Friday, April 25, 2025
Homecyber securityThreat Actors Use VPS Hosting Providers to Deliver Malware and Evade Detection

Threat Actors Use VPS Hosting Providers to Deliver Malware and Evade Detection

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals are intensifying phishing campaigns to spread the Grandoreiro banking trojan, targeting users primarily in Mexico, Argentina, and Spain.

A detailed analysis by Forcepoint X-Labs reveals the sophisticated techniques employed by these attackers to evade detection and deliver malware.

Phishing Tactics and Infrastucture

The campaign begins with phishing emails purportedly from tax agencies, containing high-importance tax penalty warnings in Spanish.

- Advertisement - Google News
 VPS Hosting Providers
Grandoreiro attack chain

These messages use a mix of VPS hosting and cloud storage services for distribution.

Initially, a spoofed sender, possibly leveraging the well-known Ovhcloud infrastructure, sends an email that leads the user to click on a “Download PDF” button hosted on Contabo (hxxps://vmi[.]contaboserver[.]net).

This URL dynamically changes, making each campaign unique and harder to detect.

Once clicked, the link redirects victims to download a zip payload from Mediafire, a popular file-sharing service.

This payload includes large, obfuscated Visual Basic scripts (VBS) designed to obscure malicious intent.

The obfuscated VBS files are encrypted or password-protected to bypass security checks, containing embedded base64 encoded ZIP files.

When executed, these scripts drop and run a disguised EXE file that initiates communication with a Command and Control (C2) server located within an Amazon Web Services (AWS) IP space (18[.]212[.]216[.]95:42195).

The EXE file, which displays an Acrobat Reader error to mislead users, is compiled with Delphi and uses a custom user agent for establishing malicious connections.

 VPS Hosting Providers
 Error prompt 

It searches for and attempts to steal credentials, focusing on potential Bitcoin wallet directories.

Indicators of Compromise (IOCs)

Cybersecurity firms and users should be vigilant for the following IOCs:

  • Embedded Download URLs: hxxps://vmi[.]contaboserver[.]net subdomains.
  • Re-directional URLs: Links to Mediafire downloads.
  • C2 Servers: AWS IP addresses used for communication.
  • File Hashes: Specific SHA1 hashes for EXE and ZIP files.

Forcepoint customers are safeguarded at multiple stages:

  • Stage 2 (Lure): Suspicious URLs embedded in emails are blocked.
  • Stage 3 (Redirect): Mediafire.net URLs are blocked before download.
  • Stage 5 (Dropper File): Malicious files are added to a blocklist.
  • Stage 6 (Call Home): C2 IP addresses are blocked.

Network security solutions should also leverage GTI file reputation services to detect and block these threats.

According to the Report, this campaign demonstrates a worrying trend in cybercrime, where attackers utilize legitimate hosting services to cloak their malicious intent.

Protection through vigilant IOC tracking and employing comprehensive email and web protection systems is crucial to thwart such advanced threats.

Users must remain cautious, especially with unsolicited emails, to avoid falling prey to these scams.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

‘SessionShark’ – A New Toolkit Bypasses Microsoft Office 365 MFA Security

Security researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users:...

Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access

A sophisticated cyberattack campaign has surfaced, targeting poorly managed Microsoft SQL (MS-SQL) servers to...

New Report Reveals How AI is Rapidly Enhancing Phishing Attack Precision

The Zscaler ThreatLabz 2025 Phishing Report unveils the alarming sophistication of modern phishing attacks,...

159 CVEs Exploited in the Wild in Q1 2025, 8.3% Targeted Within 1-Day Vulnerabilities Exploited

VulnCheck's latest report for Q1 2025 has identified 159 Common Vulnerabilities and Exposures (CVEs)...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

‘SessionShark’ – A New Toolkit Bypasses Microsoft Office 365 MFA Security

Security researchers have uncovered a new and sophisticated threat to Microsoft Office 365 users:...

Hackers Exploit MS-SQL Servers to Deploy Ammyy Admin for Remote Access

A sophisticated cyberattack campaign has surfaced, targeting poorly managed Microsoft SQL (MS-SQL) servers to...

New Report Reveals How AI is Rapidly Enhancing Phishing Attack Precision

The Zscaler ThreatLabz 2025 Phishing Report unveils the alarming sophistication of modern phishing attacks,...