Fake Error Pages Spread Cross-Platform Malware – Active IOCs
July 29, 2025Scattered Spider Actively Exploiting VMware vSphere Infrastructure
July 29, 2025Fake Error Pages Spread Cross-Platform Malware – Active IOCs
July 29, 2025Scattered Spider Actively Exploiting VMware vSphere Infrastructure
July 29, 2025Severity
High
Analysis Summary
DarkComet is a widely used Remote Access Trojan (RAT) that originated in 2008, developed by a French programmer known as Jean‑Pierre Lesueur (alias DarkCoderSc). Initially intended for legitimate remote administration, it was quickly adopted by threat actors due to its powerful capabilities. Though the developer ceased its development in 2012, citing ethical concerns, DarkComet continues to be exploited in the wild.
DarkComet has been used by various cybercriminals and APT groups, notably APT33 and suspected Iranian threat actors, to target sectors including government, military, energy, telecommunications, and human rights organizations. Countries most frequently targeted include the United States, United Kingdom, Syria, Egypt, and other Middle Eastern and North African nations. It is also known by aliases such as Fynloski and Backdoor:Win32/Fynloski.
The malware uses tactics and techniques consistent with APT-style operations, such as spear-phishing emails with malicious attachments, social engineering, and drive-by downloads. Once deployed, it provides attackers with full control of the infected system, including keylogging, webcam access, credential theft, and file exfiltration.
In recent activity, DarkComet was observed in campaigns targeting dissidents and civil society groups in Syria, often through fake humanitarian aid emails or trojanized software downloads, reflecting ongoing geopolitical surveillance and repression motives.
Impact
- Unauthorized Access
- Remote command execution
- Sensitive Information Theft
Indicators of Compromise
MD5
6a5f7d5099a1cbdbd749c15576555a33
eb24dd29ab0ec87ac879ad55c8d52b35
6a67e8650816ca5485d88db9db8ed6b7
d07be99ad4cd309294695bdd084735c1
SHA-256
5b323a4797ebd6ab5bccfb9697ae96ade527dc773abdec80628fb25ff644ff7f
b6842038ce1e67e57d85b6ba3cad9186aaf4b85bc7934a1a0eb74a5b3736f2b4
6bfe660109350fecca53759c927004e96347e090df60b6572ac4bf7b201b82e6
3f44d142fbdc7e297b0d520cda8499d4abd2e40a2bffa745411597d9b2030d4d
SHA1
98a51f4c4d850de6b14a11027caaa1926d63b621
188812faf7134da0d754f23d594ff88392646a99
839f46a90991c9041fad48383f014301104d43bc
931c3708c8ffc2ac6f39dcd0130edfd29da1b12d
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets
- Patch and upgrade any platforms and software timely and make it into a standard security policy.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.