Thursday, February 27, 2025
Homecyber securityLARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

Published on

SIEM as a Service

Follow Us on Google News

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618 organizations globally since June 2024, leveraging advanced social engineering techniques to steal credentials and deploy ransomware.

According to reports from cybersecurity firms CATALYST and Prodaft, the group has demonstrated a high level of sophistication in its operations, targeting corporate networks through spear-phishing campaigns that utilize smishing (SMS phishing) and vishing (voice phishing).

Sophisticated Social Engineering Tactics Exploited

LARVA-208’s modus operandi involves impersonating IT personnel to deceive employees into divulging VPN credentials or installing Remote Monitoring and Management (RMM) software such as AnyDesk, TeamViewer, or Atera.

The attackers have registered over 70 domain names mimicking popular VPN services like Cisco AnyConnect, Palo Alto GlobalProtect, and Fortinet to enhance the credibility of their phishing campaigns.

By harvesting one-time passcodes (OTPs) during real-time interactions, the group bypasses multifactor authentication (MFA) measures and redirects victims to legitimate login pages to avoid suspicion.

Once access is gained, LARVA-208 deploys custom-developed PowerShell scripts to install information-stealing malware such as StealC, Rhadamanthys, and Fickle Stealer.

LARVA-208
Attack flow showing LARVA-208 obtaining Microsoft account information.

According to Catalyst, these tools extract sensitive data, including browser-stored credentials, session cookies, and system information.

The stolen data is exfiltrated to Command-and-Control (C2) servers controlled by the attackers.

Additionally, the group targets cryptocurrency wallets and password managers, further amplifying the impact of their attacks.

The final stage of LARVA-208’s operations involves deploying ransomware payloads to encrypt files on compromised systems.

The group’s proprietary ransomware, Locker.ps1, utilizes AES encryption to lock files and appends a “.crypted” extension.

Victims are left with a ransom note instructing them to contact the attackers via Telegram for payment in cryptocurrency.

LARVA-208
The ransom note left on the victim device after the encryption process is finished.

The group has also been linked to other ransomware strains such as RansomHub and BlackSuit.

Ransomware Deployment Causes Widespread Operational Disruptions

In some cases, LARVA-208 exploits vulnerabilities in Microsoft Teams links by abusing open redirect parameters on Microsoft’s domains.

This allows them to intercept user credentials without creating fake login pages.

The group’s reliance on bulletproof hosting providers for phishing sites further complicates takedown efforts.

The scale of these breaches has resulted in significant operational disruptions for affected organizations.

Experts warn that LARVA-208 exemplifies the growing sophistication of cyber threats targeting high-value entities.

By combining advanced obfuscation techniques with tailored social engineering tactics, the group has demonstrated remarkable efficacy in evading detection and compromising critical systems.

Cybersecurity firms emphasize the need for enhanced awareness and robust security measures to counteract such threats.

As LARVA-208 continues its campaigns, organizations must remain vigilant against evolving attack vectors designed to exploit human vulnerabilities and technical defenses alike.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...