Sunday, April 13, 2025
Homecyber securityLARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

Published on

SIEM as a Service

Follow Us on Google News

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618 organizations globally since June 2024, leveraging advanced social engineering techniques to steal credentials and deploy ransomware.

According to reports from cybersecurity firms CATALYST and Prodaft, the group has demonstrated a high level of sophistication in its operations, targeting corporate networks through spear-phishing campaigns that utilize smishing (SMS phishing) and vishing (voice phishing).

Sophisticated Social Engineering Tactics Exploited

LARVA-208’s modus operandi involves impersonating IT personnel to deceive employees into divulging VPN credentials or installing Remote Monitoring and Management (RMM) software such as AnyDesk, TeamViewer, or Atera.

- Advertisement - Google News

The attackers have registered over 70 domain names mimicking popular VPN services like Cisco AnyConnect, Palo Alto GlobalProtect, and Fortinet to enhance the credibility of their phishing campaigns.

By harvesting one-time passcodes (OTPs) during real-time interactions, the group bypasses multifactor authentication (MFA) measures and redirects victims to legitimate login pages to avoid suspicion.

Once access is gained, LARVA-208 deploys custom-developed PowerShell scripts to install information-stealing malware such as StealC, Rhadamanthys, and Fickle Stealer.

LARVA-208
Attack flow showing LARVA-208 obtaining Microsoft account information.

According to Catalyst, these tools extract sensitive data, including browser-stored credentials, session cookies, and system information.

The stolen data is exfiltrated to Command-and-Control (C2) servers controlled by the attackers.

Additionally, the group targets cryptocurrency wallets and password managers, further amplifying the impact of their attacks.

The final stage of LARVA-208’s operations involves deploying ransomware payloads to encrypt files on compromised systems.

The group’s proprietary ransomware, Locker.ps1, utilizes AES encryption to lock files and appends a “.crypted” extension.

Victims are left with a ransom note instructing them to contact the attackers via Telegram for payment in cryptocurrency.

LARVA-208
The ransom note left on the victim device after the encryption process is finished.

The group has also been linked to other ransomware strains such as RansomHub and BlackSuit.

Ransomware Deployment Causes Widespread Operational Disruptions

In some cases, LARVA-208 exploits vulnerabilities in Microsoft Teams links by abusing open redirect parameters on Microsoft’s domains.

This allows them to intercept user credentials without creating fake login pages.

The group’s reliance on bulletproof hosting providers for phishing sites further complicates takedown efforts.

The scale of these breaches has resulted in significant operational disruptions for affected organizations.

Experts warn that LARVA-208 exemplifies the growing sophistication of cyber threats targeting high-value entities.

By combining advanced obfuscation techniques with tailored social engineering tactics, the group has demonstrated remarkable efficacy in evading detection and compromising critical systems.

Cybersecurity firms emphasize the need for enhanced awareness and robust security measures to counteract such threats.

As LARVA-208 continues its campaigns, organizations must remain vigilant against evolving attack vectors designed to exploit human vulnerabilities and technical defenses alike.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...