Sunday, May 18, 2025
HomeCyber Security NewsLuna Moth Hackers Use Fake Helpdesk Domains to Target Victims

Luna Moth Hackers Use Fake Helpdesk Domains to Target Victims

Published on

SIEM as a Service

Follow Us on Google News

A recent investigation by cybersecurity firm EclecticIQ, in collaboration with threat hunters, has exposed a surge in malicious activity tied to the Luna Moth hacking group.

The actors are now leveraging fake helpdesk-themed domains to impersonate legitimate businesses and steal sensitive data. This campaign, first detected in March 2025, primarily targets law firms and corporate entities.

How the Attack Works

Luna Moth’s strategy hinges on creating convincing lookalike domains designed to mimic internal IT support portals.

- Advertisement - Google News

For example, a company named “Vorys” might be targeted with a domain like vorys-helpdesk[.]com. The hackers then use phishing emails or compromised accounts to direct victims to these domains, where login credentials or financial data are harvested.

Key characteristics of the fraudulent domains include:

  1. Naming Conventions: Domains often follow the regex pattern ^[a-z]{1,}-help(desk){0,1}.com$, combining the target’s name with “help” or “helpdesk.”
  2. Registrar Patterns: GoDaddy is currently the most frequently used registrar, though other providers may also be involved.
  3. Nameserver Infrastructure: Domains typically route through domaincontrol[.]com, a common nameserver provider.

A Step-by-Step Guide

EclecticIQ’s researchers shared a method to identify suspicious domains linked to the campaign:

1. Domain Pattern: Match regex ^[a-z]{1,}-help(desk){0,1}.com$ 

2. Registrar Filter: Focus on GoDaddy (expand to others like Namecheap if needed). 

3. Nameserver Filter: Include domains using domaincontrol[.]com. 

4. Creation Date: Restrict results to domains registered after March 1, 2025. 

Applying these filters to DNS databases has already uncovered 50 malicious domains, many impersonating high-profile law firms.

  • Targeted Industries: Legal, finance, and healthcare sectors are at heightened risk due to their handling of sensitive data.
  • Data Theft: Stolen credentials could lead to ransomware attacks, financial fraud, or corporate espionage.
  • Expanding Infrastructure: Luna Moth is rapidly scaling operations, suggesting broader campaigns ahead.

“This group is exploiting trust in internal systems,” said Alex Rivera, EclecticIQ’s lead threat analyst. “Employees must verify URLs before entering credentials, especially for unsolicited helpdesk requests.”

  1. Domain Monitoring: Use threat intelligence tools to flag domains matching Luna Moth’s patterns.
  2. Employee Training: Educate staff to recognize phishing attempts and fake helpdesk portals.
  3. Multi-Factor Authentication (MFA): Enforce MFA for all critical systems to mitigate credential theft.
  4. Registrar Collaboration: Report suspicious domains to registrars like GoDaddy for faster takedowns.

EclecticIQ encourages cybersecurity professionals to refine their search parameters by:

  • Adding registrars beyond GoDaddy (e.g., Namecheap, Google Domains).
  • Expanding nameserver filters to include less common providers.
  • Adjusting creation date thresholds as the campaign evolves.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...