Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Why are AI startups selling the same stock at two different prices?

A series of government hacking tools targeting iPhones are being used by cybercriminals

Claude Code rolls out voice mode functionality

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Fake tech support spam deploys customized Havoc C2 across organization
Identity

Fake tech support spam deploys customized Havoc C2 across organization

userBy userMarch 3, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Threat hunters are cautioned as part of a new campaign in which malicious actors pose as fake IT support and offer the Havoc command and control (C2) framework as a precursor to data theft and ransomware attacks.

The intrusion, which Huntress identified last month across five partner organizations, involved the attacker using email spam as a bait, followed by a phone call from the IT desk, triggering a tiered malware delivery pipeline.

“At one organization, the attackers moved from initial access to nine additional endpoints over an 11-hour period, deploying a combination of a custom Havoc Demon payload and legitimate RMM tools for persistence,” said researchers Michael Tigges, Anna Pham, and Bryan Masters. “The speed of lateral movement strongly suggested that the end goal was data exfiltration, ransomware, or both.”

It’s worth noting that this technique is consistent with past email bombing and Microsoft Teams phishing attacks orchestrated by threat actors associated with the Black Basta ransomware operation. Although the cybercriminal group appears to have remained silent after internal chat logs were publicly leaked last year, the continued existence of the group’s strategy suggests two possible scenarios.

One possibility is that former Black Basta affiliates have moved on to other ransomware operations and are using it to launch new attacks. Another possibility is that rival threat actors employed the same strategy to conduct social engineering and gain initial access.

The attack chain begins with a spam campaign aimed at overwhelming the target’s inbox with junk email. The next step is for an attacker posing as IT support to contact the recipient and trick the recipient into allowing remote access to the machine, either through a Quick Assist session or by installing a tool such as AnyDesk to help remediate the issue.

Once access is established, the attacker wastes no time in launching a web browser and navigating to a fake landing page hosted on Amazon Web Services (AWS). The page impersonates Microsoft and instructs victims to enter their email address to access Outlook’s anti-spam rules update system and update their spam rules.

Clicking the “Update Rule Settings” button on the fake page triggers the execution of a script that displays an overlay asking the user to enter a password.

“This mechanism serves two purposes: it allows a threat actor (TA) to collect credentials, which, when combined with the required email address, provides access to the control panel. At the same time, it adds a layer of authenticity to the interaction, convincing the user that the process is genuine,” Huntress said.

The attack also relies on downloading a purported anti-spam patch, which runs a legitimate binary named “ADNotificationManager.exe” (or “DLPUserAgent.exe” and “Werfault.exe”) and sideloads a malicious DLL. The DLL payload implements defense evasion and executes the Havoc shellcode payload by spawning a thread containing a Demon agent.

At least one of the identified DLLs (‘vcruntime140_1.dll’) incorporates additional tricks to evade detection by security software using techniques such as control flow obfuscation, timing-based delay loops, and Hell’s Gate and Halo’s Gate to hook the ntdll.dll function to bypass endpoint detection and response (EDR) solutions.

“After successfully deploying the Havoc daemon to the beachhead host, the attacker began moving laterally throughout the victim’s environment,” the researchers said. “While the initial social engineering and malware delivery demonstrated some interesting techniques, subsequent hands-on activities at the keyboard were relatively straightforward.”

This involves creating a scheduled task that launches the Havoc Demon payload every time an infected endpoint is restarted, providing persistent remote access to threat actors. That said, threat actors have been found to be deploying legitimate remote monitoring and management (RMM) tools such as Level RMM and XEOX on some compromised hosts in place of Havoc, diversifying their persistence mechanisms.

The key takeaways from these attacks are that attackers are willing to impersonate IT staff and call personal phone numbers if it improves their success rates, that techniques such as defense evasion that were once limited to large corporations and state-sponsored campaigns are becoming increasingly common, and that commodity malware is customized to bypass pattern-based signatures.

Also noteworthy is the speed with which the attack progresses quickly and aggressively, from initial compromises to lateral movements, and the numerous methods used to maintain persistence.

“It begins with a call from ‘IT support’ and ends with a fully orchestrated network compromise, including a modified Havoc Demon deployed across endpoints, and a legitimate RMM tool reused as backup persistence,” Huntress concluded. “This campaign is a case study in how modern attackers are becoming more sophisticated at every step: social engineering to get in the door, DLL sideloading to remain invisible, and diverse persistence to survive remediation.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleApple unveils new MacBook Air and MacBook Pro powered by M5
Next Article Hacked traffic cameras and hijacked televisions: How cyber operations supported the war against Iran
user
  • Website

Related Posts

The 3 Steps CISOs Must Follow

March 3, 2026

Open Source CyberStrikeAI Deploys AI-Driven FortiGate Attacks in 55 Countries

March 3, 2026

AI Agents: The Next Wave of Identity Dark Matter

March 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Why are AI startups selling the same stock at two different prices?

A series of government hacking tools targeting iPhones are being used by cybercriminals

Claude Code rolls out voice mode functionality

Company X announces it will suspend creators from its revenue sharing program for unlabeled AI posts related to “armed conflict”

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.