Monday, May 19, 2025
Homecyber securityNebulous Mantis hackers have Deployed the RomCom RAT globally, Targeting organizations.

Nebulous Mantis hackers have Deployed the RomCom RAT globally, Targeting organizations.

Published on

SIEM as a Service

Follow Us on Google News

Nebulous Mantis, also known as Cuba, STORM-0978, Tropical Scorpius, and UNC2596, is a Russian-speaking cyber espionage group that has been actively deploying the RomCom remote access trojan (RAT) in targeted campaigns since mid-2019.

The group primarily focuses on critical infrastructure, government agencies, political leaders, and organizations related to NATO.

Their operations are characterized by the use of spear-phishing emails containing weaponized document links to deliver RomCom, which is leveraged for espionage, lateral movement, and data theft.

- Advertisement - Google News

Since mid-2022, Nebulous Mantis has shifted its spear-phishing campaigns to exclusively use RomCom, abandoning previous malware like Hancitor.

The group employs advanced evasion techniques, such as living-off-the-land (LOTL) tactics and encrypted command and control (C2) communications.

Their infrastructure is highly dynamic, utilizing bulletproof hosting services like LuxHost and AEZA, with domains and C2 servers rotated monthly for persistence and stealth.

Key actors such as LARVA-290 play a critical role in acquiring and managing these servers, supporting both espionage and ransomware operations.

Multi-Phase Attack Methodology

The attack chain begins with highly targeted spear-phishing emails, tailored to specific organizations or individuals.

These emails direct victims to fake websites mimicking legitimate services, such as OneDrive, where users are prompted to download malicious files.

Upon execution, the initial RomCom variant acts as a downloader, triggering subsequent infection stages that establish persistence and enable further exploitation.

RomCom employs several anti-analysis techniques, including filename and registry key checks, to evade sandbox and antivirus detection. If these checks pass, the downloader connects to designated C2 domains to retrieve additional payloads, including the first-stage RomCom DLL and decoy documents.

The malware then loads itself into system processes, establishes encrypted C2 communications, and downloads further modules for espionage and data theft. Notably, RomCom leverages decentralized technologies such as the InterPlanetary File System (IPFS) to host and distribute payloads, increasing resilience against takedown efforts.

Once active, RomCom deploys a range of tools, including Plink, WinRAR, and AD Explorer, to facilitate lateral movement, data collection, and persistence.

The malware uses COM hijacking via registry manipulation for persistence, and executes commands for credential harvesting, system reconnaissance, Active Directory enumeration, and network discovery.

Data is staged, archived, and exfiltrated through the C2 infrastructure, with ransomware often deployed as a final step to encrypt victim data and demand payment.

Command and Control, Impact, and Defense

RomCom’s C2 framework is managed through a dedicated panel that allows operators to control infected devices, execute commands, and upload or download files.

The panel supports multiple user roles with varying permissions, enabling efficient management of large-scale operations.

Commands include system enumeration, process management, screenshot capture, credential harvesting, and deployment of additional modules such as stealers and crypto grabbers.

After exfiltrating sensitive data, Nebulous Mantis often deploys ransomware to encrypt files and extort victims. The group has used several ransomware strains over time, including Cuba, Industrial Spy, and Team Underground, with data leaks published on dedicated sites.

Their operations demonstrate a high degree of operational discipline, balancing intelligence collection with stealth and persistence.

The Nebulous Mantis group’s sophisticated tradecraft, use of decentralized infrastructure, and continuous evolution of tactics make RomCom a significant threat to governmental, military, and critical infrastructure organizations worldwide.

Their activities underscore the need for advanced defense strategies, including robust email filtering, endpoint detection, regular patching, and network monitoring to identify and mitigate such advanced persistent threats.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Mayura Kathir
Mayura Kathirhttps://gbhackers.com/
Mayura Kathir is a cybersecurity reporter at GBHackers News, covering daily incidents including data breaches, malware attacks, cybercrime, vulnerabilities, zero-day exploits, and more.

Latest articles

Hackers Exploit AutoIT Scripts to Deploy Malware Targeting Windows Systems

Cybersecurity researchers have unearthed a sophisticated attack leveraging AutoIT, a long-standing scripting language known...

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...

Active Exploitation of Ivanti EPMM Zero-Day Vulnerability in the Wild

Security researchers at The Shadowserver Foundation have identified active exploitation attempts targeting a critical...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit AutoIT Scripts to Deploy Malware Targeting Windows Systems

Cybersecurity researchers have unearthed a sophisticated attack leveraging AutoIT, a long-standing scripting language known...

New Report Finds 67% of Organizations Experienced Cyber Attacks in the Last Year

A disturbing 67% of businesses in eight worldwide markets—the US, UK, Spain, the Netherlands,...

Auth0-PHP Vulnerability Enables Unauthorized Access for Attackers

Critical security vulnerability has been discovered in the Auth0-PHP SDK that could potentially allow...