Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Storm-0900 Hackers Leveraging Parking Ticket and Medical Test Themes in Massive Phishing Attack

Posted on December 3, 2025December 3, 2025 By CWS

On Thanksgiving eve, a complicated risk actor generally known as Storm-0900 launched a high-volume phishing marketing campaign concentrating on customers throughout the USA.

Microsoft Menace Intelligence safety analysts detected and blocked this coordinated assault consisting of tens of 1000’s of emails designed to deceive recipients throughout the vacation interval.

The marketing campaign employed two major social engineering themes that leveraged well timed events: faux parking ticket notifications and fraudulent medical take a look at outcomes.

By referencing Thanksgiving, the attackers created a way of urgency and credibility that lowered victims’ suspicion and elevated the probability of person engagement.

The marketing campaign’s success relied on a number of layers of deception and technical sophistication.

On Thanksgiving eve, November 26, Microsoft detected and blocked a high-volume phishing marketing campaign from a risk actor we observe as Storm-0900. The marketing campaign used parking ticket and medical take a look at outcome themes and referenced Thanksgiving to lend credibility and decrease recipients’… pic.twitter.com/mwAFDQpfal— Microsoft Menace Intelligence (@MsftSecIntel) December 2, 2025

Phishing emails contained URLs directing to an attacker-controlled touchdown web page hosted on the malicious area permit-service[.]prime.

The attackers integrated interactive parts to deceive customers additional and bypass safety measures. The touchdown web page required customers to finish a CAPTCHA by dragging a slider.

Pretend captcha (Supply – X)

This step appeared reliable to most customers however truly served to validate the goal’s interplay functionality and readiness for malware deployment.

Pretend verification (Supply – X)

Microsoft Menace Intelligence safety analysts and researchers recognized that this marketing campaign in the end led to the deployment of XWorm, a preferred modular distant entry malware utilized by many risk actors throughout the risk panorama.

Following profitable person interplay with the phishing web page, the malware can be delivered to compromised gadgets, permitting attackers to ascertain persistent entry and management.

XWorm An infection and Persistence Mechanism

XWorm operates as a modular malware platform, which means risk actors can load completely different plugins to carry out numerous duties on compromised gadgets.

The malware’s modular structure makes it notably harmful as a result of it permits attackers to customise assaults primarily based on particular goals.

As soon as put in, XWorm allows distant entry capabilities that let risk actors to deploy extra malware, steal delicate knowledge, and keep long-term persistence on sufferer programs.

The malware communicates with command-and-control infrastructure, permitting attackers to subject instructions remotely and exfiltrate data from compromised machines.

Microsoft efficiently disrupted your entire marketing campaign by a mix of electronic mail filtering applied sciences, endpoint protections, and risk intelligence-based preemptive blocking of attacker infrastructure.

This multi-layered protection strategy prevented the vast majority of phishing emails from reaching supposed targets and blocked entry to malicious domains earlier than customers may work together with them.

Organizations ought to stay vigilant about uncommon communications referencing pressing issues and implement sturdy electronic mail safety controls throughout vacation durations when social engineering makes an attempt sometimes improve.

Observe us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, Hackers, Leveraging, Massive, Medical, Parking, Phishing, Storm0900, Test, Themes, Ticket

Post navigation

Previous Post: Niobium Raises $23 Million for FHE Hardware Acceleration
Next Post: Malicious Rust Evm-Units Mimic as EVM Version Silently Executes OS-specific Payloads

Related Posts

BreachLock and Vanta Bridge the Gap Between Continuous Security Testing and Compliance with New Integration Cyber Security News
World’s Largest Hacking Forum BreachForums Creator Sentenced to Three Years in Prison Cyber Security News
10 Best API Monitoring Tools in 2025 Cyber Security News
Hackers Exploiting Java Debug Wire Protocol Servers in Wild to Deploy Cryptomining Payload Cyber Security News
New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts Cyber Security News
Building a Scalable Cybersecurity Training Program Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark