Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

How printed electronics from Tampere Uni is building a sustainable future

How Samsung Knox prevents network security breaches

Puragen unveils PFAS treatment technology during UK ministerial visit

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Storm-0249 Using ClickFix, Fileless PowerShell, and DLL Sideloading to Escalate Ransomware Attacks
Identity

Storm-0249 Using ClickFix, Fileless PowerShell, and DLL Sideloading to Escalate Ransomware Attacks

userBy userDecember 9, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 9, 2025Ravi LakshmananRansomware/Endpoint Security

The threat actor known as Storm-0249 may be moving from its role as an initial access broker to a combination of more sophisticated tactics such as domain spoofing, DLL sideloading, and fileless PowerShell execution to facilitate ransomware attacks.

“These techniques allow them to evade defenses, penetrate networks, maintain persistence, and operate undetected, raising serious concerns for security teams,” ReliaQuest said in a report shared with The Hacker News.

Storm-0249 is the nickname assigned by Microsoft to an early access broker that has sold a foothold into its organization to other cybercrime groups, including ransomware and extortionists like Storm-0501. This was first noticed by the tech giant in September 2024.

cyber security

Then, earlier this year, Microsoft also revealed details of a phishing campaign run by the attacker. The campaign leveraged tax-related themes to target users in the United States ahead of tax filing season and infected them with the Latrodectus and BruteRatel C4 (BRc4) post-exploit frameworks.

The ultimate goal of these infections is to gain persistent access to various enterprise networks and monetize them by selling them to ransomware gangs, making them readily available to targets and accelerating the pace of such attacks.

ReliaQuest’s latest findings signal a change in tactics. Storm-0249 uses the infamous ClickFix social engineering tactic to hack Windows under the pretext of resolving technical issues.[ファイル名を指定して実行]It tricks potential targets into executing malicious commands through dialogs.

In this case, the copied and executed command leverages the legitimate “curl.exe” to fetch a PowerShell script from a URL that mimics a Microsoft domain, giving the victim a false sense of trust (“sgcipl”)[.]com/us.microsoft.com/bdo/”) and run fileless via PowerShell.

This executes a malicious MSI package with SYSTEM privileges and drops a trojanized DLL associated with SentinelOne’s endpoint security solution (‘SentinelAgentCore.dll’) into the user’s AppData folder along with the legitimate ‘SentinelAgentWorker.exe’ executable.

The idea is to sideload a malicious DLL when the ‘SentinelAgentWorker.exe’ process starts, thereby making the activity undetectable. The DLL then establishes encrypted communication with a command and control (C2) server.

Storm-0249 has also been observed leveraging legitimate Windows administrative utilities such as reg.exe and findstr.exe to extract unique system identifiers such as MachineGuid, laying the foundation for subsequent ransomware attacks. The use of living-off-the-land (LotL) tactics and the fact that these commands are executed under the trusted “SentinelAgentWorker.exe” process means that this activity is unlikely to raise any red flags.

cyber security

This finding marks a shift from large-scale phishing campaigns to precision attacks that weaponize trust associated with signed processes to increase stealth.

“This is not just general reconnaissance, but preparation for ransomware affiliates,” ReliaQuest said. “Ransomware groups such as LockBit and ALPHV use MachineGuid to bind encryption keys to individual victim systems.”

“By tying encryption keys to MachineGuid, attackers ensure that even if defenders capture the ransomware binaries or attempt to reverse engineer the encryption algorithms, they will not be able to decrypt the files without the attacker-controlled keys.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow to streamline zero trust using the shared signals framework
Next Article Pebble founder unveils $75 AI smart ring that lets you record quick notes with the push of a button
user
  • Website

Related Posts

How Samsung Knox prevents network security breaches

February 6, 2026

Compromised dYdX npm and PyPI packages deliver wallet stealer and RAT malware

February 6, 2026

Claude Opus 4.6 discovers over 500 high-severity flaws across major open source libraries

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How printed electronics from Tampere Uni is building a sustainable future

How Samsung Knox prevents network security breaches

Puragen unveils PFAS treatment technology during UK ministerial visit

Rendezvous and close-in operations in crowded Earth orbit

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.