Monday, April 28, 2025
HomeComputer SecurityNew Variant of HawkEye Sold on Hacking Forums and Distributed via Excel...

New Variant of HawkEye Sold on Hacking Forums and Distributed via Excel and DOC Files

Published on

SIEM as a Service

Follow Us on Google News

Threat actors advertised a new version of the information stealer malware kit HawkEye Reborn v9 that exfiltrates various information from the infected systems.

Talos observed the ongoing campaigns targeting organization leveraging HawkEye Reborn v9 to exfiltrate sensitive information and login credentials.

HawkEye malware kit is active since 2013, it has roboust stealing capabilities, it exfiltrates sensitive information from different applications and sends back to attackers by using FTP, HTTP, and SMTP protocols.

- Advertisement - Google News

Talos learned a change in ownership of the toolkit at the end of December 2018, after the exchange new version of the toolkit HawkEye Reborn v9 advertised by another threat actor, below is their pricing model.

HawkEye

HawkEye Campaign

The campaign found to be active since 2018 and still ongoing, the current version HawkEye Reborn v9 is heavily obfuscated and it is distributed as invoices, bills of materials, order confirmations, and other corporate functions.

With the current campaign, the malware leverages Microsoft Excel files, RTF and DOC files, file sharing platforms such as Dropbox for distributing the malware.

Another interesting characteristic of the malicious documents is that the metadata associated with the document files themselves also matches that found in many of the malicious documents that were previously being used to spread Remcos, Talos noted.

The infection starts with the malformed Excel sheets that exploit code execution vulnerability CVE-2017-11882 in Microsoft Office.

HawkEye

The malware steals information form common web browsers, Filezilla, Beyluxe Messenger, CoreFTP, video game “Minecraft, copy clipboard functions, records screen, and pictures from webcam.

HawkEye Reborn v9 includes MailPassView and WebBrowserPassView freeware tools to exfiltrate credentials.

Indicators of Compromise

You can hashes for Email attachments here and PE32 executables here.

Domains associated 
tfvn[.]com[.]vn
shirkeswitch[.]net
guideofgeorgia[.]org
gulfclouds[.]site
jhssourcingltd[.]com
kamagra4uk[.]com
pioneerfitting[.]com
positronicsindia[.]com
scseguros[.]pt
spldernet[.]com
toshioco[.]com
www[.]happytohelpyou[.]in

IP addresses associated
112.213.89[.]40
67.23.254[.]61
62.212.33[.]98
153.92.5[.]124
185.117.22[.]197
23.94.188[.]246
67.23.254[.]170
72.52.150[.]218
148.66.136[.]62
107.180.24[.]253
108.179.246[.]138
18.221.35[.]214
94.46.15[.]200
66.23.237[.]186
72.52.150[.]218

URLs
https[:]//a[.]pomf[.]cat/
http[:]//pomf[.]cat/upload[.]php

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Miner Malware Uses Multiple Propagation Methods to Infect Windows Machines and to Drop Monero Miner

Two Hackers of Bayrob Malware Gang Convicted for Infecting more than 400,000 Computers Worldwide

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Rack Ruby Framework Vulnerabilities Let Attackers Inject and Manipulate Log Content

Researchers Thai Do and Minh Pham have exposed multiple critical vulnerabilities in the Rack...

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Rack Ruby Framework Vulnerabilities Let Attackers Inject and Manipulate Log Content

Researchers Thai Do and Minh Pham have exposed multiple critical vulnerabilities in the Rack...

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...