Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Posted on December 4, 2025December 4, 2025 By CWS

Professional administrative instruments are more and more changing into the weapon of selection for stylish risk actors aiming to mix in with regular community exercise.

A current marketing campaign has highlighted this harmful development, the place attackers are weaponizing Velociraptor, a broadly revered Digital Forensics and Incident Response (DFIR) device.

By deploying this software program, adversaries successfully set up stealthy Command and Management (C2) channels, permitting them to execute arbitrary instructions and preserve persistent entry to compromised environments with out triggering conventional safety alarms.

The assaults, noticed all through late 2025, leverage crucial vulnerabilities in broadly used enterprise infrastructure, particularly concentrating on Home windows Server Replace Providers (WSUS) and Microsoft SharePoint.

As soon as inside, the actors deploy Velociraptor to facilitate lateral motion and, in confirmed instances, ship the Warlock ransomware.

This dual-use technique complicates detection, because the presence of forensic instruments typically alerts remediation relatively than lively compromise.

Huntress safety analysts recognized this evolving tradecraft after investigating three distinct incidents between September and November.

Their analysis linked particular indicators, such because the hostname DESKTOP-C1N9M, to the financially motivated risk cluster Storm-2603.

The attackers demonstrated a excessive degree of operational safety, using Cloudflare tunnels and digitally signed binaries to bypass endpoint defenses and evade community blocklists.

Exploiting SharePoint for Stealthy Entry

The an infection chain prominently options the exploitation of the “ToolShell” vulnerability chain in Microsoft SharePoint.

Attackers first bypass authentication utilizing CVE-2025-49706 by sending specifically crafted HTTP POST requests to /_layouts/15/ToolPane.aspx. Following this, they chain a secondary distant code execution vulnerability (CVE-2025-49704) to switch default information like begin.aspx into malicious internet shells.

IIS Entry Logs for SharePoint Server (Supply – Huntress)

This illustrates the suspicious IIS logs revealing these unauthorized requests throughout the /_layouts/15/ listing.

As soon as the net shell is lively, the risk actors execute instructions to obtain and set up Velociraptor by way of Home windows Installer. A typical command noticed in these assaults is:

msiexec /q /i

This set up registers Velociraptor as a system service, guaranteeing persistence throughout reboots. Moreover this, the Autorun depicts the creation of this autorun service.

Autorun created for Velociraptor to run as a Home windows service (Supply – Huntress)

To additional entrench their place, the attackers use the compromised Velociraptor occasion to run Base64 encoded PowerShell instructions.

These scripts obtain Visible Studio Code (code.exe) to create outbound tunnels, successfully masking their malicious site visitors inside professional improvement exercise.

VS Code logs for tunnel creation (Supply – Huntress)

The VS Code logs spotlight the occasions generated throughout this tunnel-creation course of, displaying how the actors pivot from forensic device abuse to finish community domination.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Delivery, DFIR, Hackers, Leverage, Ransomware, Stealthy, Tool, Velociraptor

Post navigation

Previous Post: New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
Next Post: GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Related Posts

Critical Ivanti Endpoint Manager Vulnerabilities Let Attackers Execute Remote Code Critical Ivanti Endpoint Manager Vulnerabilities Let Attackers Execute Remote Code Cyber Security News
Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys Malicious NuGet Packages Mimic as Popular Nethereum Project to Steal Wallet Keys Cyber Security News
New Malware Targeting WooCommerce Sites with Malicious Plugins Steals Credit Card Data New Malware Targeting WooCommerce Sites with Malicious Plugins Steals Credit Card Data Cyber Security News
Burger King Uses DMCA Complaint to Take Down Blog Post Detailing Security Flaws on Drive-Thru Systems Burger King Uses DMCA Complaint to Take Down Blog Post Detailing Security Flaws on Drive-Thru Systems Cyber Security News
Zoom Clients for Windows Vulnerability Exposes Users to DoS Attacks Zoom Clients for Windows Vulnerability Exposes Users to DoS Attacks Cyber Security News
Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Group Star Blizzard Utilizes DarkSword iOS Exploit
  • Secrets Sprawl Expands in 2026: Key Insights for CISOs
  • Urgent Patches Address Critical Grafana Security Flaws
  • Telnyx Python SDK Faces Supply Chain Attack
  • Russian Toolkit Exploits RDP via Malicious LNK Files

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark