Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fake IT Support Scam Spreads Havoc C2 Framework

Fake IT Support Scam Spreads Havoc C2 Framework

Posted on March 3, 2026 By CWS

Cybersecurity experts have detected a sophisticated campaign in which attackers are posing as IT support to distribute the Havoc command-and-control (C2) framework. This strategy serves as a precursor to either data theft or ransomware attacks.

This campaign, identified by Huntress last month, affected five partner organizations. It involved spam emails and follow-up phone calls from fake IT help desks, initiating a complex malware delivery chain. According to researchers Michael Tigges, Anna Pham, and Bryan Masters, one incident saw attackers access nine additional endpoints within eleven hours, deploying custom Havoc Demon payloads and legitimate remote management tools to sustain their presence. This rapid lateral movement suggests a clear intent towards data theft or ransomware deployment.

Background and Tactics

The tactics used in these attacks resemble previous email bombing and phishing operations attributed to the Black Basta ransomware group. Despite this group’s apparent inactivity following a leak of its internal communications last year, the persistence of their methods indicates two possibilities. Either former Black Basta affiliates are engaging in other ransomware operations, or competing threat actors are mimicking their techniques to execute social engineering and gain initial entry.

The attack method begins with a spam campaign designed to inundate targets’ inboxes with junk mail. Subsequently, the attackers, pretending to be IT support, contact victims and deceive them into allowing remote access via Quick Assist or tools like AnyDesk to resolve supposed issues.

Execution and Evasion

Once access is obtained, attackers swiftly open a web browser to a counterfeit page hosted on Amazon Web Services (AWS), mimicking Microsoft. Here, victims are instructed to input their email to update Outlook’s anti-spam rules. Clicking “Update rules configuration” on this bogus page runs a script prompting users to enter their password, thus enabling the theft of credentials while enhancing the interaction’s credibility.

Further, the assault entails downloading a fake anti-spam patch, leading to the execution of legitimate binaries like “ADNotificationManager.exe” to sideload a malicious DLL. This DLL is designed to evade defenses and run the Havoc shellcode payload by spawning a thread with the Demon agent. Notably, one DLL, “vcruntime140_1.dll,” uses advanced evasion tactics to circumvent security software.

Persistence and Implications

After deploying the Havoc Demon on the initial host, attackers expanded their reach across the victim’s network. While initial social engineering and malware delivery showed innovative methods, the subsequent manual actions were relatively straightforward. Scheduled tasks were created to persistently launch the Havoc Demon payload upon each system reboot, granting attackers ongoing remote access.

Notably, attackers also employed legitimate remote monitoring and management (RMM) tools like Level RMM and XEOX on some compromised hosts, diversifying their persistence efforts. The campaign underscores how attackers are willing to impersonate IT staff and engage victims directly to increase their success rate. Techniques once reserved for major firms or state-backed activities are now commonplace, with customized malware bypassing standard security signatures.

As attacks rapidly progress from initial compromise to extensive network penetration, utilizing multiple persistence methods, organizations must remain vigilant. This deceptive IT support strategy exemplifies how modern adversaries integrate sophistication at every phase: using social engineering to gain entry, DLL sideloading for stealth, and varied persistence techniques to endure remediation.

The Hacker News Tags:Black Basta, Cybersecurity, data exfiltration, Havoc C2, IT support scam, Malware, Phishing, Ransomware, social engineering, spam campaign

Post navigation

Previous Post: Google Introduces MTCs to Secure HTTPS from Quantum Risks
Next Post: Hacktivist Surge Amid US-Israel Strikes on Iran

Related Posts

Context Is the Key to Effective Incident Response Context Is the Key to Effective Incident Response The Hacker News
Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control Two CVSS 10.0 Bugs in Red Lion RTUs Could Hand Hackers Full Industrial Control The Hacker News
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. The Hacker News
PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign PolarEdge Targets Cisco, ASUS, QNAP, Synology Routers in Expanding Botnet Campaign The Hacker News
Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks The Hacker News
Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools
  • Iranian Drone Attacks Expose Data Center Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Zerobot Malware Targets Tenda Routers and n8n Platforms
  • Microsoft Unveils OAuth-Based Phishing Threat
  • LexisNexis Breach Exposes Data from AWS Servers
  • SloppyLemming Espionage Targets South Asia with New Tools
  • Iranian Drone Attacks Expose Data Center Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News