Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Attack Targeting ScreenConnect Cloud Administrators to Steal Login Credentials

Posted on August 26, 2025August 26, 2025 By CWS

A complicated credential harvesting marketing campaign has emerged concentrating on ScreenConnect cloud directors with spear phishing assaults designed to steal tremendous administrator credentials.

The continued operation, designated MCTO3030, has maintained constant ways since 2022 whereas working largely undetected by low-volume distribution methods that ship as much as 1,000 emails per marketing campaign run.

The marketing campaign particularly targets senior IT professionals together with administrators, managers, and safety personnel who possess elevated privileges in ScreenConnect environments.

Login alert (Supply – Mimecast)

Attackers leverage Amazon Easy E mail Service accounts to ship convincing phishing emails that declare suspicious login exercise from uncommon IP addresses or geographic places, creating urgency to immediate instant motion from victims.

Mimecast analysts recognized this persistent risk as notably regarding resulting from its obvious connection to ransomware operations, with analysis indicating comparable concentrating on patterns by Qilin ransomware associates.

The harvested tremendous admin credentials function preliminary entry vectors for subsequent ransomware deployment, enabling attackers to push malicious ScreenConnect purchasers to a number of endpoints concurrently.

The marketing campaign employs nation code top-level domains with ScreenConnect-themed naming conventions, together with domains like connectwise.com.ar, connectwise.com.be, and connectwise.com.cm to create convincing impersonations of official ConnectWise portals.

Phishing pages (Supply – Mimecast)

As soon as victims click on the “Evaluate Safety” button in phishing emails, they’re redirected to classy pretend login pages that intently mimic genuine ScreenConnect interfaces.

Superior Adversary-in-the-Center Strategies

The technical sophistication of this marketing campaign facilities on its implementation of adversary-in-the-middle phishing utilizing the EvilGinx framework, an open-source device particularly designed for intercepting each credentials and multi-factor authentication codes in real-time.

This functionality permits attackers to bypass trendy authentication protections that many organizations rely on for safety.

The EvilGinx framework operates by positioning itself between the sufferer and the official authentication service, capturing login credentials whereas concurrently forwarding authentication requests to the true ScreenConnect portal.

This system allows the harvesting of time-sensitive MFA tokens, permitting attackers to keep up persistent entry to compromised accounts even when multi-factor authentication is enabled.

The constant use of Amazon SES infrastructure gives excessive deliverability charges whereas bypassing conventional electronic mail safety controls by trusted cloud companies, demonstrating the marketing campaign’s operational sophistication and long-term strategic planning.

Increase your SOC and assist your workforce shield your online business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Administrators, Attack, Cloud, Credentials, Login, ScreenConnect, Steal, Targeting

Post navigation

Previous Post: Citrix NetScaler ADC and Gateway 0-Day RCE Vulnerability Actively Exploited in Attacks
Next Post: First AI Ransomware ‘PromptLock’ Uses OpenAI gpt-oss-20b Model for Encryption

Related Posts

Multiple ImageMagick Vulnerabilities Cause Memory Corruption and Integer Overflows Cyber Security News
Quid Miner Launches Mobile App to Unlock in Daily Cloud Mining Income for BTC, DOGE, and XRP for Investors Cyber Security News
Chrome 0-Day, VMware Flaws Patched, Fortiweb Hack, Teams Abuse, and More Cyber Security News
Hackers Allegedly Claim Leak of LG Source Code, SMTP, and Hardcoded Credentials Cyber Security News
Beware of Weaponized MSI Installer Mimic as WhatsApp Delivers Modified XWorm RAT Cyber Security News
New TruffleNet BEC Campaign Leverages AWS SES Using Stolen Credentials to Compromise 800+ Hosts Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Pro-Russian Hackers Claim Cyberattack on French Postal Service
  • Evasive Panda APT Using AitM Attack and DNS Poisoning to Deliver Malware
  • Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media
  • Threat Actors Using Weaponized AV-themed Word and PDF Documents to Attack Israeli Organizations
  • Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Pro-Russian Hackers Claim Cyberattack on French Postal Service
  • Evasive Panda APT Using AitM Attack and DNS Poisoning to Deliver Malware
  • Nomani Investment Scam Surges 62% Using AI Deepfake Ads on Social Media
  • Threat Actors Using Weaponized AV-themed Word and PDF Documents to Attack Israeli Organizations
  • Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark