Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading

Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading

Posted on December 9, 2025December 9, 2025 By CWS

Dec 09, 2025Ravie LakshmananRansomware / Endpoint Safety
The risk actor generally known as Storm-0249 is probably going shifting from its position as an preliminary entry dealer to undertake a mix of extra superior techniques like area spoofing, DLL side-loading, and fileless PowerShell execution to facilitate ransomware assaults.
“These strategies permit them to bypass defenses, infiltrate networks, keep persistence, and function undetected, elevating severe issues for safety groups,” ReliaQuest mentioned in a report shared with The Hacker Information.
Storm-0249 is the moniker assigned by Microsoft to an preliminary entry dealer that has offered footholds into organizations to different cybercrime teams, together with ransomware and extortion actors like Storm-0501. It was first highlighted by the tech large in September 2024.

Then, earlier this yr, Microsoft additionally revealed particulars of a phishing marketing campaign mounted by the risk actor that used tax-related themes to focus on customers within the U.S. forward of the tax submitting season and infect them with Latrodectus and the BruteRatel C4 (BRc4) post-exploitation framework.
The top objective of those infections is to acquire persistent entry to varied enterprise networks and monetize them by promoting them to ransomware gangs, offering them with a prepared provide of targets, and accelerating the tempo of such assaults.
The newest findings from ReliaQuest reveal a tactical shift, the place Storm-0249 has resorted to utilizing the notorious ClickFix social engineering tactic to trick potential targets into operating malicious instructions by way of the Home windows Run dialog underneath the pretext of resolving a technical subject.
On this case, the command copied and executed leverages the respectable “curl.exe” to fetch a PowerShell script from a URL that mimics a Microsoft area to provide victims a false sense of belief (“sgcipl[.]com/us.microsoft.com/bdo/”) and execute it in a fileless method by way of PowerShell.
This, in flip, leads to the execution of a malicious MSI bundle with SYSTEM privileges, which drops a trojanized DLL related to SentinelOne’s endpoint safety resolution (“SentinelAgentCore.dll”) into the person’s AppData folder together with the respectable “SentinelAgentWorker.exe” executable.
In doing so, the concept is to sideload the rogue DLL when the “SentinelAgentWorker.exe” course of is launched, thereby permitting the exercise to remain undetected. The DLL then establishes encrypted communication with a command-and-control (C2) server.
Storm-0249 has additionally been noticed making use of respectable Home windows administrative utilities like reg.exe and findstr.exe to extract distinctive system identifiers like MachineGuid to put the groundwork for follow-on ransomware assaults. The usage of living-off-the-land (LotL) techniques, coupled with the truth that these instructions are run underneath the trusted “SentinelAgentWorker.exe” course of, means the exercise is unlikely to lift any purple flags.

The findings point out a departure from mass phishing campaigns to precision assaults that weaponize the belief related to signed processes for added stealth.
“This is not simply generic reconnaissance – it is preparation for ransomware associates,” ReliaQuest mentioned. “Ransomware teams like LockBit and ALPHV use MachineGuid to bind encryption keys to particular person sufferer techniques.”
“By tying encryption keys to MachineGuid, attackers be certain that even when defenders seize the ransomware binary or try and reverse-engineer the encryption algorithm, they can not decrypt information with out the attacker-controlled key.”

The Hacker News Tags:Attacks, ClickFix, DLL, Escalates, Fileless, PowerShell, Ransomware, Sideloading, Storm0249

Post navigation

Previous Post: Google Announces 10 New AI Features for Google Chrome Powered by Gemini
Next Post: Critical Emby Server Vulnerability Let Attackers Gain Admin Access

Related Posts

nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery The Hacker News
Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams Zero-Day Exploits, Developer Malware, IoT Botnets, and AI-Powered Scams The Hacker News
Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams The Hacker News
Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign Water Curse Employs 76 GitHub Accounts to Deliver Multi-Stage Malware Campaign The Hacker News
Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts Five Malicious Chrome Extensions Impersonate Workday and NetSuite to Hijack Accounts The Hacker News
INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure INTERPOL Dismantles 20,000+ Malicious IPs Linked to 69 Malware Variants in Operation Secure The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark