Sunday, April 6, 2025
HomeComputer SecurityHackers Used US-based Web Servers to Distribute 10 Malware Families Via Weaponized...

Hackers Used US-based Web Servers to Distribute 10 Malware Families Via Weaponized Word Documents

Published on

SIEM as a Service

Follow Us on Google News

Hackers used hosting infrastructure in the United States to host 10 malware families and distributed them through mass phishing campaigns.

The hosted malware families include five banking Trojans, two ransomware and three information stealer malware families. The malware includes familiar ones such as Dridex, GandCrab, Neutrino, IcedID, and others.

[table id=5 /]

- Advertisement - Google News

Bromium has tracked the operations so closer for a year and says, “Multiple malware families were staged on the same web servers and subsequently distributed through mass phishing campaigns.”

Cybercriminals reuse the same servers to host different malware that indicates collaboration of common entity between the malware operators.

The malware families hosted in the server but they have separation with C2 servers, which indicates one threat actor responsible for email and hosting and another for malware operations.

Malware Families & Campaigns

Attackers distribute the malware through phishing campaigns that malicious word documents and utilize the social engineering tricks to lure victims in executing the embedded VBA macro.

According to Bromium, “the malware identified primarily targets an anglophone audience because all the phishing emails and documents we examined from campaigns linked to the hosting infrastructure were written in English.”

The malware hosted servers run the default installations of CentOS and Apache HTTP, and the payloads are compiled and hosted in less than 24 hours.

All the malware are distributed with phishing emails that carry macro embedded malicious word documents that contain links pointed to malware hosted servers.

Malware Families

“63% of the campaigns delivered a weaponized Word document that was password protected, with a simple password in the message body of the email, such as ‘1234’ or ‘321’,” Bromium said.

The recent report from IBM, states that the major cybercrime groups connected together in explicit collaboration and continues to exchange their scripts, tactics, and techniques to bypass the security measures and to evade from law enforcement agencies.

You can find the IOCs in Bromium report.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a...

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a...

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...