Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Storm-0900 Hackers Leveraging Parking Ticket and Medical Test Themes in Massive Phishing Attack

Posted on December 3, 2025December 3, 2025 By CWS

On Thanksgiving eve, a complicated risk actor generally known as Storm-0900 launched a high-volume phishing marketing campaign concentrating on customers throughout the USA.

Microsoft Menace Intelligence safety analysts detected and blocked this coordinated assault consisting of tens of 1000’s of emails designed to deceive recipients throughout the vacation interval.

The marketing campaign employed two major social engineering themes that leveraged well timed events: faux parking ticket notifications and fraudulent medical take a look at outcomes.

By referencing Thanksgiving, the attackers created a way of urgency and credibility that lowered victims’ suspicion and elevated the probability of person engagement.

The marketing campaign’s success relied on a number of layers of deception and technical sophistication.

On Thanksgiving eve, November 26, Microsoft detected and blocked a high-volume phishing marketing campaign from a risk actor we observe as Storm-0900. The marketing campaign used parking ticket and medical take a look at outcome themes and referenced Thanksgiving to lend credibility and decrease recipients’… pic.twitter.com/mwAFDQpfal— Microsoft Menace Intelligence (@MsftSecIntel) December 2, 2025

Phishing emails contained URLs directing to an attacker-controlled touchdown web page hosted on the malicious area permit-service[.]prime.

The attackers integrated interactive parts to deceive customers additional and bypass safety measures. The touchdown web page required customers to finish a CAPTCHA by dragging a slider.

Pretend captcha (Supply – X)

This step appeared reliable to most customers however truly served to validate the goal’s interplay functionality and readiness for malware deployment.

Pretend verification (Supply – X)

Microsoft Menace Intelligence safety analysts and researchers recognized that this marketing campaign in the end led to the deployment of XWorm, a preferred modular distant entry malware utilized by many risk actors throughout the risk panorama.

Following profitable person interplay with the phishing web page, the malware can be delivered to compromised gadgets, permitting attackers to ascertain persistent entry and management.

XWorm An infection and Persistence Mechanism

XWorm operates as a modular malware platform, which means risk actors can load completely different plugins to carry out numerous duties on compromised gadgets.

The malware’s modular structure makes it notably harmful as a result of it permits attackers to customise assaults primarily based on particular goals.

As soon as put in, XWorm allows distant entry capabilities that let risk actors to deploy extra malware, steal delicate knowledge, and keep long-term persistence on sufferer programs.

The malware communicates with command-and-control infrastructure, permitting attackers to subject instructions remotely and exfiltrate data from compromised machines.

Microsoft efficiently disrupted your entire marketing campaign by a mix of electronic mail filtering applied sciences, endpoint protections, and risk intelligence-based preemptive blocking of attacker infrastructure.

This multi-layered protection strategy prevented the vast majority of phishing emails from reaching supposed targets and blocked entry to malicious domains earlier than customers may work together with them.

Organizations ought to stay vigilant about uncommon communications referencing pressing issues and implement sturdy electronic mail safety controls throughout vacation durations when social engineering makes an attempt sometimes improve.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Hackers, Leveraging, Massive, Medical, Parking, Phishing, Storm0900, Test, Themes, Ticket

Post navigation

Previous Post: Niobium Raises $23 Million for FHE Hardware Acceleration
Next Post: Malicious Rust Evm-Units Mimic as EVM Version Silently Executes OS-specific Payloads

Related Posts

SafePay Ransomware Leverages RDP and VPN for Intruding Into Organizations Network Cyber Security News
Authorities Dismanteled Major Credit Card Fraud Operation Impacting 4.3 Million Cardholders Cyber Security News
DragonForce Cartel Emerges From the Leaked Source Code of Conti v3 Ransomware Cyber Security News
Ransomware Actors Primarily Targeting Retailers This Holiday Season to Deploy Malicious Payloads Cyber Security News
New Phishing Kit Automates Generation of ClickFix Attack Bypassing Security Measures Cyber Security News
New Phishing Attack Targets Facebook Users to Steal Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark