ICS: Multiple Fuji Electric V-SFT Vulnerabilities
May 19, 2025CVE-2025-33103 – IBM i Vulnerability
May 20, 2025ICS: Multiple Fuji Electric V-SFT Vulnerabilities
May 19, 2025CVE-2025-33103 – IBM i Vulnerability
May 20, 2025Severity
Meduim
Analysis Summary
Amadey is a botnet, a type of malicious software that infects computers and turns them into "bots" or "zombies" that can be controlled remotely by an attacker. Botnets are often used to carry out cyber attacks, such as spamming, distributed denial-of-service (DDoS) attacks, and data theft. The Amadey trojan can also download additional malware. and exfiltrate user information to a command and control (C2) server. Moreover, it can engage the victim's system. The threat actor sent spam emails that reference a package or shipment. Many of the emails claim in the subject line that the package or shipment is from the shipping company DHL. For example, “You have a package coming from DHL.” The bodies of all of the emails we observed in this campaign are blank. Each email has a ZIP attachment containing a Visual Basic Script (VBS) file. Each file name for the ZIP files is a series of numbers separated by an underscore, such as 044450_64504154.zip. The VBS files have the same name as their ZIP file, except they have the VBS extension rather than the ZIP extension.
Amadey has been observed targeting a wide range of organizations, including government agencies, financial institutions, and technology companies. The Amadey botnet is a sophisticated and flexible threat that poses a significant risk to organizations and individuals. To defend against Amadey and other botnets, it is important to keep software up to date, follow best practices for cybersecurity, and use a combination of security tools and services.
Impact
- Information Theft
- Exposure of Sensitive Data
Indicators of Compromise
MD5
572c2ef520f73c55a1a75cbf57d466c1
14bcf4728388bdcd9c6afde0c9792b85
86b47ae92cbcd275f54d479567e6e675
SHA-256
e04fd3d23b9bfc7e468be3e70d244c763777b7cdb9c8523b76e0c66bfbca7186
561f76bf2cd6cb4ac9d5dbb7232e699c16f79e63a0858e0672d619423ac22c52
f4617339aa8c63dea3bcf26818ea85d28074d8100882ddd3bdaf3c5870727502
SHA-1
daa81b7b9e86ee8cb5bf8790b6b4683a40914655
772d46975b051b04b0780e28bbb1593dec502b9b
f188cc61fa0888f5aa54005bc6090357a4dfa9a9
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.