

Cactus Ransomware – Active IOCs
April 30, 2025
ICS: Multiple Delta Electronics ISPSoft Vulnerabilities
May 1, 2025
Cactus Ransomware – Active IOCs
April 30, 2025
ICS: Multiple Delta Electronics ISPSoft Vulnerabilities
May 1, 2025Severity
High
Analysis Summary
Tofsee malware has been around since 2016. Once installed on a compromised computer, it can be used to send spam emails and gather user data. The malware can download more modules to carry out different activities. It can track users' online activities, steal personal information and credentials, and change browser and DNS settings. Tofsee has been known to spread through malicious email attachments, infected software downloads, and drive-by downloads from compromised websites. It can also persist on a system even after a reboot and can hide its presence from antivirus software. Upon execution, it drops multiple files onto the system and modifies the registry to ensure persistence. Tofsee uses a combination of stealth techniques to avoid detection, such as process hollowing, code obfuscation, and anti-debugging measures. This malware can cause major damage, such as financial loss and computer infections. It is used by cybercriminals to generate as much revenue as possible. The program is likely to install unintentionally, causing a slew of issues for both the system and other users. Tofsee is also capable of injecting unwanted advertisements into web pages visited by the infected user and redirecting browser traffic to malicious websites.
In terms of mitigation, it is crucial to keep software and operating systems up to date, avoid downloading suspicious files, and use a reputable antivirus program.
Impact
- Information Theft
- Credential Theft
- Crypto-Mining
Indicators of Compromise
MD5
02deef938afbaf368878abc098bedf76
be71ccf4452da4aba1cbf9b0e7af8566
7aaf7c83d2c063926964dc055857b8e3
b5b4d7bdfa287ae0e71bb3be03467bd2
SHA-256
bf0f5fe356a87d73af61dd4fdae1c7645811803dfa3749156550a96fdb3632cb
1c47c273d61b2f64cac5af0020eb9cd93ebf2447e649f6c0d099991813f65c2f
060c2db1a984acdfbba02570cfaf1751d4afc0e954127d957c8554685b074d12
f0586977190ce63cfa0e636693e761850181453ab811473d48bb38e241236e20
SHA1
2650fad8324f130b9b09266b4c403db9427b9848
0c7c0150909e70707a69d56f0a0ddbdb85630ed7
0bd51409caa51d334a8ad86011d3b19fc388d883
c6b5c13daf7671bbb8ceff57999ae45b07e78c98
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable two-factor authentication.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.