Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Amazon’s AI assistant Alexa+ now works with Angi, Expedia, Square, and Yelp

Lemon Slice gets $10.5 million from YC and Matrix to build digital avatar technology

French postal and banking services disrupted by suspected DDoS attack

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Phantom stealer spread by ISO phishing email hits Russian financial sector
Identity

Phantom stealer spread by ISO phishing email hits Russian financial sector

userBy userDecember 15, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 15, 2025Ravi LakshmananMalware/Cybercrime

Cybersecurity researchers have revealed details of an active phishing campaign targeting a wide range of sectors in Russia with phishing emails delivering Phantom Stealer via malicious ISO optical disk images.

The operation, codenamed Operation MoneyMount-ISO by Seqrite Labs, primarily targets finance and accounting organizations, with organizations in the procurement, legal, and payroll sectors emerging as secondary targets.

“This campaign leverages fake payment verification lures to deliver phantom information-stealing malware through a multi-step attachment chain,” the cybersecurity firm said.

cyber security

The infection chain begins with a phishing email disguised as a legitimate financial communication, prompting recipients to check their recent bank transfers. The email comes with a ZIP archive attached that claims to contain additional details, but instead contains an ISO file that is mounted on the system as a virtual CD drive upon startup.

The ISO image (“Подтверждение банковского перевода.iso” or “Bank Transfer Confirmation.iso”) acts as an executable file designed to launch Phantom Stealer with an embedded DLL (“CreativeAI.dll”).

Phantom Stealer can extract data from cryptocurrency wallet browser extensions installed on Chromium-based browsers and desktop wallet apps, as well as grab files, Discord authentication tokens, browser-related passwords, cookies, and credit card details.

It also monitors the contents of the clipboard, records keystrokes, and performs a series of checks to detect virtual, sandbox, or analysis environments, and aborts execution if one exists. Data exfiltration occurs via Telegram bots or attacker-controlled Discord webhooks. Additionally, Stealer allows file transfer to FTP servers.

In recent months, Russian organizations, primarily human resources and payroll departments, have also been targeted by phishing emails that use baits related to bonuses and internal financial policies to deploy a previously undocumented implant named DUPERUNNER that loads the open source command and control (C2) framework AdaptixC2.

The campaign, dubbed DupeHike, is believed to originate from a threat cluster named UNG0902.

“ZIP is used as a preliminary source for a spear phishing-based infection that includes a decoy with PDF and LNK extensions, downloads the implant DUPERUNNER, and ultimately executes the Adaptix C2 Beacon,” Seqrite said.

Then, the LNK file (‘Документ_1_О_размере_годовой_премии.pdf.lnk’ or ‘Document_1_On_the_amount_of_the_annual_bonus.pdf.lnk’) is downloaded to DUPERUNNER from an external server using ‘powershell.exe’. Download. The main role of the implant is to retrieve a decoy PDF, display it, and inject it into legitimate Windows processes such as ‘explorer.exe’, ‘notepad.exe’, and ‘msedge.exe’ to launch AdaptixC2.

Other phishing campaigns targeted Russia’s financial, legal, and aerospace sectors, distributing malicious tools such as Cobalt Strike and Formbook, DarkWatchman, and PhantomRemote, which can perform data theft and keyboard operations. A compromised Russian company’s email server is used to send spear-phishing messages.

cyber security

French cybersecurity firm Intrinsec has blamed a series of intrusions targeting Russia’s aerospace industry on hacktivists aligned with Ukrainian interests. Detected between June and September 2025, this activity overlaps with Hive0117, Operation CargoTalon, and Rainbow Hyena (also known as Fairy Trickster, Head Mare, and PhantomCore).

Some of these efforts were also found to redirect users to phishing login pages hosted on InterPlanetary File System (IPFS) and Vercel aimed at stealing credentials associated with Microsoft Outlook and Russian aerospace company Bureau 1440.

“Campaigns observed from June to September 2025 […] “It is aimed at compromising entities actively collaborating with the Russian military during the current conflict with Ukraine, and is primarily assessed by sanctions imposed by Western countries,” Intrinsek said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEU signs groundbreaking agreement to tackle end-of-life vehicles
Next Article Green ammonia plant could tackle UK’s energy storage challenges
user
  • Website

Related Posts

Two Chrome extensions discovered to be secretly stealing credentials from over 170 sites

December 23, 2025

Interpol arrests 574 people in Africa. Ukrainian ransomware company pleads guilty

December 23, 2025

Google Workspace password manager tutorial

December 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Amazon’s AI assistant Alexa+ now works with Angi, Expedia, Square, and Yelp

Lemon Slice gets $10.5 million from YC and Matrix to build digital avatar technology

French postal and banking services disrupted by suspected DDoS attack

Inside Uzbekistan’s nationwide license plate monitoring system

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.