Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Connecticut Town Schools are being investigated for Transgender Athlete Policy

Santa Ono rejected the University of Florida presidency amid conservative backlash

Trump Turant Truth Social Steps towards the launch of Bitcoin ETFs in New NYSE Filing

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Fake recruiters email target CFOs using legal netbird tools in six global regions
Identity

Fake recruiters email target CFOs using legal netbird tools in six global regions

userBy userJune 2, 2025No Comments6 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers have warned about a new spear phishing campaign that uses a legitimate remote access tool called NetBird, targeting chief financial officers and financial executives of banks, energy companies, insurance companies and investment companies in Europe, Africa, Canada, the Middle East and South Asia.

“In what appears to be a multi-stage phishing task, the attacker aims to deploy Netbird, a legitimate wireguard-based remote access tool, on the victim’s computer,” Trellix researcher Srini Seethapathy said in the analysis.

Activities first detected by cybersecurity companies in mid-May 2025 are not attributable to known threat actors or groups.

The starting point for the attack is Rothschild & Co. This is a phishing email that impersonates a recruiter for the company and claims it will provide “strategic opportunities” to the company. This email is designed to open PDF attachments to recipients. It’s actually a phishing link that redirects to the Firebase app host URL.

The notable thing about the infection is that the actual redirect URL is stored on the page in encrypted format, and can only be accessed after the victim resolves the Captcha validation check and ultimately leads to a ZIP archive download.

“It will be executed when you solve the puzzle [JavaScript] Seethapathy said it is “the ability to decrypt it with a hardcoded key and redirect the user to the decrypted link.”

What resides in the archive is a visual basic script (VBScript), which is responsible for getting the next stage VBScript from an external server and launching it via “wscript.exe”. This two-stage VBScript downloader gets another payload from the same server, changes it to “TR.ZIP” and extracts two MSI files from there: NetBird and OpenSSH.

The final phase involves installing two programs on the infected host, creating hidden local accounts, enabling remote desktop access, and persisting NetBird through a task scheduled to start automatically on a System restart. The malware also removes NetBird desktop shortcuts to prevent compromises from being detected by the victim.

Trellix has been active for nearly a year and identifies another redirect URL that provides the same VBScript payload, indicating that the campaign may have been around for some time.

Cybersecurity

The findings once again show that the enemy is increasingly dependent on legitimate remote access applications such as Connectwise Screenconnect, Atera, Splashtop, Fleetdeck, and Logmein.

“This attack isn’t your typical phishing scam,” Thetapathy said. “It’s well-made, targeted, subtle, designed to slip past technology and people. It’s a multi-stage attack where enemies use social engineering and defence evasion techniques to create and maintain permanent access to the victim system.”

This disclosure is consistent with the discovery of various email-based social engineering campaigns in the wild –

Attacks that abuse trusted domains related to famous Japanese Internet Service Providers (ISPs) send phishing messages from email addresses “Company@nifty[.]com “Get past email authentication checks, get past credentials that abuse Google Apps Script Development Platform, attempt harvest qualification attacks, host seemingly legitimate phishing pages, and steal Microsoft login credentials by using Microsoft-themed email lure attacks. It poses as if to display shared documents, takes victims to fake Microsoft login pages, portraying credentials via telegram bot attacks that exploit long-standing security flaws in Microsoft Office (CVE-2017-11882), hides Formbook Malware variations in fake PNG files, and provides Steal Steal Hosts from sensitive hosts.

PHAAS service lowers the bar

Findings also occurred, as Trustwave detailed the operational connections between Tycoon and Dadsec (aka Phoenix) phishing kits, highlighting the overlapping infrastructure and the use of centralized phishing infrastructure. DADSEC is a work of a threat actor tracked by Microsoft under the Moniker Storm-1575.

“The infrastructure used by DADSEC is also connected to new campaigns that leverage the Tycoon 2FA ‘Phishing-as-a-Service (PHAAS) platform,” said Cris Tomboc and King Orande of Trustwave Researchers. “The investigation into the Tycoon2FA phishing kit reveals how enemies continue to improve and expand tactics within the Service as a Phishing (PHAAS) ecosystem.”

TYCOON 2FA PHAAS Operation

The growing popularity of PHAAS services is evidenced by the advent of a new “plug and play” Chinese kit called Haoji. It is estimated that by selling advertising to third-party services, it has driven more than $280,000 in the past five months criminal transactions. It works on a subscription basis for $2,000 a year.

“Unlike legacy phishing kits, where attackers need to manually configure scripts and infrastructure, Haozi offers sophisticated, public web panels,” Netcraft said. “When an attacker purchases a server and puts its credentials in a panel, the phishing software is automatically set up and does not need to run a single command.”

“This frictionless setup is in contrast to other PHAAS tools like the AI-enabled Darcula suite, which still requires minimal command line use.”

In addition to supporting an admin panel that allows users to manage all their campaigns in one place, Haozi has found it to provide advertising space. It acts as an intermediary that connects phishing kit buyers with third-party services, such as those related to SMS vendors.

Haozi Phishing Dashboard

Another aspect that distinguishes Haozi from other kits is its dedicated after-sales telegram channel (@yuanbaoaichiyu).

“As enterprise security teams become more effective at detecting and dealing with intrusion attempts, attackers are deploying social engineering and phishing scams.

“The provision of PHAAS reduces skills floor and scale campaigns through automation and community support. These new models work more like a SaaS business than a black market hacking group with subscription pricing, customer service and product renewals.”

Cybersecurity

In an advisory published last week, Microsoft revealed how the PHAAS platform promotes enemy (AITM) qualification phishing, adopting a surge in Multi-Factor authentication (MFA).

Other techniques include device code phishing. OAuth consent phishing. Threat actors employ the Open Authentication (OAUTH) protocol and send emails with malicious consent links from third-party applications. The device participates in phishing. Here, the threat actor uses phishing links to trick the targets and allow the actor-controlled device domain binding.

Windows Maker said it observed suspected threat actors related to Russia employ third-party application messages or emails referring to future meeting invitations to provide malicious links with valid authorization codes. This technique was first documented by Volexity in April 2025.

“While both end users and automated security measures have a greater ability to identify malicious phishing attachments and links, motivated threat actors continue to rely on exploiting human behavior with persuasive lures,” said Igor Sakhnov, Corporate Vice President and Deputy CISO of Identity at Microsoft.

“Because these attacks depend on deceiving users, user training and recognition of commonly identified social engineering techniques are key to defending them.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleChina blows us up to threaten computer chip movement and student visa
Next Article “Everyone feels unsafe”: Indian military forces kill Myanmar’s rebels, border panic | Political News
user
  • Website

Related Posts

Fake Docusign, gitcode site spreads net support rats via multi-stage power shell attack

June 3, 2025

Important 10-year-old round cube webmail bug allows authenticated users to execute malicious code

June 3, 2025

Understand Helpdesk fraud and how to protect your organization

June 3, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Connecticut Town Schools are being investigated for Transgender Athlete Policy

Santa Ono rejected the University of Florida presidency amid conservative backlash

Trump Turant Truth Social Steps towards the launch of Bitcoin ETFs in New NYSE Filing

Top Startup and Tech Funding News – June 3, 2025

Trending Posts

Man Utd’s Fernandes confirms he refused to make a Saudi Arabian professional league move | Football News

June 3, 2025

US to reduce military presence in Syria and maintain only one basic operation | Syrian war news

June 3, 2025

Colombia refuses arrest warrant for a Guatemala court. Government News

June 3, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Top Startup and Tech Funding News – June 3, 2025

The Future is Forever: TwinH Revolutionizes Memory and Legacy Preservation

Microsoft has announced a new wave of layoffs just weeks after cutting 6,000 jobs

AI startup CIROOS emerges from stealth for $21 million, bringing AI “teammates” to the OPS team

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.