Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

APT MuddyWater Attacking CFOs Leveraging OpenSSH, Enables RDP, and Scheduled Task

Posted on August 21, 2025August 21, 2025 By CWS

A classy cyber espionage marketing campaign attributed to APT MuddyWater has emerged concentrating on Chief Monetary Officers and finance executives throughout Europe, North America, South America, Africa, and Asia.

The menace actors are deploying a multi-stage phishing operation that masquerades as professional recruitment communications from Rothschild & Co, leveraging Firebase-hosted phishing pages with customized CAPTCHA challenges to deceive high-value targets.

The marketing campaign demonstrates vital evolution within the group’s techniques, incorporating professional distant entry instruments together with NetBird and OpenSSH to determine persistent backdoors inside company networks.

The assault sequence begins with fastidiously crafted spear-phishing emails that direct victims to Firebase-hosted domains equivalent to googl-6c11f.firebaseapp.com, the place targets encounter seemingly professional “human verification” challenges.

Upon finishing these fabricated CAPTCHA checks, victims are redirected to secondary phishing websites that ship malicious ZIP archives disguised as PDF paperwork.

Spear-Phishing Marketing campaign Putting in Netbird and Enabling Distant Entry (Supply – Hunt.io)

These archives comprise VBScript recordsdata that provoke a fancy multi-stage an infection course of designed to deploy distant entry capabilities whereas sustaining stealth.

Hunt.io analysts recognized crucial infrastructure shifts inside this marketing campaign, noting the transition from beforehand documented command-and-control servers at 192.3.95.152 to new infrastructure at 198.46.178.135.

The researchers found a number of Firebase tasks using an identical phishing kits, together with cloud-ed980.firebaseapp.com and cloud-233f9.net.app, all using AES-encrypted redirect mechanisms with hard-coded passphrases to evade detection techniques.

The malware’s persistence mechanisms symbolize a very regarding facet of this marketing campaign.

The preliminary VBS downloader (F-144822.vbs) retrieves a secondary payload from the attacker-controlled infrastructure, particularly concentrating on the trail /34564/cis.ico, which is renamed to cis.vbs upon execution.

This second-stage script performs a number of crucial capabilities, together with the silent set up of NetBird and OpenSSH MSI packages utilizing the next command construction:-

msiexec /i netbird.msi /quiet
msiexec /i OpenSSH.msi /quiet

Superior Persistence and Distant Entry Implementation

The marketing campaign’s most subtle aspect lies in its complete persistence technique, which mixes a number of professional instruments to determine redundant entry channels.

The malware creates a hidden administrative account named “consumer” with the password “Bs@202122”, successfully offering attackers with privileged system entry that persists throughout system reboots.

This account is strategically hidden from Home windows login screens via registry modifications, guaranteeing it stays undetected throughout routine system administration actions.

Pretend Google Drive web page prompting customers to finish a reCAPTCHA (Supply – Hunt.io)

NetBird deployment makes use of a preconfigured setup key (E48E4A70-4CF4-4A77-946B-C8E50A60855A) to determine safe tunnel connections, whereas concurrently enabling Distant Desktop Protocol providers and configuring firewall exceptions.

The malware ensures service reliability via scheduled activity creation, particularly implementing “ForceNetbirdRestart” duties that routinely restart NetBird providers after system startup delays.

Moreover, the marketing campaign removes NetBird desktop shortcuts from all consumer profiles, successfully concealing the presence of newly put in distant entry software program from informal statement by system directors or customers.

Enhance your SOC and assist your crew shield your corporation with free top-notch menace intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:APT, Attacking, CFOs, Enables, Leveraging, MuddyWater, OpenSSH, RDP, Scheduled, Task

Post navigation

Previous Post: New QUIC-LEAK Vulnerability Let Attackers Exhaust Server Memory and Trigger DoS Attack
Next Post: Mozilla High Severity Vulnerabilities Enables Remote Code Execution

Related Posts

Samsung MagicINFO 9 Server Vulnerability Let Attackers Write Arbitrary File Cyber Security News
10-Year-Old Roundcube RCE Vulnerability Let Attackers Execute Malicious Code Cyber Security News
New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild Cyber Security News
Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks Cyber Security News
Conducting Risk Assessments That Drive Business Value Cyber Security News
North Korean Kimsuky Hackers Data Breach Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: McDonald’s Hack, 1,200 Arrested in Africa, DaVita Breach Grows to 2.7M
  • South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members
  • Windows Docker Desktop Vulnerability Leads to Full Host Compromise
  • Developer Who Hacked Former Employer’s Systems Sentenced to Prison
  • NIST Releases Control Overlays to Manage Cybersecurity Risks in Use and Developments of AI Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: McDonald’s Hack, 1,200 Arrested in Africa, DaVita Breach Grows to 2.7M
  • South Asian APT Hackers Using Novel Tools to Compromise Phones of Military-Adjacent Members
  • Windows Docker Desktop Vulnerability Leads to Full Host Compromise
  • Developer Who Hacked Former Employer’s Systems Sentenced to Prison
  • NIST Releases Control Overlays to Manage Cybersecurity Risks in Use and Developments of AI Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News