Saturday, April 26, 2025
Homecyber securityThreat Actors Use VPS Hosting Providers to Deliver Malware and Evade Detection

Threat Actors Use VPS Hosting Providers to Deliver Malware and Evade Detection

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals are intensifying phishing campaigns to spread the Grandoreiro banking trojan, targeting users primarily in Mexico, Argentina, and Spain.

A detailed analysis by Forcepoint X-Labs reveals the sophisticated techniques employed by these attackers to evade detection and deliver malware.

Phishing Tactics and Infrastucture

The campaign begins with phishing emails purportedly from tax agencies, containing high-importance tax penalty warnings in Spanish.

- Advertisement - Google News
 VPS Hosting Providers
Grandoreiro attack chain

These messages use a mix of VPS hosting and cloud storage services for distribution.

Initially, a spoofed sender, possibly leveraging the well-known Ovhcloud infrastructure, sends an email that leads the user to click on a “Download PDF” button hosted on Contabo (hxxps://vmi[.]contaboserver[.]net).

This URL dynamically changes, making each campaign unique and harder to detect.

Once clicked, the link redirects victims to download a zip payload from Mediafire, a popular file-sharing service.

This payload includes large, obfuscated Visual Basic scripts (VBS) designed to obscure malicious intent.

The obfuscated VBS files are encrypted or password-protected to bypass security checks, containing embedded base64 encoded ZIP files.

When executed, these scripts drop and run a disguised EXE file that initiates communication with a Command and Control (C2) server located within an Amazon Web Services (AWS) IP space (18[.]212[.]216[.]95:42195).

The EXE file, which displays an Acrobat Reader error to mislead users, is compiled with Delphi and uses a custom user agent for establishing malicious connections.

 VPS Hosting Providers
 Error prompt 

It searches for and attempts to steal credentials, focusing on potential Bitcoin wallet directories.

Indicators of Compromise (IOCs)

Cybersecurity firms and users should be vigilant for the following IOCs:

  • Embedded Download URLs: hxxps://vmi[.]contaboserver[.]net subdomains.
  • Re-directional URLs: Links to Mediafire downloads.
  • C2 Servers: AWS IP addresses used for communication.
  • File Hashes: Specific SHA1 hashes for EXE and ZIP files.

Forcepoint customers are safeguarded at multiple stages:

  • Stage 2 (Lure): Suspicious URLs embedded in emails are blocked.
  • Stage 3 (Redirect): Mediafire.net URLs are blocked before download.
  • Stage 5 (Dropper File): Malicious files are added to a blocklist.
  • Stage 6 (Call Home): C2 IP addresses are blocked.

Network security solutions should also leverage GTI file reputation services to detect and block these threats.

According to the Report, this campaign demonstrates a worrying trend in cybercrime, where attackers utilize legitimate hosting services to cloak their malicious intent.

Protection through vigilant IOC tracking and employing comprehensive email and web protection systems is crucial to thwart such advanced threats.

Users must remain cautious, especially with unsolicited emails, to avoid falling prey to these scams.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

How to Develop a Strong Security Culture – Advice for CISOs and CSOs

Developing a strong security culture is one of the most critical responsibilities for today’s...

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or "smishing,"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

DragonForce and Anubis Ransomware Gangs Launch New Affiliate Programs

Secureworks Counter Threat Unit (CTU) researchers have uncovered innovative strategies deployed by the DragonForce...

“Power Parasites” Phishing Campaign Targets Energy Firms and Major Brands

Silent Push Threat Analysts have uncovered a widespread phishing and scam operation dubbed "Power...

Threat Actors Register Over 26,000 Domains Imitating Brands to Deceive Users

Researchers from Unit 42 have uncovered a massive wave of SMS phishing, or "smishing,"...