

ICS: Multiple Mitsubishi Electric MELSEC iQ-F Series Vulnerabilities
September 3, 2025
UNC6395 Supply Chain Attack on Salesloft Drift Hits Hundreds of Organizations – Active IOCs
September 3, 2025
ICS: Multiple Mitsubishi Electric MELSEC iQ-F Series Vulnerabilities
September 3, 2025
UNC6395 Supply Chain Attack on Salesloft Drift Hits Hundreds of Organizations – Active IOCs
September 3, 2025Severity
High
Analysis Summary
BlackMoon, also known as KrBanker, is a banking Trojan that first emerged in September 2015, initially targeting South Korean banks using a pharming technique to redirect users to fake banking websites and steal credentials. Over the years, it has undergone significant evolution, shifting from simple credential theft to more complex, multi-stage attacks. By late 2022, BlackMoon began targeting businesses in the USA and Canada, focusing on long-term persistence, evasion, and the delivery of additional malware rather than just credential harvesting.
As of 2025, recent campaigns have demonstrated the Trojan's use of modular architecture, allowing it to download spyware, adware, and tools for lateral movement within corporate networks. It employs advanced evasion techniques such as signed and obfuscated binaries, encrypted command-and-control (C2) channels, and the abuse of legitimate system tools like PowerShell, making it difficult to detect. Additionally, it leverages vulnerabilities in outdated VPN software and remote access tools to gain initial access. BlackMoon has effectively transitioned into a stealthy platform for malware delivery and system compromise, posing a persistent threat to business environments in North America.
Impact
- Data Exfiltration
- Credential Theft
- Financial Loss
Indicators of Compromise
MD5
52d8fcf145bb8bdd09cb7612400b8972
02a36426e7689358be1cf4b635f6c3c0
a0ca814730b7e9135683c8d6154b90dd
2de262a300e7c3dfd8260838a89c396c
SHA-256
492553d834fd0f43c00a1f8cd8d33e2797ab5745807d372f7cf6fc086168d1c4
df38776644c675f864709f6f508018e95b39a44d3719c3b320c9cfe206678ebf
089e6adc54e2946d88fdc9297dce09e7b9d53ae9ed4a7bd7d940068dd6dfc92a
a970cc51051fd6923b98acc862e68a201610d54638a6523d6a7b271ae9ec05bc
SHA1
b242fd74c310d6fe10d70c48ab1d125546629796
b8bc32ffb97abbe512b6a842dc4ee95b42418117
b9c8c65bead513e4c83ce7c3cf293a9b439e18c4
207edf258ea7e497f1356a71d30d9414b6a98759
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Never trust or open links and attachments received from unknown sources/senders.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions promptly. Using multi-layered protection is necessary to secure vulnerable assets.