total
Hosting patternMix of crypto-friendly hosting and likely compromised residential IPs

What security teams should do

  • Patch internet-facing devices quickly, especially embedded devices and remote management interfaces.
  • Disable unused remote access services on home, branch, and edge-connected systems.
  • Watch for repeated exploitation attempts against exposed services, especially newly disclosed flaws.
  • Monitor outbound connections to suspicious hosting nodes and investigate consumer-device infrastructure where it should not exist. This detection advice partly follows from Bitsight’s infrastructure findings.
  • Review the indicators of compromise Bitsight published through its GitHub-linked materials referenced in the report.

FAQ

What is RondoDox?

RondoDox is a Mirai-derived botnet that Bitsight says focuses on denial-of-service attacks and uses a large exploit arsenal to compromise internet-exposed devices.

How many exploits does it use?

Bitsight says it uses 174 different exploits, including 148 tied to known CVEs.

Why are residential IPs important in this case?

Because Bitsight found evidence that some malware hosting infrastructure likely ran on compromised home or consumer-connected devices, which makes the operation harder to spot and disrupt.

Is RondoDox still using the same broad attack style?

Not exactly. Bitsight says the botnet moved from a broad shotgun model to a more focused approach by early 2026.

The post RondoDox botnet expands to 174 exploits, using residential IP infrastructure at scale appeared first on VPN Central.

]]>
https://vpncentral.com/rondodox-botnet-expands-to-174-exploits-using-residential-ip-infrastructure-at-scale/feed/ 0
B says that in Egypt, for example, attackers were observed using numbers formatted to resemble local mobile prefixes. https://vpncentral.com/b-says-that-in-egypt-for-example-attackers-were-observed-using-numbers-formatted-to-resemble-local-mobile-prefixes/ https://vpncentral.com/b-says-that-in-egypt-for-example-attackers-were-observed-using-numbers-formatted-to-resemble-local-mobile-prefixes/#respond Tue, 17 Mar 2026 08:17:33 +0000 https://vpncentral.com/?p=246747 Once the victim taps the link, the phishing page often checks the user agent and shows its full content only on mobile browsers. Attackers also add endings such as index.html or similar masks to make links look more convincing and help the page load correctly on phones. The pages usually present fake tracking details, a […]

The post B says that in Egypt, for example, attackers were observed using numbers formatted to resemble local mobile prefixes. appeared first on VPN Central.

]]>
Once the victim taps the link, the phishing page often checks the user agent and shows its full content only on mobile browsers. Attackers also add endings such as index.html or similar masks to make links look more convincing and help the page load correctly on phones.

The pages usually present fake tracking details, a claimed reason for failed delivery, and a request to update address data or pay a small fee. The pressure is psychological, not technical. The goal is to make the victim act before thinking.

What makes the phishing technically dangerous

Group-IB says its HTML analysis found embedded scripts that open WebSocket connections and support live credential harvesting. In practice, that means attackers can receive entered data immediately, rather than waiting for the victim to submit a form and leave the page.

The researchers also found session tracking through unique UUID tokens, which suggests organized operations that manage victims individually and at scale. That infrastructure, combined with shared IPs, registrars, and hosting overlaps, points to coordinated phishing activity rather than isolated copycat pages.

Group-IB also says the campaign shows signs linked to Darcula, a Chinese-language phishing-as-a-service platform known for large volumes of counterfeit domains and ready-made phishing templates. The company says customers can review more detail about the activity and the Darcula Pushing Kit in its threat intelligence portal.

What Group-IB found in MEA

FindingDetail
Main lureSMS delivery failure message
Common asksAddress update, handling fee, taxes, tariffs
Main targetsPostal and delivery brands, then banks, telecom, mobility, e-commerce
User focusMobile users
Data at riskPersonal details, banking credentials, card numbers, CVV, OTPs
Delivery methodPhishing links sent through SMS

Why the scam keeps working

Shipment alerts blend into daily life. If people shop online often, they already expect delivery texts, tracking updates, and occasional address checks. Criminals exploit that normal behavior and make the fake message feel just plausible enough to trigger a fast tap.

The fake domains also help. Group-IB warns that many of these campaigns use disposable or low-cost extensions such as .xyz, .sbs, .top, and .click, which lets attackers replace blocked domains quickly and keep the scam moving.

How to protect yourself

  • Do not tap shipment links from unexpected SMS messages. Go to the courier’s official website and enter the tracking number manually.
  • Treat any message demanding urgent payment or address correction as suspicious. Legitimate courier companies usually do not charge for simple redelivery or basic address updates.
  • Watch for unfamiliar domain endings such as .xyz, .sbs, .top, and .click.
  • Use mobile security tools and browser protections that can flag phishing pages and suspicious links.
  • Report scam messages to your postal operator or local cyber authority.

What businesses should do

  • Publish clear alerts when scammers impersonate your brand.
  • Strengthen domain protections and email authentication with DMARC, DKIM, and SPF. Group-IB’s post appears to contain a typo and says “SKIM,” but the standard email protocol is DKIM.
  • Work with mobile operators to filter scam SMS patterns and block impersonation attempts.
  • Offer a public verification tool so users can confirm whether a message or tracking request is legitimate.

FAQ

What is a fake shipment tracking scam?

It is a phishing scheme where victims receive a fake delivery failure text and are pushed to a bogus courier page that steals personal and financial data.

Why is MEA seeing more of these attacks?

Group-IB says the activity has grown sharply since early 2024 and surged through 2025, especially as delivery and courier services have become a routine part of daily life.

What data do the attackers want?

They target personal information, banking credentials, card numbers, CVV codes, and one-time passwords.

What is the safest response to a delivery fee text?

Do not use the link in the message. Open the courier’s official website yourself and check the shipment manually.

The post B says that in Egypt, for example, attackers were observed using numbers formatted to resemble local mobile prefixes. appeared first on VPN Central.

]]>
https://vpncentral.com/b-says-that-in-egypt-for-example-attackers-were-observed-using-numbers-formatted-to-resemble-local-mobile-prefixes/feed/ 0
IBM finds ‘Slopoly,’ likely AI-generated malware linked to Hive0163 ransomware attack https://vpncentral.com/ibm-finds-slopoly-likely-ai-generated-malware-linked-to-hive0163-ransomware-attack/ https://vpncentral.com/ibm-finds-slopoly-likely-ai-generated-malware-linked-to-hive0163-ransomware-attack/#respond Tue, 17 Mar 2026 08:11:41 +0000 https://vpncentral.com/?p=246741 IBM X-Force says it uncovered a likely AI-generated malware strain called Slopoly during a ransomware incident tied to the financially motivated threat group Hive0163. The malware appeared late in the intrusion and acted as the client side of a custom command-and-control framework, giving the attackers persistent access to an infected server for more than a […]

The post IBM finds ‘Slopoly,’ likely AI-generated malware linked to Hive0163 ransomware attack appeared first on VPN Central.

]]>
IBM X-Force says it uncovered a likely AI-generated malware strain called Slopoly during a ransomware incident tied to the financially motivated threat group Hive0163. The malware appeared late in the intrusion and acted as the client side of a custom command-and-control framework, giving the attackers persistent access to an infected server for more than a week.

The finding matters because it shows how threat actors can now use AI to create working malware faster and with less development effort. IBM says Slopoly was technically mediocre, but its structure strongly suggested AI-assisted creation, including clear variable names, detailed comments, and coding choices that looked more like machine-generated output than hand-crafted malware.

IBM linked the activity to Hive0163, a group associated with extortion, large-scale data theft, and Interlock ransomware operations. X-Force says the group already uses a broader toolset that includes NodeSnake, InterlockRAT, and the JunkFiction loader, which helps explain why Slopoly appeared as just one part of a wider attack chain rather than as a standalone weapon.

What IBM found

According to IBM, Slopoly was a PowerShell script dropped on an already infected server and stored under C:\ProgramData\Microsoft\Windows\Runtime\. It established persistence through a scheduled task named Runtime Broker, then beaconed to a remote server using static configuration values such as a session ID, mutex name, C2 URL, and beacon intervals. IBM said it could not recover the commands the attackers ran during the period when Slopoly stayed active.

IBM also said the malware called itself a “Polymorphic C2 Persistence Client,” but the script did not actually show true polymorphic behavior. That mismatch was one reason the researchers described it as more ambitious in wording than in real capability.

Redacted snippet of Slopoly script (Source – IBM)

Why IBM believes AI helped create it

IBM did not identify the exact model used to generate Slopoly, but the company said the code quality and structure pointed to a less advanced model. X-Force highlighted signs such as verbose comments, consistent error handling, descriptive variable names, and even an unused Jitter function that may have been left behind during iterative AI-assisted development.

IBM also said the variable naming suggested the model intended to build something malicious from the start, which implies any guardrails in the tool used to create the malware were bypassed or ineffective.

How the attack started

IBM says the intrusion began with a ClickFix technique. In that method, victims see a fake verification page that quietly places a malicious command in the clipboard, then tells them to open the Run dialog, paste it, and execute it. That manual action gives the attackers an easy path to launch PowerShell without needing a traditional exploit.

From there, the attack chain expanded in stages. IBM says NodeSnake arrived first as a Node.js backdoor, followed by InterlockRAT, which added web socket communication, a SOCKS5 tunnel, and a reverse shell. Slopoly came later, alongside tools such as AzCopy and Advanced IP Scanner, suggesting it served more as a persistence and operational support tool than as the initial foothold.

Simplified infection diagram (Source – IBM)

Key details at a glance

ItemDetail
Malware nameSlopoly
ResearcherIBM X-Force
Threat groupHive0163
Associated ransomwareInterlock
Malware typeLikely AI-generated PowerShell C2 client
PersistenceScheduled task named Runtime Broker
Initial access methodClickFix
Related toolsNodeSnake, InterlockRAT, JunkFiction

Why this matters beyond one case

IBM’s report lines up with a broader industry view that attackers have started using AI across different stages of cybercrime. Palo Alto Networks’ 2026 Unit 42 Global Incident Response Report says threat actors remain in the early stages of AI-enabled tradecraft, but the impact is already visible across reconnaissance, social engineering, scripting, troubleshooting, and extortion workflows.

That does not mean AI-generated malware is suddenly more advanced than traditional malware. IBM made the opposite point in this case. Slopoly was not especially sophisticated, but it proved that capable attackers can use AI to shorten development time and add custom tooling to a live ransomware operation.

C2 panel displayed on plurfestivalgalaxy[.]com (Source – IBM)

What defenders should do

  • Watch for ClickFix-style lures that push users to paste commands into the Run dialog or PowerShell.
  • Monitor scheduled task creation, especially suspicious tasks such as Runtime Broker in unusual paths.
  • Hunt for IBM’s published indicators, including the reported Slopoly C2 infrastructure.
  • Use behavior-based detection, not just signature-based tools, since AI-assisted malware can change quickly and may not match known patterns.
  • Review user training around fake verification pages and clipboard-based social engineering.

FAQ

What is Slopoly?

Slopoly is the name IBM X-Force gave to a likely AI-generated PowerShell malware client discovered during a Hive0163 ransomware attack.

Was the malware highly advanced?

No. IBM described it as technically mediocre, even though it still proved useful for persistence and command-and-control during a real intrusion.

How did the attackers get in?

IBM says the intrusion started with a ClickFix social engineering trick that pushed the victim to run a malicious command manually.

Why is the AI angle important?

Because it shows attackers can use AI to speed up malware creation and adapt custom tools during ransomware operations, even when the code itself is not highly sophisticated.

The post IBM finds ‘Slopoly,’ likely AI-generated malware linked to Hive0163 ransomware attack appeared first on VPN Central.

]]>
https://vpncentral.com/ibm-finds-slopoly-likely-ai-generated-malware-linked-to-hive0163-ransomware-attack/feed/ 0
Qihoo 360 shipped wildcard SSL private key inside public AI installer https://vpncentral.com/qihoo-360-shipped-wildcard-ssl-private-key-inside-public-ai-installer/ https://vpncentral.com/qihoo-360-shipped-wildcard-ssl-private-key-inside-public-ai-installer/#respond Tue, 17 Mar 2026 08:07:02 +0000 https://vpncentral.com/?p=246738 Qihoo 360 appears to have bundled a live wildcard TLS private key inside the public installer for its new AI assistant, exposing a certificate for *.myclaw.360.cn to anyone who downloaded the package. Security researcher Lukasz Olejnik publicly flagged the issue, and follow-up reporting says the certificate has since been revoked. The core problem is simple […]

The post Qihoo 360 shipped wildcard SSL private key inside public AI installer appeared first on VPN Central.

]]>
Qihoo 360 appears to have bundled a live wildcard TLS private key inside the public installer for its new AI assistant, exposing a certificate for *.myclaw.360.cn to anyone who downloaded the package. Security researcher Lukasz Olejnik publicly flagged the issue, and follow-up reporting says the certificate has since been revoked.

The core problem is simple and serious. A private key should never ship inside a public installer. If an attacker gets that key before revocation takes effect, they may be able to impersonate covered subdomains, intercept traffic in some scenarios, or stand up convincing phishing infrastructure that appears cryptographically valid.

Reports tied to the disclosure say the key sat inside the installer under an OpenClaw component archive, alongside credentials for the myclaw.360.cn environment. The leaked certificate reportedly carried the subject CN=*.myclaw.360.cn, with a validity period running from March 12, 2026 to April 12, 2027.

What was exposed

The exposed material was not just a public certificate. Reporting around the incident says the installer contained the matching private key, and modulus checks showed that the key and certificate formed a valid pair. That is what turns a bad packaging mistake into a potentially high-impact security incident.

Because the certificate was a wildcard, the scope was broader than a single host. In general, a wildcard certificate can authenticate every covered subdomain under the same namespace, which increases the blast radius of any private key leak.

Why this matters

TLS private keys are the trust anchor behind HTTPS sessions. If a production key leaks, defenders have to assume the certificate is compromised, revoke it quickly, replace it, and review the build pipeline that allowed it to leave internal systems. That is especially true when the installer was available to the public.

The incident also lands awkwardly for Qihoo 360 because the company sells security software and positioned this AI product as a safer way to use the OpenClaw ecosystem. Public discussion of the case quickly focused on that contradiction.

What Qihoo 360 has said

A company response reported by Futu News says 360 promptly revoked the certificate and argued that ordinary users would not be affected because the related service operated only on local systems. I have not independently verified that claim from a primary company post, so it should be treated as a reported company response rather than a directly confirmed public statement from Qihoo 360.

That explanation may reduce the practical risk if the certificate truly protected only a localhost-style workflow. But it does not erase the packaging failure itself, and it leaves open important questions about why a valid private key ended up inside a public build.

Key details at a glance

ItemDetail
CompanyQihoo 360
Product360 AI assistant built around OpenClaw
Exposed assetWildcard TLS private key and matching certificate
Reported domain*.myclaw.360.cn
Reported statusCertificate revoked
Main issueSensitive key material shipped in public installer

Reported details above come from public disclosure and follow-up reporting.

What security teams should watch

  • Public installers and update packages should never contain live production credentials.
  • Code signing and release pipelines need automated checks for certificates, private keys, tokens, and other secrets before release.
  • If a private key leaks, teams should revoke, replace, rotate, and investigate immediately.

FAQ

Did Qihoo 360 really leak a private key?

Public reporting and a disclosure from Lukasz Olejnik indicate that a wildcard TLS private key for *.myclaw.360.cn was included in the public installer.

Was the certificate revoked?

Reportedly yes. Futu News says 360 revoked the certificate, and another report repeated the same point. I have not found a primary public company statement through official 360 channels in the search results I reviewed.

Were ordinary users affected?

That remains less clear. A reported company response said regular users would not be affected because the service resolved to local systems, but I could not independently confirm that from a primary source.

Why is this a big deal?

Because private keys are supposed to stay secret. Once they appear in a public installer, trust in the affected certificate collapses and the release process itself comes under scrutiny.

The post Qihoo 360 shipped wildcard SSL private key inside public AI installer appeared first on VPN Central.

]]>
https://vpncentral.com/qihoo-360-shipped-wildcard-ssl-private-key-inside-public-ai-installer/feed/ 0
Fake FileZilla downloads spread RAT through stealthy multi-stage loader https://vpncentral.com/fake-filezilla-downloads-spread-rat-through-stealthy-multi-stage-loader/ https://vpncentral.com/fake-filezilla-downloads-spread-rat-through-stealthy-multi-stage-loader/#respond Tue, 17 Mar 2026 08:02:59 +0000 https://vpncentral.com/?p=246732 A new malware campaign is using fake FileZilla download pages to infect Windows users with a remote access trojan, or RAT. Researchers say the attackers bundle a legitimate copy of FileZilla with a malicious DLL, so the software appears to install normally while hidden code runs in the background. The attack does not rely on […]

The post Fake FileZilla downloads spread RAT through stealthy multi-stage loader appeared first on VPN Central.

]]>
A new malware campaign is using fake FileZilla download pages to infect Windows users with a remote access trojan, or RAT. Researchers say the attackers bundle a legitimate copy of FileZilla with a malicious DLL, so the software appears to install normally while hidden code runs in the background.

The attack does not rely on a software vulnerability. Instead, it relies on social engineering and DLL sideloading, which makes the lure more effective because victims believe they are downloading a trusted FTP client from a real-looking site. Researchers traced the campaign to a lookalike domain, filezilla-project[.]live, hosting a tampered FileZilla 3.69.5 portable package.

Once launched, the malicious package loads a rogue version.dll before Windows reaches the legitimate system library. Malwarebytes said the archive contained 918 files, but only one stood out as suspicious: version.dll, which should not appear inside a clean FileZilla portable folder.

The campaign goes beyond simple sideloading. Malwarebytes reported that the trojanized FileZilla build quietly contacts attacker-controlled servers through encrypted DNS traffic, helping the malware hide its network activity inside normal-looking HTTPS requests.

Fake FileZilla Site (Source – Alyac)

How the fake FileZilla attack works

Researchers say victims land on a fake FileZilla page that closely mimics the real project site, then download a tampered installer or archive. In the observed sample, the threat actor used a legitimate portable build of FileZilla 3.69.5 and inserted a malicious version.dll into the application folder. When the victim opens filezilla.exe, Windows loads that DLL first because of its standard search order behavior.

This gives the attacker code execution without breaking the visible app. To the user, FileZilla still opens and behaves normally, which lowers suspicion and gives the malware time to continue the infection chain.

The reporting around this campaign also describes a stealthy loader sequence that can keep later stages in memory rather than dropping obvious files to disk. That design makes detection harder for security tools that focus mainly on static files and traditional installer behavior.

FileZilla Compressed File with Malicious DLL Added (Source – Alyac)

Why this campaign matters

The biggest risk is trust abuse. FileZilla is a well-known open-source tool, so many users will not question a familiar download page or a normal-looking setup flow. That makes fake download infrastructure especially effective against home users, freelancers, developers, and IT staff who often install utilities quickly.

This campaign also fits a wider trend. Malwarebytes recently documented other cases where attackers abused trusted software brands and fake download pages to push malware, including fake 7-Zip downloads and fake productivity software installers.

Comparison of Malicious Installation File and Normal Installation File (Source – Alyac)

Key details at a glance

ItemDetail
LureFake FileZilla download site
Real software abusedFileZilla 3.69.5 Portable
Main execution trickDLL sideloading
Suspicious fileversion.dll
Reported behaviorHidden malware runs while FileZilla appears normal
Network traitEncrypted DNS traffic to attacker-controlled infrastructure

What users and admins should do

  • Download FileZilla only from the official FileZilla project site.
  • Treat lookalike domains and search-result download pages as high risk.
  • Check the FileZilla folder for unexpected files such as version.dll.
  • Monitor endpoints for DLL sideloading behavior and unusual outbound encrypted DNS activity.
  • Reinstall the software from the official source if a user downloaded FileZilla from any unofficial site.

FAQ

Was the official FileZilla site compromised?

The available reporting points to a fake lookalike domain, not the official FileZilla project website.

How does the malware start running?

It uses DLL sideloading. Windows loads the malicious version.dll from the FileZilla folder before it loads the legitimate system DLL.

Why is this hard to detect?

The app still appears to work normally, and the malware can use encrypted DNS traffic that blends into normal HTTPS activity.

What is the safest way to avoid this threat?

Download FileZilla directly from the official project website and avoid unfamiliar mirrors, ads, or lookalike pages.

The post Fake FileZilla downloads spread RAT through stealthy multi-stage loader appeared first on VPN Central.

]]>
https://vpncentral.com/fake-filezilla-downloads-spread-rat-through-stealthy-multi-stage-loader/feed/ 0
New ACRStealer variant uses syscall evasion, TLS C2, and flexible payload switching https://vpncentral.com/new-acrstealer-variant-uses-syscall-evasion-tls-c2-and-flexible-payload-switching/ https://vpncentral.com/new-acrstealer-variant-uses-syscall-evasion-tls-c2-and-flexible-payload-switching/#respond Tue, 17 Mar 2026 07:54:09 +0000 https://vpncentral.com/?p=246726 A newly documented ACRStealer variant shows a clear jump in stealth and flexibility. Security researchers say the malware now relies on low-level Windows syscalls to avoid common user-mode monitoring, uses TLS for encrypted command-and-control traffic, and can work within a delivery chain that swaps final payloads without rebuilding the full infection flow. Those changes make […]

The post New ACRStealer variant uses syscall evasion, TLS C2, and flexible payload switching appeared first on VPN Central.

]]>
A newly documented ACRStealer variant shows a clear jump in stealth and flexibility. Security researchers say the malware now relies on low-level Windows syscalls to avoid common user-mode monitoring, uses TLS for encrypted command-and-control traffic, and can work within a delivery chain that swaps final payloads without rebuilding the full infection flow. Those changes make detection harder and incident response more complex.

The latest findings come from G DATA, which analyzed samples delivered through HijackLoader and tied to the long-running PiviGames lure infrastructure. According to the researchers, ACRStealer arrives as the final payload after victims are pushed through malicious links and redirected to archives that pose as legitimate installers. G DATA said the same infrastructure has also delivered LummaStealer, which suggests the operators can rotate payloads while keeping the rest of the distribution chain intact.

Proofpoint had already linked Amatera Stealer to ACRStealer in 2025, describing it as a rebranded and actively maintained information stealer sold as malware-as-a-service. That earlier research highlighted improved evasion and the use of NTSockets and direct WoW64 syscalls. G DATA’s newer report builds on that picture and shows the malware’s continued development.

Dynamic API Resolution (Source – G Data)

What changed in this ACRStealer variant

G DATA says this version resolves functions by locating ntdll.dll through the Process Environment Block and parsing the Export Address Table, rather than leaning on the higher-level Win32 APIs that many security tools watch more closely. The malware then executes syscalls through the WoW64 transition gate, a method that can bypass user-mode hooks used by EDR products.

For network activity, the malware avoids standard Winsock APIs and instead builds an AFD endpoint path and opens it with NtCreateFile. After connecting, it completes a TLS handshake through Microsoft’s SSPI framework. G DATA said this variant used playtogga[.]com in the HTTP Host header and communicated with 157[.]180[.]40[.]106, which helped the traffic blend in with normal encrypted web sessions.

The stealer also broadens its data theft profile. Researchers said it targets browser credentials, cookies, login data, and Steam-related information, then writes stolen data to a hardcoded text file before exfiltration. The report also describes system fingerprinting that collects details such as machine GUID, username, architecture, locale, and build time.

Building AFD Endpoint with Object_Attribute Struct (Source – G Data)

Why defenders should pay attention

This is not just another browser credential stealer. The technical changes show an effort to reduce visibility at both the endpoint and network level. By mixing direct syscalls, AFD-based socket creation, and TLS-wrapped traffic, the malware removes several of the easier signals defenders often use for detection.

The delivery model matters too. G DATA said the PiviGames infection chain remained active into early 2026 and had started serving LummaStealer through a Mega-hosted Setup.exe in some cases. That means defenders cannot focus only on one payload family. They need to watch the loader, redirection chain, and infrastructure behind it.

Building AFDOpenPacketXX with TCP Ipv4 socket (Source – G Data)

Key technical details at a glance

AreaReported behavior
Initial deliveryHijackLoader through malicious PiviGames-themed distribution
EvasionDirect WoW64 syscalls, dynamic API resolution via ntdll.dll
Network methodAFD endpoint creation with NtCreateFile instead of Winsock
C2 protectionTLS handshake via Microsoft SSPI
Theft targetsBrowser data, cookies, login data, Steam credentials, system details
Infrastructure flexibilitySame chain also observed delivering LummaStealer

Indicators and defensive steps

  • Monitor for unusual use of low-level APIs such as NtCreateFile, NtOpenFile, and NtQueryDirectoryFile.
  • Hunt for suspicious AFD-based socket activity that bypasses normal Winsock telemetry.
  • Block or investigate traffic involving 157[.]180[.]40[.]106 and playtogga[.]com where appropriate.
  • Watch for HijackLoader behavior and staged malware delivered through gaming forums, social platforms, and fake software links.
  • Educate users not to open installers from unverified links shared through Discord, Reddit, Steam communities, or file-sharing redirects.

FAQ

What is new in this ACRStealer variant?

Researchers say it adds direct syscall-based evasion, TLS-protected C2 traffic, and continued use in flexible loader-based campaigns.

How does it avoid detection?

It avoids many higher-level Windows APIs and instead uses direct WoW64 syscalls plus AFD-based networking, which can reduce visibility for some security products.

What does it steal?

G DATA said the malware targets browser credentials, cookies, login data, Steam-related information, and system fingerprinting data.

Why is payload switching important?

Because the same delivery chain can push different stealers, defenders need to detect the infrastructure and loader behavior, not just one malware family.

The post New ACRStealer variant uses syscall evasion, TLS C2, and flexible payload switching appeared first on VPN Central.

]]>
https://vpncentral.com/new-acrstealer-variant-uses-syscall-evasion-tls-c2-and-flexible-payload-switching/feed/ 0
Microsoft investigates Exchange Online mailbox access outage affecting Outlook and web users https://vpncentral.com/microsoft-investigates-exchange-online-mailbox-access-outage-affecting-outlook-and-web-users/ https://vpncentral.com/microsoft-investigates-exchange-online-mailbox-access-outage-affecting-outlook-and-web-users/#respond Tue, 17 Mar 2026 07:49:19 +0000 https://vpncentral.com/?p=246724 Microsoft has confirmed an Exchange Online service incident that left some users unable to access their mailboxes through one or more connection methods on March 16. The company later said service was restored, but it is still investigating the underlying cause and plans to share more details in a post-incident report. The outage affected Exchange […]

The post Microsoft investigates Exchange Online mailbox access outage affecting Outlook and web users appeared first on VPN Central.

]]>
Microsoft has confirmed an Exchange Online service incident that left some users unable to access their mailboxes through one or more connection methods on March 16. The company later said service was restored, but it is still investigating the underlying cause and plans to share more details in a post-incident report.

The outage affected Exchange Online mailbox access rather than just a single app. According to Microsoft’s incident messaging, impacted methods included Outlook on the web, Outlook desktop, Exchange ActiveSync, and other Exchange Online connection protocols. That means the disruption could hit users across browser, desktop, and mobile access paths.

Microsoft first acknowledged the issue through its Microsoft 365 status channels, saying it was investigating reports of mailbox access failures. Later, the company said telemetry suggested the issue was no longer occurring for affected users, while engineers continued to monitor service health and verify a sustained recovery.

A later update said the problem was tied to supporting network infrastructure. Microsoft said an underlying issue in that infrastructure caused service availability degradation across Exchange Online connection methods. The company has not yet published the full root cause, but it said that explanation will appear in the post-incident report.

For business customers, the incident mattered because Exchange Online sits at the center of daily email and calendar workflows. Even a partial outage can disrupt shared mailboxes, mobile sync, web access, and desktop productivity across departments. Microsoft advises administrators to monitor the Service health page in the Microsoft 365 admin center for incident timelines, impact details, and recovery updates.

What happened

DetailWhat Microsoft said
Affected serviceExchange Online
Main issueSome users could not access their mailbox
Affected methodsOutlook on the web, Outlook desktop, Exchange ActiveSync, and other Exchange Online protocols
Public statusService restored
Ongoing workMicrosoft is still investigating the full root cause

What IT admins should do now

  • Check Microsoft 365 admin center under Health > Service health for the latest incident notes.
  • Confirm which access paths failed in your tenant, such as Outlook on the web, desktop Outlook, or mobile sync.
  • Tell users whether the issue has been restored and ask them to retry sign-in before opening new support cases.
  • Record the impact window for internal reporting, SLA tracking, or support review.

Why this outage drew attention

The incident did not appear limited to one app or one client type, which made it more disruptive than a narrow Outlook bug. Reports pointed to problems across multiple Exchange Online connection methods, and separate Microsoft 365 web access issues were also under investigation around the same time, including Office.com and some Copilot web sign-in pages.

Microsoft has already dealt with other Exchange Online disruptions in recent months, including earlier incidents involving mailbox access and client connectivity. That wider pattern will likely keep admins focused on incident response, fallback access methods, and Microsoft’s post-incident findings once the company publishes them.

FAQ

What was the Exchange Online outage about?

Microsoft said some users could not access their Exchange Online mailbox through one or more connection methods.

Was the issue resolved?

Yes. Microsoft later marked the incident as restored, while continuing to investigate the full cause.

Which apps or methods were affected?

Microsoft’s incident details said the impact included Outlook on the web, Outlook desktop, Exchange ActiveSync, and other Exchange Online protocols.

Where should admins look for updates?

Microsoft directs administrators to the Service health section in the Microsoft 365 admin center.

The post Microsoft investigates Exchange Online mailbox access outage affecting Outlook and web users appeared first on VPN Central.

]]>
https://vpncentral.com/microsoft-investigates-exchange-online-mailbox-access-outage-affecting-outlook-and-web-users/feed/ 0
Betterleaks launches as a new open-source secrets scanner for files, directories, and Git repos https://vpncentral.com/betterleaks-launches-as-a-new-open-source-secrets-scanner-for-files-directories-and-git-repos/ https://vpncentral.com/betterleaks-launches-as-a-new-open-source-secrets-scanner-for-files-directories-and-git-repos/#respond Tue, 17 Mar 2026 07:42:39 +0000 https://vpncentral.com/?p=246720 Betterleaks is a new open-source tool that scans files, directories, and Git repositories for leaked secrets such as API keys, tokens, and passwords. The project comes from Zach Rice, the original creator of Gitleaks, and positions itself as a faster drop-in replacement built for modern developer workflows. Betterleaks looks like a serious new option for […]

The post Betterleaks launches as a new open-source secrets scanner for files, directories, and Git repos appeared first on VPN Central.

]]>
Betterleaks is a new open-source tool that scans files, directories, and Git repositories for leaked secrets such as API keys, tokens, and passwords. The project comes from Zach Rice, the original creator of Gitleaks, and positions itself as a faster drop-in replacement built for modern developer workflows.

Betterleaks looks like a serious new option for teams that already use Gitleaks or want a lightweight scanner for secret exposure. According to the official launch announcement, it keeps compatibility with older Gitleaks CLI options and configs while adding new detection and validation features.

That matters because secret leaks remain one of the easiest ways for attackers to gain access to cloud services, internal tools, and production systems. A scanner that fits into existing pipelines without forcing teams to rebuild workflows can lower friction and speed up adoption.

What Betterleaks is and why it exists

Betterleaks did not appear out of nowhere. In the official announcement, Rice says he built it after losing administrative control over the original Gitleaks repository, which pushed him to start fresh and build what he describes as a better open-source secrets scanner. He also says he joined Aikido Security as Head of Secrets Scanning, while Betterleaks remains open-source and supported by Aikido.

The project launched under the MIT license and focuses on scanning Git repos, files, and input passed through standard input. The GitHub page describes Betterleaks as a tool for detecting secrets like passwords, API keys, and tokens across repositories and files.

What Betterleaks adds over older secrets scanners

The official launch post says Betterleaks ships as a drop-in replacement for Gitleaks, but it does more than keep command compatibility. Aikido says the first release includes token efficiency detection, rule-defined validation, support for default encoding detection, a pure Go architecture, and parallelized Git scanning.

One of the more notable claims involves token efficiency scanning. The launch post says Betterleaks uses a technique based on BPE tokenization rather than standard entropy to identify likely secrets, and it reports a 98.6 percent recall rate for that method.

Validation also looks more flexible. Aikido says Betterleaks uses CEL, or Common Expression Language, to define validation logic, which should make it easier for contributors to add support for new providers without rebuilding deeper parts of the engine.

The project also skips CGO and Hyperscan dependencies. That pure Go approach should make deployment easier in varied environments, especially for teams that want a scanner they can move across developer laptops, CI jobs, and containers with less setup overhead.

Gitleaks Becomes the Most Popular Secrets Scanner on GitHub (source: aikido)

Betterleaks at a glance

FeatureWhat the official announcement says
CompatibilityExisting Gitleaks CLI options and configs should work
DetectionUses token efficiency scanning based on BPE tokenization
ValidationUses CEL-based rule-defined validation
PerformanceAdds parallelized Git scanning
PortabilityBuilt in pure Go without CGO or Hyperscan
Data handlingCan detect secrets hidden behind default encoding layers

Source: Aikido Security launch post.

Why this could matter for AI-assisted coding

Aikido explicitly frames Betterleaks as a tool for the agentic era. The launch post says AI coding environments such as Claude Code, Codex, and Cursor often rely on CLI tools to retrieve targeted information efficiently, and Betterleaks can fit into those flows as a scanning utility for generated code or bug bounty workflows.

That angle gives Betterleaks a timely pitch. More teams now use AI tools to write, refactor, and move code quickly. When code moves faster, the risk of accidentally exposing credentials also rises. A secrets scanner that works well in automated and AI-heavy workflows could appeal to both security teams and developers.

Governance and backing

Aikido says Betterleaks remains independent and open-source even though the company sponsors development. The launch post also says the project uses a multi-maintainer model, with contributors who have experience at organizations including Red Hat, Amazon, and RBC.

That shared governance model may help reassure users who worry about project continuity. Open-source security tools often gain trust when maintenance does not depend on a single person.

What comes next

Aikido’s published roadmap for Betterleaks v2 includes broader scanning sources, LLM-assisted secret classification using anonymized data, auto-revocation of exposed credentials through provider APIs, permissions mapping, more performance work, and a flatter CEL-based configuration system with backward compatibility.

Those features are still future-facing, so teams should judge Betterleaks first on what it offers today rather than what may arrive later. Still, the roadmap shows that the project aims to become more than a basic scanner.

Key takeaways

  • Betterleaks is a new open-source secrets scanner from the creator of Gitleaks.
  • It scans files, directories, Git repositories, and stdin for exposed secrets.
  • The project claims drop-in compatibility with existing Gitleaks configs and CLI options.
  • Officially announced features include BPE-based token efficiency detection, CEL-based validation, pure Go portability, and parallel Git scanning.
  • Aikido supports the project, but the scanner remains open-source under the MIT license.

FAQ

What is Betterleaks?

Betterleaks is an open-source secrets scanner that looks for exposed credentials such as passwords, tokens, and API keys in files, directories, Git repositories, and stdin.

Who created Betterleaks?

The project comes from Zach Rice, the original creator of Gitleaks, according to the official launch post.

Can Betterleaks replace Gitleaks?

The official announcement says it is a drop-in replacement, so existing Gitleaks CLI options and configs should continue to work.

Is Betterleaks open-source?

Yes. The project is available on GitHub and uses the MIT license.

What makes Betterleaks different?

Its headline features include token efficiency detection based on BPE tokenization, CEL-based validation rules, pure Go deployment, and parallelized Git scanning.

The post Betterleaks launches as a new open-source secrets scanner for files, directories, and Git repos appeared first on VPN Central.

]]>
https://vpncentral.com/betterleaks-launches-as-a-new-open-source-secrets-scanner-for-files-directories-and-git-repos/feed/ 0
Konni hackers hijack KakaoTalk accounts to spread malware in multi-stage phishing attacks https://vpncentral.com/konni-hackers-hijack-kakaotalk-accounts-to-spread-malware-in-multi-stage-phishing-attacks/ https://vpncentral.com/konni-hackers-hijack-kakaotalk-accounts-to-spread-malware-in-multi-stage-phishing-attacks/#respond Tue, 17 Mar 2026 07:33:12 +0000 https://vpncentral.com/?p=246714 A North Korea-linked threat group known as Konni has been caught using a multi-stage phishing campaign that starts with targeted emails and then turns compromised KakaoTalk accounts into malware delivery channels. The campaign, documented by South Korea’s Genians Security Center, used decoy documents, malicious LNK shortcut files, PowerShell, and several remote access trojans to move […]

The post Konni hackers hijack KakaoTalk accounts to spread malware in multi-stage phishing attacks appeared first on VPN Central.

]]>
A North Korea-linked threat group known as Konni has been caught using a multi-stage phishing campaign that starts with targeted emails and then turns compromised KakaoTalk accounts into malware delivery channels. The campaign, documented by South Korea’s Genians Security Center, used decoy documents, malicious LNK shortcut files, PowerShell, and several remote access trojans to move from one victim to the next.

The most important part of this campaign is what happens after the initial infection. The attackers did not stop at stealing data from the first victim. Genians says they also abused the victim’s KakaoTalk PC session to send malicious files to selected contacts, which made the second wave of attacks look far more trustworthy.

That matters because KakaoTalk remains one of the most widely used messaging platforms in South Korea, so a file that arrives from a known contact can look routine instead of suspicious. In this case, the social engineering appears highly targeted, with lures tied to North Korean human rights themes and recipients whose interests or work made the messages feel plausible.

How the Konni campaign works

According to Genians, the attack began with spear-phishing emails disguised as appointment notices for North Korean human rights lecturers. The messages carried an archive that contained a malicious LNK file dressed up to look like an ordinary document. When the target opened it, the file quietly launched PowerShell in the background and reached out to external infrastructure to pull down more malware.

The attackers then stayed on the infected system long enough to collect documents, user account details, and environment data. After that, they moved into the victim’s KakaoTalk PC application, selected specific contacts, and sent another malicious file disguised as a planning document related to North Korea-themed video content. That turned the original victim into a trusted relay point for the next stage of infection.

Genians says the broader operation deployed several RAT families, including EndRAT, RftRAT, and RemcosRAT, and used distributed command-and-control infrastructure tied to locations including Finland, Japan, and the Netherlands. Public reporting on the campaign also links Konni to Kimsuky or APT37-related activity, though attribution across North Korean clusters often varies by vendor.

Overall Attack Flow (Source – Genians)

Why the LNK file matters

The malicious shortcut file appears to do much more than launch a simple payload. Reporting based on the Genians analysis says the LNK executes a 32-bit PowerShell process through cmd.exe using the SysWOW64 path, which can help it blend in and potentially evade some controls. It also looks for the LNK file by size rather than name, so renaming the file does not break the infection chain.

Researchers say the shortcut then reads a hidden data block from a fixed offset inside the file and decodes it with a one-byte XOR key. The victim sees a decoy PDF, while the real attack continues in the background. The file then deletes itself, downloads a legitimate AutoIt interpreter alongside a malicious compiled AutoIt script, and creates a scheduled task that runs every minute for 365 days to maintain persistence.

That combination makes the attack harder to spot. The victim sees what looks like a normal document, while the malware hides behind common Windows components and long-lived scheduled execution. It also gives the attacker a stable foothold for reconnaissance, data theft, and lateral social engineering through KakaoTalk.

What makes this campaign more dangerous than ordinary phishing

This is not just a one-shot phishing attempt. It is a chained operation that mixes espionage, persistence, and trusted-channel abuse.

  • The first lure arrives by email and looks relevant to the target’s interests.
  • The first-stage file masquerades as a harmless document but launches PowerShell and downloads more tools.
  • The attackers remain on the machine to collect data before pivoting.
  • The victim’s KakaoTalk account becomes a new malware distribution channel.
  • Persistence comes from scheduled tasks and AutoIt-based payloads.
Distribution of Malicious Files via KakaoTalk (Source – Genians)

Key indicators from the campaign

ElementDetails
Initial lureSpear-phishing emails themed around North Korean human rights appointments
Initial payloadArchive containing a malicious LNK file disguised as a document
Execution chainLNK launches PowerShell through cmd.exe and SysWOW64
PersistenceScheduled task runs every minute for 365 days
Malware familiesEndRAT, RftRAT, and RemcosRAT
Secondary spreadHijacked KakaoTalk PC sessions used to send malicious files to contacts

What defenders should do now

Organizations that rely on email and chat workflows should treat archive attachments carrying LNK files as high risk, especially when the file icon makes the shortcut look like a document. Security teams should also monitor for unusual process chains in which LNK execution leads to cmd.exe, PowerShell, scheduled task creation, or AutoIt-related activity. These steps follow directly from the behavior described in the Genians-backed reporting.

It is also worth watching messaging apps on endpoints, especially when they suddenly begin sending files or messages outside a user’s normal behavior. In this campaign, KakaoTalk was not just incidental software on the victim machine. It became part of the attacker’s distribution mechanism.

Extracted Commands from the Malicious LNK File (Source – Genians)

Teams should also review outbound connections to unusual domains and infrastructure tied to known command-and-control operations. Genians-linked reporting says the attackers used globally distributed infrastructure, which can complicate geolocation-based filtering and make the traffic appear less suspicious at first glance.

FAQ

What is Konni APT?

Konni is a North Korea-linked threat group that multiple researchers associate with espionage activity. Recent reporting from Genians-linked coverage says it used phishing emails and hijacked KakaoTalk accounts in a new multi-stage campaign.

How did the attack start?

The campaign started with spear-phishing emails carrying an archive that contained a malicious LNK shortcut file disguised as a normal document.

Why was KakaoTalk important in this campaign?

After compromising a victim’s PC, the attackers used the person’s KakaoTalk account to send malicious files to trusted contacts, which made the next wave of attacks more convincing.

What malware did the attackers use?

Public reporting tied to the Genians investigation says the campaign used EndRAT, RftRAT, and RemcosRAT, with payloads delivered through AutoIt-based scripts.

What should security teams look for?

They should look for suspicious archive attachments with LNK files, abnormal PowerShell execution after shortcut launches, scheduled tasks created for persistence, and unusual file-sharing behavior in KakaoTalk or similar desktop messaging apps.

The post Konni hackers hijack KakaoTalk accounts to spread malware in multi-stage phishing attacks appeared first on VPN Central.

]]>
https://vpncentral.com/konni-hackers-hijack-kakaotalk-accounts-to-spread-malware-in-multi-stage-phishing-attacks/feed/ 0