Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

2,000+ Devices Hacked Using Weaponized Social Security Statement Themes

Posted on June 24, 2025June 24, 2025 By CWS

A complicated phishing marketing campaign masquerading as official Social Safety Administration (SSA) communications has efficiently compromised greater than 2,000 gadgets, in accordance with a current investigation.

The assault, which leverages the belief related to authorities correspondence, represents a regarding evolution in social engineering ways designed to ship malicious payloads to unsuspecting victims.

The cybercriminals behind this operation employed a multi-stage method, first luring victims with emails containing hyperlinks to convincingly designed phishing pages hosted on Amazon Internet Companies infrastructure.

The misleading marketing campaign directed customers to a fraudulent webpage that mimicked official SSA communications, prompting them to “Entry The Assertion” by means of a prominently displayed button.

Upon clicking, victims have been redirected to a secondary web page containing obtain directions for what gave the impression to be their Social Safety assertion.

The malware, disguised with the filename “US_SocialStatmet_ID544124.exe,” was designed to look legit whereas containing a complicated backdoor mechanism.

CyberArmor analysts recognized the malware as a specialised .NET software loader that executes a multi-stage an infection course of.

Malware Overview (Supply – CyberArmor)

Their evaluation revealed that the preliminary executable serves as a wrapper that unpacks and launches embedded elements designed to ascertain persistent distant entry to sufferer methods.

Telemetry information from the safety agency confirms {that a} vital share of the over 2,000 customers who interacted with the phishing lure unknowingly put in the malicious software program.

The marketing campaign’s effectiveness stems from its exploitation of trusted entities – each the Social Safety Administration’s authority and Amazon’s internet hosting status – to bypass customers’ safety skepticism.

The concentrating on seems broad moderately than centered on particular industries, although monetary and healthcare sectors have been suggested to train specific vigilance.

An infection Mechanism

The malware’s technical sophistication turns into obvious upon analyzing its operational framework. When executed, the .NET loader retrieves and deploys a number of embedded assets crucial to its performance.

The first elements embrace a resolver answerable for loading dependencies saved in a ‘FILES’ folder, that are essential to execute ScreenConnect distant entry software program.

The malware then runs an ‘ENTRYPOINT’ file that features as the primary backdoor part, establishing reference to the attacker’s command-and-control server at safe.ratoscbom.com on port 8041.

Evaluation of the malware’s configuration reveals an XML construction that specifies the connection parameters for the ScreenConnect consumer.

This configuration comprises encoded authentication credentials that allow the software program to ascertain an unauthorized distant session with out alerting the consumer.

The malware’s use of legit distant administration instruments like ScreenConnect represents a regarding development of “dwelling off the land” methods that leverage approved software program for malicious functions.

Your complete assault chain demonstrates a fastidiously orchestrated method: from the preliminary phishing e mail, to the AWS-hosted touchdown web page (hxxps://odertaoa[.]s3.us-east-1.amazonaws.com/ssa/US/index.html), to the downloadable executable with its embedded payload.

This multi-layered method helps the attackers evade conventional safety controls whereas maximizing an infection success charges.

Are you from SOC/DFIR Groups! – Work together with malware within the sandbox and discover associated IOCs. – Request 14-day free tria

Cyber Security News Tags:Devices, Hacked, Security, Social, Statement, Themes, Weaponized

Post navigation

Previous Post: Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number
Next Post: Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange

Related Posts

Building a Cyber-Resilient Organization in 2025 Cyber Security News
Google Warns of Cybercriminals Increasingly Attacking US Users to Steal Login Credentials Cyber Security News
FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
Prioritizing Vulnerabilities in a Sea of Alerts Cyber Security News
Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection Cyber Security News
DPRK’s Largest Cryptocurrency Heist via a Compromised macOS Developer and AWS Pivots Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Disable Unused Network Ports
  • New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
  • New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands
  • Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange
  • 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • How to Disable Unused Network Ports
  • New U.S. Visa Rule Requires Applicants to Set Social Media Account Privacy to Public
  • New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands
  • Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange
  • 2,000+ Devices Hacked Using Weaponized Social Security Statement Themes

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News