Cybersecurity researchers have uncovered a sophisticated attack campaign where threat actors utilized a trojanized Zoom installer to infiltrate systems, gain remote desktop protocol (RDP) access, and ultimately deploy the BlackSuit ransomware.
The operation demonstrates a highly coordinated, multi-stage malware delivery chain designed to evade detection and maximize impact.
The attack began with a fake Zoom installer hosted on a cloned website resembling the legitimate Zoom application page.
Users downloading the installer unknowingly executed a malicious program embedded with the “d3f@ckloader” downloader.
This loader initiated a series of steps, including disabling security measures, connecting to command-and-control (C2) servers via Pastebin, and downloading additional payloads.
Among these was SectopRAT malware, which was injected into legitimate processes like MSBuild.exe to establish persistence and facilitate further stages of the attack.
After an eight-day dwell period, SectopRAT deployed Brute Ratel and Cobalt Strike payloads for reconnaissance and credential harvesting.
According to the DFIR Report, these tools enabled lateral movement across the network using PsExec and RDP connections tunneled through a proxy malware called QDoor.
QDoor allowed attackers to bypass network defenses by routing traffic through compromised systems.
Once inside the network, the attackers used WinRAR to compress sensitive files and exfiltrated them to a cloud-based storage service named Bublup.
Following data exfiltration, they staged BlackSuit ransomware for deployment. Using batch scripts and PsExec, the ransomware was distributed across all Windows hosts in the environment.
It encrypted files, deleted shadow copies using vssadmin
, and left ransom notes demanding payment.
The entire operation spanned nine days, with a Time-to-Ransomware (TTR) of approximately 194 hours.
The attackers leveraged advanced techniques such as DLL hijacking, credential dumping from LSASS memory, and API abuse for stealthy execution.
This incident highlights the increasing sophistication of ransomware campaigns that combine social engineering (via fake installers) with advanced post-exploitation frameworks like Brute Ratel and Cobalt Strike.
Organizations are urged to enhance endpoint detection capabilities, monitor for unusual network traffic patterns, and educate users on identifying phishing attempts involving cloned websites.
By employing multiple malware strains and leveraging legitimate tools like RDP and WinRAR, the attackers were able to evade traditional defenses while achieving their objectives.
This case underscores the need for proactive threat hunting and robust incident response mechanisms to mitigate similar attacks in the future.
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!
As cyber threats continue to evolve, Security Operations Centers (SOCs) require robust tools to detect,…
Cybersecurity agencies worldwide have issued a joint advisory warning against the growing threat posed by…
Oracle Corporation has confirmed a data breach involving its older Gen 1 servers, marking its…
A critical security vulnerability, CVE-2025-31125, has been identified in the Vite development server. Due to improper…
A newly identified Android spyware app is elevating its tactics to remain hidden and unremovable…
Malicious PDF files have emerged as a dominant threat vector in email-based cyberattacks, accounting for…