newstrooper newstrooper
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Reading: Fake recruiters email target CFOs using legal netbird tools in six global regions
Share

News Trooper

Your Global Insight, Delivered Daily.

Search
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Follow US
© 2025 All Rights Reserved | Powered by News Trooper News
News Trooper > Technology > Fake recruiters email target CFOs using legal netbird tools in six global regions
Technology

Fake recruiters email target CFOs using legal netbird tools in six global regions

June 2, 2025 9 Min Read
Share
Fake recruiters email target CFOs using legal netbird tools in six global regions
SHARE

Cybersecurity researchers have warned about a new spear phishing campaign that uses a legitimate remote access tool called NetBird, targeting chief financial officers and financial executives of banks, energy companies, insurance companies and investment companies in Europe, Africa, Canada, the Middle East and South Asia.

“In what appears to be a multi-stage phishing task, the attacker aims to deploy Netbird, a legitimate wireguard-based remote access tool, on the victim’s computer,” Trellix researcher Srini Seethapathy said in the analysis.

Activities first detected by cybersecurity companies in mid-May 2025 are not attributable to known threat actors or groups.

The starting point for the attack is Rothschild & Co. This is a phishing email that impersonates a recruiter for the company and claims it will provide “strategic opportunities” to the company. This email is designed to open PDF attachments to recipients. It’s actually a phishing link that redirects to the Firebase app host URL.

The notable thing about the infection is that the actual redirect URL is stored on the page in encrypted format, and can only be accessed after the victim resolves the Captcha validation check and ultimately leads to a ZIP archive download.

“The puzzle solves it by performing a JavaScript function that decrypts it with a hard-coded key and redirects the user to the decrypted link,” Seethapathy said. “Attackers are increasingly leaning towards these custom capture gates, hoping to slip past defenses that have already flagged phishing sites protected by CloudFlare Turnstile or Google Recaptcha.”

What resides in the archive is a visual basic script (VBScript), which is responsible for getting the next stage VBScript from an external server and launching it via “wscript.exe”. This two-stage VBScript downloader gets another payload from the same server, changes it to “TR.ZIP” and extracts two MSI files from there: NetBird and OpenSSH.

See also  A new research paper questions the price of "tokens" in AI chat

The final phase involves installing two programs on the infected host, creating hidden local accounts, enabling remote desktop access, and persisting NetBird through a task scheduled to start automatically on a System restart. The malware also removes NetBird desktop shortcuts to prevent compromises from being detected by the victim.

Trellix has been active for nearly a year and identifies another redirect URL that provides the same VBScript payload, indicating that the campaign may have been around for some time.

The findings once again show that the enemy is increasingly dependent on legitimate remote access applications such as Connectwise Screenconnect, Atera, Splashtop, Fleetdeck, and Logmein.

“This attack isn’t your typical phishing scam,” Thetapathy said. “It’s well-made, targeted, subtle, designed to slip past technology and people. It’s a multi-stage attack where enemies use social engineering and defence evasion techniques to create and maintain permanent access to the victim system.”

This disclosure is consistent with the discovery of various email-based social engineering campaigns in the wild –

  • Attacks that abuse trusted domains associated with well-known Japanese Internet Service Providers (ISPs) send phishing messages from email addresses.
  • Abuse Google Apps Script Development Platform attacks to host legitimate phishing pages and steal Microsoft login credentials using bill-themed email lures
  • Attacks that mimic Apple Pay invoices to steal sensitive user data, such as credit card details and Yahoo Mail account details
  • Its attack concept workspace to host a phishing page, causing users to view shared documents and pose as they portray their credentials via telegram bots, and click on a link that takes victims to a fake Microsoft login page.
  • Attacks that leverage long-standing security flaws in Microsoft Office (CVE-2017-11882) deliver hidden formbook malware variants in fake PNG files and steal sensitive data from compromised hosts
See also  Why More Security Leaders Choose AEVs

Phas Services Laine The Bar

Findings also occurred, as Trustwave detailed the operational connections between Tycoon and Dadsec (aka Phoenix) phishing kits, highlighting the overlapping infrastructure and the use of centralized phishing infrastructure. DADSEC is a work of a threat actor tracked by Microsoft under the Moniker Storm-1575.

“The infrastructure used by DADSEC is also connected to new campaigns that leverage the Tycoon 2FA ‘Phishing-as-a-Service (PHAAS) platform,” said Cris Tomboc and King Orande of Trustwave Researchers. “The investigation into the Tycoon2FA phishing kit reveals how enemies continue to improve and expand tactics within the Service as a Phishing (PHAAS) ecosystem.”

Tycoon 2FA PHAS Operation

The growing popularity of PHAAS services is evidenced by the advent of a new “plug and play” Chinese kit called Haoji. It is estimated that by selling advertising to third-party services, it has driven more than $280,000 in the past five months criminal transactions. It works on a subscription basis for $2,000 a year.

“Unlike legacy phishing kits, where attackers need to manually configure scripts and infrastructure, Haozi offers sophisticated, public web panels,” Netcraft said. “When an attacker purchases a server and puts its credentials in a panel, the phishing software is automatically set up and does not need to run a single command.”

“This frictionless setup is in contrast to other PHAAS tools like the AI-enabled Darcula suite, which still requires minimal command line use.”

In addition to supporting an admin panel that allows users to manage all their campaigns in one place, Haozi has found it to provide advertising space. It acts as an intermediary that connects phishing kit buyers with third-party services, such as those related to SMS vendors.

See also  The new Atomic Macos Stealer campaign targets Apple users by exploiting Clickfix
Haozi Phishing Dashboard

Another aspect that distinguishes Haozi from other kits is its dedicated after-sales telegram channel (@yuanbaoaichiyu).

“As enterprise security teams become more effective at detecting and dealing with intrusion attempts, attackers are deploying social engineering and phishing scams.

“The provision of PHAAS reduces skills floor and scale campaigns through automation and community support. These new models work more like a SaaS business than a black market hacking group with subscription pricing, customer service and product renewals.”

In an advisory published last week, Microsoft revealed how the PHAAS platform promotes enemy (AITM) qualification phishing, adopting a surge in Multi-Factor authentication (MFA).

Other techniques include device code phishing. OAuth consent phishing. Threat actors employ the Open Authentication (OAUTH) protocol and send emails with malicious consent links from third-party applications. The device participates in phishing. Here, the threat actor uses phishing links to trick the targets and allow the actor-controlled device domain binding.

Windows Maker said it observed suspected threat actors related to Russia employ third-party application messages or emails referring to future meeting invitations to provide malicious links with valid authorization codes. This technique was first documented by Volexity in April 2025.

“While both end users and automated security measures have a greater ability to identify malicious phishing attachments and links, motivated threat actors continue to rely on exploiting human behavior with persuasive lures,” said Igor Sakhnov, Corporate Vice President and Deputy CISO of Identity at Microsoft.

“Because these attacks depend on deceiving users, user training and recognition of commonly identified social engineering techniques are key to defending them.”

Share This Article
Facebook Twitter Copy Link
Previous Article How AI agents are transforming the education sector: See Kira Learning and Beyond How AI agents are transforming the education sector: See Kira Learning and Beyond
Next Article New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora New Linux flaws allow password hash theft via core dumps in Ubuntu, Rhel, Fedora
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular News

Musk’s decision to limit political spending leaves some Republicans cold

Musk’s decision to limit political spending leaves some Republicans cold

Elon Musk's pledge to retreat from campaign spending -- if…

June 2, 2025
GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

McKinnack Island, Mich. -- Republican Rep. Bill Huizenga is preparing…

June 2, 2025
'It betrays our values': Progressives grapple with deadly shooting

'It betrays our values': Progressives grapple with deadly shooting

Progressive is tackling that two people who worked at the…

June 2, 2025
Beshear, Khanna to headline Dem mayor summit in July

Beshear, Khanna to headline Dem mayor summit in July

Two potential 2028 presidential primary candidates will descend on Cleveland…

June 2, 2025
Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

24 hours after Sunday's announcement that former President Joe Biden…

June 2, 2025

You Might Also Like

AI Control Dilemma: Risks and Solutions
Technology

AI Control Dilemma: Risks and Solutions

9 Min Read
Microsoft Discovery: How AI Agents Accelerate Scientific Discovery
Technology

Microsoft Discovery: How AI Agents Accelerate Scientific Discovery

9 Min Read
How AI agents are transforming the education sector: See Kira Learning and Beyond
Technology

How AI agents are transforming the education sector: See Kira Learning and Beyond

11 Min Read
HPE issues a security patch for StoreOnce bugs that allow remote authentication bypass
Technology

HPE issues a security patch for StoreOnce bugs that allow remote authentication bypass

2 Min Read
newstrooper
newstrooper

Welcome to News Trooper, your reliable destination for global news that matters. In an age of information overload, we stand as a dedicated news platform committed to delivering timely, accurate, and insightful coverage of the world’s most significant events and trends.

  • Business
  • Entertainment
  • Gaming
  • Politics
  • Sports
  • Technology
  • Travel
  • World News
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2025 All Rights Reserved | Powered by News Trooper News

Welcome Back!

Sign in to your account

Lost your password?