Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Hackers associated with Epstein removed from Black Hat Cyber ​​Conference website

Automattic plans to have 10 competitors subject to royalty fees, WP Engine claims in new filing

Aurora’s driverless trucks can now travel faster and longer distances than human drivers

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses
Identity

Hackers leverage Microsoft Teams to spread Mathambuchas 3.0 malware to targeted businesses

userBy userJuly 16, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 16, 2025Ravi LakshmananThreat Intelligence/Vulnerability

Microsoft Teams spreads Matanbuchus 3.0 malware

Cybersecurity researchers are flagging a new variant of a known malware loader called Matanbuchus, which packs key features to enhance stealth and avoid detection.

Matanbuchus is the name given to providing Malware as a Service (MAAS) that could serve as a conduit for the payload of the next stage, such as cobalt strike beacons and ransomware.

The malware, first promoted at a Russian-speaking Cybercrime forum for a rental price of $2,500 in February 2021, has been used as part of lures like Clickfix, cheating on users who are not running legal but uncompromising sites.

Matanbuchus stands out among loaders as it is not normally spread through spam emails or drive-by downloads. Instead, it is often deployed using practical social engineering where attackers directly trick users. In some cases, it supports the type of initial access used by brokers selling entries to ransomware groups. This makes it more targeted and tailored than a typical commodity loader.

The latest version of the loader, tracked as Matanbuchus 3.0, incorporates several new features, including improved communication protocol technology, memory features, obfuscation methods, CMD and PowerShell reverse shell support, the ability to run the next stage DLL, EXE, and shellcode payload, and the ability to run the Morphisec payout.

Cybersecurity

The cybersecurity company said it observed malware in an incident earlier this month. There, we observed that an external Microsoft team spoofed IT help desks, targeting employees to initiate quick assistance for remote access and run PowerShell scripts deployed by Matambukas.

It is noteworthy that similar social engineering tactics have been adopted by threat actors associated with the operation of Black Bassarransomware.

“The victims are carefully targeted and persuaded to run a script that triggers the download of the archive,” says Morphisec CTO Michael Gorelik. “This archive contains a renamed Notepad++ Updater (GUP), a slightly modified configuration XML file, and a malicious sideload DLL representing a matumbucha thrower.”

Matanbuchus 3.0 is available for a monthly price of $10,000 for the HTTPS version and $15,000 for the DNS version.

Once launched, the malware collects system information and repeats the list of running processes to determine the existence of the security tool. It also checks the status of the process to see if it is running with administrative privileges.

It then sends the collected details to a Command and Control (C2) server to receive additional payloads in the form of an MSI installer and a portable executable. Shot persistence is achieved by setting up a scheduled task.

Cybersecurity

“It sounds simple, but Matanbuchus developers have implemented advanced techniques for scheduling tasks through the use of COM and injecting shellcode,” explained Gorelik. “The shellcode itself is interesting. It implements relatively basic API resolution (simple string comparison) and sophisticated com execution that operates on Itakservice.”

The loader is fitted with features that are invoked remotely by the C2 server, allowing you to collect a list of all running processes, running services, and installed applications.

“Matanbuchus 3.0 Malware-as-a-Service has evolved into a sophisticated threat,” says Gorelik. “This updated version introduces advanced techniques such as Communication Protocols, InMemory Stealth, enhanced obfuscation, WQL queries, CMD, and PowerShell inverse shell support.”

“The ability of a loader to handle regsvr32, rundll32, msiexec, or hollow commands highlights its versatility, resulting in a major risk to a compromised system.”

As malware as a service evolves, Matanbuchus 3.0 fits the broader trend of stealth first loaders relying on Lolbins (Living-The-Land-The-Land Binaries), Com Object Hijacking, and Powershell Stagers, staying under the radar.

Threat researchers are increasingly mapping these loaders as part of their attack surface management strategies and linking them to the abuse of enterprise collaboration tools such as Microsoft Teams and Zoom.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGMC Hummer Ev surpassed Tesla Cybertruck’s last quarter
Next Article GM teams up with Redwood Materials to power data center with EV batteries
user
  • Website

Related Posts

Google reports state-sponsored hackers are using Gemini AI to support reconnaissance and attacks

February 12, 2026

Lazarus campaign plants malicious packages in npm and PyPI ecosystem

February 12, 2026

AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories

February 12, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Hackers associated with Epstein removed from Black Hat Cyber ​​Conference website

Automattic plans to have 10 competitors subject to royalty fees, WP Engine claims in new filing

Aurora’s driverless trucks can now travel faster and longer distances than human drivers

Google reports state-sponsored hackers are using Gemini AI to support reconnaissance and attacks

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.