Wednesday, April 30, 2025
HomeCyber AttackHackers Used PowerShell Modules and Hacking Tools for Remote Access & Post-Exploitation...

Hackers Used PowerShell Modules and Hacking Tools for Remote Access & Post-Exploitation to Hack Wipro

Published on

SIEM as a Service

Follow Us on Google News

India’s leading outsourcing giant, Wipro, confirmed the security breach earlier this month as the company Employees’ were subjected to very advanced phishing activity.

According to Flashpoint analysis, the attackers used many of the legitimate security applications used by penetration testers. The attackers used a remote access tool, Powerkatz, and Powersploit in the campaign.

“The ScreenConnect is a remote access tool that used to provide desktop support or for remote meetings and the Powerkatz is the PowerShell version of Mimikat used in post-exploitation. Another tool is the Powersploit, a collection of PowerShell modules used for penetration-testing engagements.”

- Advertisement - Google News

KrebsOnSecurity reported that the attackers responsible for phishing campaigns compromised more than 100 computer system and they also targeted Infosys and Cognizant.

The threat actors ultimate aim is to gain access to the portals, in multiple industries that use to manage gift card and rewards programs.

Flashpoint determines that phishing domains are used as a primary attack vector, the phishing domain hosting templates lure victims to enter their Windows usernames and passwords in order to allegedly access encrypted email.

Further investigation reveals another malware Imminent Monitor, a remote administration tool distributed through Word document. “The document contained a URL that redirected to a file hosted at flexmail[.]tv, which appeared to have been used multiple times to deliver documents and payloads in other campaigns.”

“We assess with high confidence that the threat actors are linked to the 2017 phishing campaign. Overlapping infrastructure was configured to utilize the resources of multiple servers in multiple campaigns,” said Flashpoint.

Wipro Phishing Email Image: Kerbs

The hacker group not only hit Wipro, but the campaign also targeting similar companies, according to Kerbs the campaign targets Cognizant, Infosys, Rackspace, Capgemini, and Slalom detected similar patterns of phishing attack activity faced by Wipro.

Earlier this month Wipro Spokesperson said, “We came to know of a potentially abnormal activity from our network, which was related to very few employee accounts. These employee accounts were subjected to very advanced phishing activity.”

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Hackers Abuse GitHub Service to Host Variety of Phishing Kits to Steal Login Credentials

Wipro Security Breach – Employees’ accounts Hacked Through Advanced Phishing Campaign

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

How CISOs Can Strengthen Supply Chain Security in 2025

The responsibilities of Chief Information Security Officers (CISOs) are rapidly evolving as digital transformation...

The CISO’s Guide to Effective Cloud Security Strategies

As organizations accelerate cloud adoption, CISOs face unprecedented challenges securing dynamic, multi-cloud environments. The...

Mitigating Insider Threats – A CISO’s Practical Approach

Insider threats represent one of the most challenging cybersecurity risks facing organizations today, with...

Security Policy Development Codifying NIST CSF For Enterprise Adoption

The National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) has become a...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Security Policy Development Codifying NIST CSF For Enterprise Adoption

The National Institute of Standards and Technology Cybersecurity Framework (NIST CSF) has become a...

Cato Networks macOS Client Vulnerability Enables Low-Privilege Code Execution

A critical vulnerability in Cato Networks’ widely used macOS VPN client has been disclosed,...

TheWizards Deploy ‘Spellbinder Hacking Tool’ for Global Adversary-in-the-Middle Attack

ESET researchers have uncovered sophisticated attack techniques employed by a China-aligned threat actor dubbed...