Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Openai and human researchers condemn “reckless” safety culture at Elon Musk’s Xai

GM teams up with Redwood Materials to power data center with EV batteries

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses
Identity

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

userBy userJuly 16, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 16, 2025Ravi LakshmananThreat Intelligence/Vulnerability

Microsoft Teams spreads Matanbuchus 3.0 malware

Cybersecurity researchers are flagging a new variant of a known malware loader called Matanbuchus, which packs key features to enhance stealth and avoid detection.

Matanbuchus is the name given to providing Malware as a Service (MAAS) that could serve as a conduit for the payload of the next stage, such as cobalt strike beacons and ransomware.

The malware, first promoted at a Russian-speaking Cybercrime forum for a rental price of $2,500 in February 2021, has been used as part of lures like Clickfix, cheating on users who are not running legal but uncompromising sites.

Matanbuchus stands out among loaders as it is not normally spread through spam emails or drive-by downloads. Instead, it is often deployed using practical social engineering where attackers directly trick users. In some cases, it supports the type of initial access used by brokers selling entries to ransomware groups. This makes it more targeted and tailored than a typical commodity loader.

The latest version of the loader, tracked as Matanbuchus 3.0, incorporates several new features, including improved communication protocol technology, memory features, obfuscation methods, CMD and PowerShell reverse shell support, the ability to run the next stage DLL, EXE, and shellcode payload, and the ability to run the Morphisec payout.

Cybersecurity

The cybersecurity company said it observed malware in an incident earlier this month. There, we observed that an external Microsoft team spoofed IT help desks, targeting employees to initiate quick assistance for remote access and run PowerShell scripts deployed by Matambukas.

It is noteworthy that similar social engineering tactics have been adopted by threat actors associated with the operation of Black Bassarransomware.

“The victims are carefully targeted and persuaded to run a script that triggers the download of the archive,” says Morphisec CTO Michael Gorelik. “This archive contains a renamed Notepad++ Updater (GUP), a slightly modified configuration XML file, and a malicious sideload DLL representing a matumbucha thrower.”

Matanbuchus 3.0 is available for a monthly price of $10,000 for the HTTPS version and $15,000 for the DNS version.

Once launched, the malware collects system information and repeats the list of running processes to determine the existence of the security tool. It also checks the status of the process to see if it is running with administrative privileges.

It then sends the collected details to a Command and Control (C2) server to receive additional payloads in the form of an MSI installer and a portable executable. Shot persistence is achieved by setting up a scheduled task.

Cybersecurity

“It sounds simple, but Matanbuchus developers have implemented advanced techniques for scheduling tasks through the use of COM and injecting shellcode,” explained Gorelik. “The shellcode itself is interesting. It implements relatively basic API resolution (simple string comparison) and sophisticated com execution that operates on Itakservice.”

The loader is fitted with features that are invoked remotely by the C2 server, allowing you to collect a list of all running processes, running services, and installed applications.

“Matanbuchus 3.0 Malware-as-a-Service has evolved into a sophisticated threat,” says Gorelik. “This updated version introduces advanced techniques such as Communication Protocols, InMemory Stealth, enhanced obfuscation, WQL queries, CMD, and PowerShell inverse shell support.”

“The ability of a loader to handle regsvr32, rundll32, msiexec, or hollow commands highlights its versatility, resulting in a major risk to a compromised system.”

As malware as a service evolves, Matanbuchus 3.0 fits the broader trend of stealth first loaders relying on Lolbins (Living-The-Land-The-Land Binaries), Com Object Hijacking, and Powershell Stagers, staying under the radar.

Threat researchers are increasingly mapping these loaders as part of their attack surface management strategies and linking them to the abuse of enterprise collaboration tools such as Microsoft Teams and Zoom.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGMC Hummer Ev surpassed Tesla Cybertruck’s last quarter
Next Article GM teams up with Redwood Materials to power data center with EV batteries
user
  • Website

Related Posts

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

July 16, 2025

Fully patched Sonic Wall SMA 100 Series Device with UNC6148 Backdoor of Step Rootkit

July 16, 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

July 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Openai and human researchers condemn “reckless” safety culture at Elon Musk’s Xai

GM teams up with Redwood Materials to power data center with EV batteries

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

GMC Hummer Ev surpassed Tesla Cybertruck’s last quarter

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

BREAKING: TwinH Set to Revolutionize Legal Processes – Presented Today at ICEX Forum 2025

Building AGI: Zuckerberg Commits Billions to Meta’s Superintelligence Data Center Expansion

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.