CVE-2025-2857 – Mozilla Firefox Vulnerability
March 31, 2025Multiple WordPress Plugins Vulnerabilities
March 31, 2025CVE-2025-2857 – Mozilla Firefox Vulnerability
March 31, 2025Multiple WordPress Plugins Vulnerabilities
March 31, 2025Severity
Meduim
Analysis Summary
Amadey is a botnet, a type of malicious software that infects computers and turns them into "bots" or "zombies" that can be controlled remotely by an attacker. Botnets are often used to carry out cyber attacks, such as spamming, distributed denial-of-service (DDoS) attacks, and data theft. The Amadey trojan can also download additional malware. and exfiltrate user information to a command and control (C2) server. Moreover, it can engage the victim's system. The threat actor sent spam emails that reference a package or shipment. Many of the emails claim in the subject line that the package or shipment is from the shipping company DHL. For example, “You have a package coming from DHL.” The bodies of all of the emails we observed in this campaign are blank. Each email has a ZIP attachment containing a Visual Basic Script (VBS) file. Each file name for the ZIP files is a series of numbers separated by an underscore, such as 044450_64504154.zip. The VBS files have the same name as their ZIP file, except they have the VBS extension rather than the ZIP extension.
Amadey has been observed targeting a wide range of organizations, including government agencies, financial institutions, and technology companies. The Amadey botnet is a sophisticated and flexible threat that poses a significant risk to organizations and individuals. To defend against Amadey and other botnets, it is important to keep software up to date, follow best practices for cybersecurity, and use a combination of security tools and services.
Impact
- Information Theft
- Exposure of Sensitive Data
Indicators of Compromise
MD5
b98b563e84582e4c360683c255ef5bd3
ed19338ae7b4f14a6300a82555194914
0b7487b0b78bd7587e0583b13b068f02
274f8b3dfc176b193cf63b6ea96b10dc
5ec95a42b16d80c72d17cc6d0bac58de
SHA-256
5c42d5cff248996ac395d3c636fcf55cba5710d7797c03340c71d94fbbbd1c71
7b5bd878343c3cecaee575c5046401e677127e53682f1894067af020d3bab1fa
dad41fe11699ffd7e23d5bf0c558966cf6156626752e4a517d0c955cbb7b5b60
119aca4875aeb128a47440a1ef9bac19460f522d268d654c63de4ad93b7fd1bf
f3d7546937b4791736e3f2182526a0ac22d47060cce53c4ab8e439b65742127b
SHA-1
dcffe41f94d21393d43b6438e94174f39b3d755d
c4b17e900215a704197817f8d419b40a07d687e8
c55a13d7b730ba5e51511979d11b04d11acf53ab
1b623e773465f76964d00a3f4ba451fd4dfdf1dc
9cfd9221606e1acfef1ea5f6f4bf88080822d5db
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.