Multiple Apple Products Vulnerabilities
May 22, 2025Kimsuky APT Uses PowerShell to Execute XWorm RAT – Active IOCs
May 22, 2025Multiple Apple Products Vulnerabilities
May 22, 2025Kimsuky APT Uses PowerShell to Execute XWorm RAT – Active IOCs
May 22, 2025Severity
High
Analysis Summary
A recent sophisticated cyberattack by Russian threat actors has been uncovered, wherein multiple cloud service providers, including Oracle Cloud Infrastructure (OCI), Scaleway Object Storage, and Tigris, were exploited to host malicious content for delivering the Lumma Stealer malware.
According to the Researcher, this campaign leverages legitimate cloud platforms as a resilient and distributed infrastructure, allowing attackers to bypass traditional security controls and maintain persistence even if one hosting location is blocked. By strategically dispersing their malicious components, the adversaries create redundancy, making detection and mitigation efforts significantly more difficult for defenders.
The attack employs social engineering tactics to lure victims, primarily privileged users, through disguised free game downloads and fake reCAPTCHA verification pages hosted on the aforementioned cloud providers. These deceptive elements appear legitimate, enticing users to engage with them unknowingly. Upon interaction, users download a ZIP archive containing a signed executable masquerading as a legitimate installer, which then executes the Lumma Stealer malware directly from memory. This stealthy in-memory execution helps the malware evade traditional endpoint security and enables the theft of sensitive data, including credentials and cryptocurrency wallets.
Further enhancing the attack’s sophistication is the use of DLL search order hijacking via a malicious MpGear.dll file, which ensures the malware persists on infected systems by automatically loading when certain legitimate applications run. This persistence mechanism facilitates continuous data exfiltration over extended periods, posing a significant risk to enterprise environments, especially as the campaign targets privileged accounts that have access to critical organizational assets. The infection chain begins with phishing emails or compromised websites, guiding victims to cloud-hosted malicious URLs designed to initiate the infection stealthily.
Security experts advise organizations to bolster defenses against such multi-cloud attacks by deploying advanced threat detection systems capable of monitoring suspicious cloud-hosted content, enforcing strict access controls for privileged users, and implementing comprehensive endpoint protection solutions. The use of trusted cloud platforms by threat actors underscores the growing complexity and evolving tactics in cyber threats, highlighting the need for enhanced visibility and proactive security measures tailored to the cloud environment to prevent data breaches and credential theft.
Impact
- Sensitive Information Theft
- Security Bypass
- Privilege Escalation
- Gain Access
Indicators of Compromise
Domain Name
- my-steamunlocked.online
- wq24-1.g-site.site
MD5
- 2d4a0e3883f14190ae489c4ab227a941
- d1f8cd39d3e2bfe2a143da03fc3489c8
SHA-256
- fa2ebe7df2fcf7e0b9991d411792e0cb78d149833b2d06102ab34d74ffc4a682
- 91747f5254ccddee9de4a01f959236c1d1fda06f6ba2d2664f16dfb9e2db4175
SHA-1
- 81cb0f3ce93c7d3377b30f6b0bb2ea1d476777a1
- 1d1b9af56cdacfd628b7f04634c46c84236f3ccd
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Implement advanced threat detection systems capable of identifying suspicious and malicious content hosted on cloud service providers such as OCI, Scaleway, and Tigris.
- Enforce strict access controls and least privilege policies for all privileged user accounts to minimize the risk of credential theft and lateral movement.
- Deploy comprehensive endpoint protection solutions with capabilities like in-memory malware detection and prevention of DLL search order hijacking techniques.
- Enhance email and web security by filtering phishing emails and blocking malicious URLs that may direct users to fake game downloads or fake reCAPTCHA pages.
- Monitor and audit cloud-hosted assets and URLs regularly to detect unauthorized or suspicious content and take down malicious infrastructure swiftly.
- Educate users on social engineering tactics and train them to recognize deceptive downloads, fake verification pages, and other common malware delivery methods.
- Use multi-factor authentication (MFA) on all accounts, especially privileged ones, to add an additional security layer against credential theft.
- Maintain robust incident response and threat intelligence capabilities to quickly identify, analyze, and mitigate emerging threats using data from cloud service logs and network traffic.