Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign

Posted on May 27, 2025May 27, 2025 By CWS

Could 27, 2025Ravie LakshmananData Breach / Social Engineering

The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering assaults mounted by a prison extortion actor referred to as Luna Moth concentrating on regulation companies over the previous two years.
The marketing campaign leverages “data expertise (IT) themed social engineering calls, and callback phishing emails, to achieve distant entry to programs or units and steal delicate knowledge to extort the victims,” the FBI stated in an advisory.
Luna Moth, additionally known as Chatty Spider, Silent Ransom Group (SRG), Storm-0252, and UNC3753, is thought to be lively since at the very least 2022, primarily using a tactic known as callback phishing or telephone-oriented assault supply (TOAD) to trick unsuspecting customers into calling telephone numbers listed in benign-looking phishing emails associated to invoices and subscription funds.

It is value mentioning right here that Luna Moth refers back to the similar hacking crew that beforehand carried out BazarCall (aka BazaCall) campaigns to deploy ransomware like Conti. The menace actors got here into their very own following the shutdown of the Conti syndicate.
Particularly, e-mail recipients are instructed to name a buyer help quantity to cancel their premium subscription inside 24 hours to keep away from incurring a fee. Over the course of the telephone dialog, the sufferer is emailed a hyperlink and guided to put in a distant entry program, giving the menace actors unauthorized entry to their programs.
Armed with the entry, the attackers proceed to exfiltrate delicate data and ship an extortion be aware to the sufferer, demanding fee to keep away from getting their stolen knowledge printed on a leaked website or offered to different cybercriminals.
The FBI stated the Luna Moth actors have shifted their ways as of March 2025 by calling people of curiosity and posing as staff from their firm’s IT division.
“SRG will then direct the worker to hitch a distant entry session, both by way of an e-mail despatched to them, or navigating to an online web page,” the company famous. “As soon as the worker grants entry to their gadget, they’re informed that work must be finished in a single day.”

The menace actors, after acquiring entry to the sufferer’s gadget, have been discovered to escalate privileges and leverage official instruments like Rclone or WinSCP to facilitate knowledge exfiltration.
The usage of real system administration or distant entry instruments comparable to Zoho Help, Syncro, AnyDesk, Splashtop, or Atera to hold out the assaults means they’re unlikely to be flagged by safety instruments put in on the programs.
“If the compromised gadget doesn’t have administrative privileges, WinSCP transportable is used to exfiltrate sufferer knowledge,” the FBI added. “Though this tactic has solely been noticed not too long ago, it has been extremely efficient and resulted in a number of compromises.”
Defenders are urged to be looking out for WinSCP or Rclone connections made to exterior IP addresses, emails or voicemails from an unnamed group claiming knowledge was stolen, emails concerning subscription providers offering a telephone quantity and requiring a name to

take away pending renewal prices, and unsolicited telephone calls from people claiming to work of their IT departments.
The disclosure follows a report from EclecticIQ detailing Luna Moth’s “high-tempo” callback phishing campaigns concentrating on U.S. authorized and monetary sectors utilizing Reamaze Helpdesk and different distant desktop software program.
In line with the Dutch cybersecurity firm, at the very least 37 domains had been registered by the menace actor by way of GoDaddy in March, most of which spoofed the focused organizations’ IT helpdesk and help portals.
“Luna Moth is primarily utilizing helpdesk-themed domains, sometimes starting with the identify of the enterprise being focused, e.g., vorys-helpdesk[.]com,” Silent Push stated in a collection of posts on X. “The actors are utilizing a comparatively small vary of registrars. The actors seem to make use of a restricted vary of nameserver suppliers, with domaincontrol[.]com being the commonest.”

Discovered this text fascinating? Comply with us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Alerts, Campaign, FBI, Firms, Law, Luna, Moths, Phishing, Stealth

Post navigation

Previous Post: Russia-Linked Hackers Target Tajikistan Government with Weaponized Word Documents
Next Post: Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers

Related Posts

251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch The Hacker News
New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors The Hacker News
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise The Hacker News
TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns The Hacker News
China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones The Hacker News
Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users
  • Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
  • How Businesses Prevent Credential Theft with Early Phishing Detection
  • Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Key Administrator of World’s Most Popular Dark Web Cybercrime Platform Arrested
  • New ZuRu Malware Variant Weaponizes Termius SSH Client to Attack macOS Users
  • Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
  • How Businesses Prevent Credential Theft with Early Phishing Detection
  • Silicon Valley Engineer Pleads Guilty to Stealing Missile Detection Data for China

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News