Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fake IT Support Scam Spreads Havoc C2 Framework

Fake IT Support Scam Spreads Havoc C2 Framework

Posted on March 3, 2026 By CWS

Cybersecurity experts have detected a sophisticated campaign in which attackers are posing as IT support to distribute the Havoc command-and-control (C2) framework. This strategy serves as a precursor to either data theft or ransomware attacks.

This campaign, identified by Huntress last month, affected five partner organizations. It involved spam emails and follow-up phone calls from fake IT help desks, initiating a complex malware delivery chain. According to researchers Michael Tigges, Anna Pham, and Bryan Masters, one incident saw attackers access nine additional endpoints within eleven hours, deploying custom Havoc Demon payloads and legitimate remote management tools to sustain their presence. This rapid lateral movement suggests a clear intent towards data theft or ransomware deployment.

Background and Tactics

The tactics used in these attacks resemble previous email bombing and phishing operations attributed to the Black Basta ransomware group. Despite this group’s apparent inactivity following a leak of its internal communications last year, the persistence of their methods indicates two possibilities. Either former Black Basta affiliates are engaging in other ransomware operations, or competing threat actors are mimicking their techniques to execute social engineering and gain initial entry.

The attack method begins with a spam campaign designed to inundate targets’ inboxes with junk mail. Subsequently, the attackers, pretending to be IT support, contact victims and deceive them into allowing remote access via Quick Assist or tools like AnyDesk to resolve supposed issues.

Execution and Evasion

Once access is obtained, attackers swiftly open a web browser to a counterfeit page hosted on Amazon Web Services (AWS), mimicking Microsoft. Here, victims are instructed to input their email to update Outlook’s anti-spam rules. Clicking “Update rules configuration” on this bogus page runs a script prompting users to enter their password, thus enabling the theft of credentials while enhancing the interaction’s credibility.

Further, the assault entails downloading a fake anti-spam patch, leading to the execution of legitimate binaries like “ADNotificationManager.exe” to sideload a malicious DLL. This DLL is designed to evade defenses and run the Havoc shellcode payload by spawning a thread with the Demon agent. Notably, one DLL, “vcruntime140_1.dll,” uses advanced evasion tactics to circumvent security software.

Persistence and Implications

After deploying the Havoc Demon on the initial host, attackers expanded their reach across the victim’s network. While initial social engineering and malware delivery showed innovative methods, the subsequent manual actions were relatively straightforward. Scheduled tasks were created to persistently launch the Havoc Demon payload upon each system reboot, granting attackers ongoing remote access.

Notably, attackers also employed legitimate remote monitoring and management (RMM) tools like Level RMM and XEOX on some compromised hosts, diversifying their persistence efforts. The campaign underscores how attackers are willing to impersonate IT staff and engage victims directly to increase their success rate. Techniques once reserved for major firms or state-backed activities are now commonplace, with customized malware bypassing standard security signatures.

As attacks rapidly progress from initial compromise to extensive network penetration, utilizing multiple persistence methods, organizations must remain vigilant. This deceptive IT support strategy exemplifies how modern adversaries integrate sophistication at every phase: using social engineering to gain entry, DLL sideloading for stealth, and varied persistence techniques to endure remediation.

The Hacker News Tags:Black Basta, Cybersecurity, data exfiltration, Havoc C2, IT support scam, Malware, Phishing, Ransomware, social engineering, spam campaign

Post navigation

Previous Post: Google Introduces MTCs to Secure HTTPS from Quantum Risks
Next Post: Hacktivist Surge Amid US-Israel Strikes on Iran

Related Posts

China-Linked Cyber Threats Target Southeast Asian Government China-Linked Cyber Threats Target Southeast Asian Government The Hacker News
How to Stop Python Supply Chain Attacks—and the Expert Tools You Need How to Stop Python Supply Chain Attacks—and the Expert Tools You Need The Hacker News
Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware The Hacker News
North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign North Korean Hackers Flood npm Registry with XORIndex Malware in Ongoing Attack Campaign The Hacker News
GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites GootLoader Is Back, Using a New Font Trick to Hide Malware on WordPress Sites The Hacker News
Critical Citrix NetScaler Flaw Under Active Scrutiny Critical Citrix NetScaler Flaw Under Active Scrutiny The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Mirai Variant Targets TBK DVRs with CVE-2024-3721
  • Critical FortiSandbox Flaw Exploited: Immediate Action Required
  • 6 Million FTP Servers Still Exposed in 2026, Report Reveals
  • ATHR Platform Revolutionizes Large-Scale Vishing Attacks
  • White House to Discuss AI Advancements with Anthropic CEO

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Mirai Variant Targets TBK DVRs with CVE-2024-3721
  • Critical FortiSandbox Flaw Exploited: Immediate Action Required
  • 6 Million FTP Servers Still Exposed in 2026, Report Reveals
  • ATHR Platform Revolutionizes Large-Scale Vishing Attacks
  • White House to Discuss AI Advancements with Anthropic CEO

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark