Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery

Posted on December 4, 2025December 4, 2025 By CWS

Professional administrative instruments are more and more changing into the weapon of selection for stylish risk actors aiming to mix in with regular community exercise.

A current marketing campaign has highlighted this harmful development, the place attackers are weaponizing Velociraptor, a broadly revered Digital Forensics and Incident Response (DFIR) device.

By deploying this software program, adversaries successfully set up stealthy Command and Management (C2) channels, permitting them to execute arbitrary instructions and preserve persistent entry to compromised environments with out triggering conventional safety alarms.

The assaults, noticed all through late 2025, leverage crucial vulnerabilities in broadly used enterprise infrastructure, particularly concentrating on Home windows Server Replace Providers (WSUS) and Microsoft SharePoint.

As soon as inside, the actors deploy Velociraptor to facilitate lateral motion and, in confirmed instances, ship the Warlock ransomware.

This dual-use technique complicates detection, because the presence of forensic instruments typically alerts remediation relatively than lively compromise.

Huntress safety analysts recognized this evolving tradecraft after investigating three distinct incidents between September and November.

Their analysis linked particular indicators, such because the hostname DESKTOP-C1N9M, to the financially motivated risk cluster Storm-2603.

The attackers demonstrated a excessive degree of operational safety, using Cloudflare tunnels and digitally signed binaries to bypass endpoint defenses and evade community blocklists.

Exploiting SharePoint for Stealthy Entry

The an infection chain prominently options the exploitation of the “ToolShell” vulnerability chain in Microsoft SharePoint.

Attackers first bypass authentication utilizing CVE-2025-49706 by sending specifically crafted HTTP POST requests to /_layouts/15/ToolPane.aspx. Following this, they chain a secondary distant code execution vulnerability (CVE-2025-49704) to switch default information like begin.aspx into malicious internet shells.

IIS Entry Logs for SharePoint Server (Supply – Huntress)

This illustrates the suspicious IIS logs revealing these unauthorized requests throughout the /_layouts/15/ listing.

As soon as the net shell is lively, the risk actors execute instructions to obtain and set up Velociraptor by way of Home windows Installer. A typical command noticed in these assaults is:

msiexec /q /i

This set up registers Velociraptor as a system service, guaranteeing persistence throughout reboots. Moreover this, the Autorun depicts the creation of this autorun service.

Autorun created for Velociraptor to run as a Home windows service (Supply – Huntress)

To additional entrench their place, the attackers use the compromised Velociraptor occasion to run Base64 encoded PowerShell instructions.

These scripts obtain Visible Studio Code (code.exe) to create outbound tunnels, successfully masking their malicious site visitors inside professional improvement exercise.

VS Code logs for tunnel creation (Supply – Huntress)

The VS Code logs spotlight the occasions generated throughout this tunnel-creation course of, displaying how the actors pivot from forensic device abuse to finish community domination.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Delivery, DFIR, Hackers, Leverage, Ransomware, Stealthy, Tool, Velociraptor

Post navigation

Previous Post: New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
Next Post: GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections

Related Posts

Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike Chinese State-Sponsored Hackers Attacking Semiconductor Industry with Weaponized Cobalt Strike Cyber Security News
Google Chrome May Soon Turn Webpages Into Podcasts With AI Audio Overviews Google Chrome May Soon Turn Webpages Into Podcasts With AI Audio Overviews Cyber Security News
Building a Cyber-Resilient Organization CISOs Roadmap Building a Cyber-Resilient Organization CISOs Roadmap Cyber Security News
Hackers Weaponize SVG Files and Office Documents to Target Windows Users Hackers Weaponize SVG Files and Office Documents to Target Windows Users Cyber Security News
Claude Opus 4.5 Now Integrated with GitHub Copilot Claude Opus 4.5 Now Integrated with GitHub Copilot Cyber Security News
CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild CISA Warns of Hackers Actively Exploiting Windows Server Update Services RCE Vulnerability in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News