Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling

Posted on August 30, 2025August 30, 2025 By CWS

Cybersecurity researchers have known as consideration to a cyber assault through which unknown menace actors deployed an open-source endpoint monitoring and digital forensic instrument known as Velociraptor, illustrating ongoing abuse of reliable software program for malicious functions.
“On this incident, the menace actor used the instrument to obtain and execute Visible Studio Code with the doubtless intention of making a tunnel to an attacker-controlled command-and-control (C2) server,” the Sophos Counter Risk Unit Analysis Crew stated in a report printed this week.
Whereas menace actors are recognized to undertake living-off-the-land (LotL) strategies or benefit from reliable distant monitoring and administration (RMM) instruments of their assaults, using Velociraptor indicators a tactical evolution, the place incident response packages are getting used to acquire a foothold and decrease the necessity for having to deploy their very own malware.

Additional evaluation of the incident has revealed that the attackers used the Home windows msiexec utility to obtain an MSI installer from a Cloudflare Staff area, which serves as a staging floor for different instruments utilized by them, together with a Cloudflare tunneling instrument and a distant administration utility often known as Radmin.
The MSI file is designed to put in Velociraptor, which then establishes contact with one other Cloudflare Staff area. The entry is then leveraged to obtain Visible Studio Code from the identical staging server utilizing an encoded PowerShell command and execute the supply code editor with the tunnel choice enabled with a purpose to enable each distant entry and distant code execution.
The menace actors have additionally been noticed using the msiexec Home windows utility once more to obtain extra payloads from the employees[.]dev folder.
“Organizations ought to monitor for and examine unauthorized use of Velociraptor and deal with observations of this tradecraft as a precursor to ransomware,” Sophos stated. “Implementing an endpoint detection and response system, monitoring for surprising instruments and suspicious behaviors, and following greatest practices for securing techniques and producing backups can mitigate the ransomware menace.”

The disclosure comes as cybersecurity corporations Hunters and Permiso detailed a malicious marketing campaign that has leveraged Microsoft Groups for preliminary entry, reflecting a rising sample of menace actors weaponizing the platform’s trusted and deeply embedded function in enterprise-focused communications for malware deployment.
These assaults start with the menace actors utilizing newly created or compromised tenants to ship direct messages or provoke calls to targets, impersonating IT assist desk groups or different trusted contacts to put in distant entry software program like AnyDesk, DWAgent, or Fast Help, and seize management of sufferer techniques to ship malware.
Whereas comparable strategies involving distant entry instruments have been linked to ransomware teams like Black Basta since mid-2024, these newer campaigns forgo the preliminary electronic mail bombing step and finally make use of the distant entry to ship a PowerShell payload with capabilities generally related to credential theft, persistence, and distant code execution.
“The lures used to provoke engagement are tailor-made to seem routine and unremarkable, usually framed as IT help associated to Groups efficiency, system upkeep, or basic technical assist,” Permiso researcher Isuf Deliu stated. “These eventualities are designed to mix into the background of on a regular basis company communication, making them much less more likely to set off suspicion.”
It is price noting that comparable techniques have been employed to propagate malware households like DarkGate and Matanbuchus malware over the previous yr.
The assaults additionally serve a Home windows credential immediate to trick customers into coming into their passwords underneath the guise of a benign system configuration request, that are then harvested and saved to a textual content file on the system.
“Microsoft Groups phishing is not a fringe approach anymore — it is an lively, evolving menace that bypasses conventional electronic mail defenses and exploits belief in collaboration instruments,” safety researchers Alon Klayman and Tomer Kachlon stated.
“By monitoring audit logs like ChatCreated and MessageSent, enriching indicators with contextual knowledge, and coaching customers to identify IT/assist desk impersonations, SOC groups can shut this new hole earlier than it is exploited.”

The findings additionally observe the invention of a novel malvertising marketing campaign that mixes reliable workplace[.]com hyperlinks with Energetic Listing Federation Companies (ADFS) to redirect customers to Microsoft 365 phishing pages which can be able to harvesting login info.
The assault chain, in a nutshell, begins when a sufferer clicks on a rogue sponsored hyperlink on search engine outcomes pages, triggering a redirect chain that finally leads them to a pretend login web page mimicking Microsoft.
“It seems the attacker had arrange a customized Microsoft tenant with Energetic Listing Federation Companies (ADFS) configured,” Push Safety’s Luke Jennings stated. “This implies Microsoft will carry out the redirect to the customized malicious area.”
“Whereas this is not a vulnerability per se, the power for attackers so as to add their very own Microsoft ADFS server to host their phishing web page and have Microsoft redirect to it’s a regarding improvement that can make URL-based detections much more difficult than they already are.”

The Hacker News Tags:Abuse, Attackers, Code, Deploy, Forensic, Studio, Tool, Tunneling, Velociraptor, Visual

Post navigation

Previous Post: Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed
Next Post: Top 10 Best Attack Surface Management (ASM) Software Solutions In 2025

Related Posts

Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time The Hacker News
Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware The Hacker News
The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats The Hacker News
Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission The Hacker News
Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More The Hacker News
Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Understand Supply Chain Attacks
  • Top 10 Best Web Application Penetration Testing Companies in 2025
  • Top 10 Best Attack Surface Management (ASM) Software Solutions In 2025
  • Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
  • Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Understand Supply Chain Attacks
  • Top 10 Best Web Application Penetration Testing Companies in 2025
  • Top 10 Best Attack Surface Management (ASM) Software Solutions In 2025
  • Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
  • Critical Citrix 0-Day Vulnerability Exploited Since May, Leaving Global Entities Exposed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News