Wednesday, April 16, 2025
Homecyber securityPhantom Goblin Uses Social Engineering Tactics to Deploy Stealer Malware

Phantom Goblin Uses Social Engineering Tactics to Deploy Stealer Malware

Published on

SIEM as a Service

Follow Us on Google News

A sophisticated malware operation, dubbed “Phantom Goblin,” has been identified by cybersecurity researchers, highlighting the increasing use of social engineering tactics to deploy information-stealing malware.

This operation leverages deceptive techniques to trick users into executing malicious files, leading to unauthorized access and data theft.

Phantom Goblin
Infection Chain

Malware Distribution and Execution

The Phantom Goblin malware is distributed via RAR attachments, often delivered through spam emails.

- Advertisement - Google News

These attachments contain a malicious shortcut (LNK) file disguised as a PDF document, named “document.lnk,” which is part of a RAR archive labeled “Proofs.rar.”

Once executed, the LNK file initiates a PowerShell command that silently downloads and executes additional payloads from a GitHub repository.

This ensures persistence by adding a registry entry, allowing the malware to run at system startup.

The payloads, including “updater.exe,” “vscode.exe,” and “browser.exe,” are designed to mimic legitimate applications, making them difficult to detect.

The malware primarily targets web browsers and developer tools for data theft and unauthorized system access.

It forcefully terminates browser processes to extract sensitive information such as cookies, login credentials, and browsing history.

The “updater.exe” payload steals cookies from browsers like Chrome, Brave, and Edge by enabling remote debugging, bypassing Chrome’s App Bound Encryption (ABE) for stealthy data exfiltration.

The stolen data is archived and transmitted to a Telegram channel using the Telegram Bot API.

Phantom Goblin
Stolen data

Unauthorized Remote Access via VSCode Tunnels

Another critical aspect of the Phantom Goblin operation is its use of Visual Studio Code (VSCode) tunnels to establish unauthorized remote access.

The “vscode.exe” payload creates a VSCode tunnel, allowing threat actors to maintain control over compromised systems without triggering traditional security alerts.

According to CRIL Report, this is achieved by downloading a legitimate copy of VSCode, extracting it, and then using PowerShell scripts to create a tunnel.

The connection details are exfiltrated to a Telegram bot, enabling real-time remote access.

To mitigate these threats, users are advised to avoid opening unexpected attachments and to enable advanced email filtering.

Deploying robust endpoint protection with real-time threat detection can help identify malicious processes.

Restricting PowerShell execution and enforcing strict access controls for VSCode tunnels are also recommended.

Monitoring outbound network traffic for suspicious connections, including unusual Telegram API activity, can help detect and prevent such attacks.

By understanding these tactics, organizations can enhance their cybersecurity posture against sophisticated threats like Phantom Goblin.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Firefox Fixes High-Severity Vulnerability Causing Memory Corruption via Race Condition

Mozilla has released Firefox 137.0.2, addressing a high-severity security flaw that could potentially allow...

Tails 6.14.2 Released with Critical Fixes for Linux Kernel Vulnerabilities

The Tails Project has urgently released Tails 6.14.2, addressing critical security vulnerabilities in the Linux...

APT29 Hackers Use GRAPELOADER in New Attack Against European Diplomats

Check Point Research (CPR) has uncovered a new targeted phishing campaign employing GRAPELOADER, a...

Chinese Hackers Unleash New BRICKSTORM Malware to Target Windows and Linux Systems

A sophisticated cyber espionage campaign leveraging the newly identified BRICKSTORM malware variants has targeted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Firefox Fixes High-Severity Vulnerability Causing Memory Corruption via Race Condition

Mozilla has released Firefox 137.0.2, addressing a high-severity security flaw that could potentially allow...

Tails 6.14.2 Released with Critical Fixes for Linux Kernel Vulnerabilities

The Tails Project has urgently released Tails 6.14.2, addressing critical security vulnerabilities in the Linux...

APT29 Hackers Use GRAPELOADER in New Attack Against European Diplomats

Check Point Research (CPR) has uncovered a new targeted phishing campaign employing GRAPELOADER, a...