Cyber Threat Brief — March 18 2026

⚠️ This report is AI-generated. Always validate findings.

Previous brief: Cyber Threat Brief — March 17 2026


1. LeakNet Ransomware: ClickFix + Deno “Bring Your Own Runtime” Chain

Summary

LeakNet has graduated from buying access to making their own — and they brought JavaScript along for the ride. The group now delivers ClickFix lures via compromised websites, then uses the legitimate Deno JS/TS runtime to execute Base64-encoded payloads directly in memory, skipping disk and blending into developer tooling noise. ReliaQuest published full technical details on March 17, calling the tactic “BYOR” (Bring Your Own Runtime). The consistency of the post-exploitation sequence is LeakNet’s biggest weakness for defenders.

What’s New (Last 24 Hours)

  • ReliaQuest published full technical breakdown of LeakNet’s new initial access chain (ClickFix via compromised legitimate sites) and Deno-based in-memory loader
  • Attack scripts confirmed as Romeo*.ps1 (VBS initiator) and Juliet*.vbs naming pattern
  • Post-exploitation sequence: DLL sideloading via jli.dll loaded by Java from C:\ProgramData\USOShared, credential discovery via klist, lateral movement via PsExec, and exfiltration to Amazon S3 buckets
  • ClickFix lure delivers fake CAPTCHA that instructs user to paste msiexec.exe command into Windows Run dialog

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
msiexec.exe spawned from browser or Run dialogProcessT1218.007 – MsiexecEDR Process CreateAlert on msiexec.exe with unusual parent (browser, explorer triggered by Run)
Romeo*.ps1 / Juliet*.vbs file naming patternFileT1059.001 – PowerShellEDR File Create / Script Block LogsHunt for VBS/PS1 files with Romeo or Juliet in name in temp/user dirs
Deno.exe executing outside development directoriesProcessT1204.002 – Malicious FileEDR Process CreateAlert on deno.exe execution from non-dev paths (AppData, ProgramData, Temp)
Base64-encoded JavaScript payload executed in memory via DenoTTPT1027 – Obfuscated Files or InformationEDR Memory / Script Block LogsHunt for deno.exe with --eval or inline base64 args
jli.dll loaded by java.exe from C:\ProgramData\USOSharedFile / DLLT1574.002 – DLL Side-LoadingEDR Image LoadAlert on java.exe loading DLLs from ProgramData\USOShared
klist execution for Kerberos ticket enumerationCommandT1558 – Steal or Forge Kerberos TicketsEDR Process CreateAlert on klist.exe spawned from non-admin or scripted context
PsExec used for lateral movement post-compromiseToolT1570 – Lateral Tool TransferEDR Process Create / NetworkAlert on psexec.exe or psexesvc.exe outside authorized admin windows
Outbound traffic to Amazon S3 buckets for exfiltrationNetworkT1567.002 – Exfiltration to Cloud StorageProxy / FirewallDetect high-volume outbound to s3.amazonaws.com from non-cloud workloads

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkMalicious PowerShell Process - Encoded Command, Malicious PowerShell Process - Execution Policy Bypass, Possible Lateral Movement PowerShell SpawnThese rules catch the Romeo*.ps1 PowerShell execution phase and lateral movement spawned via scripting, but do not natively detect Deno specifically — a custom rule scoped to deno.exe executing outside dev paths is required
ElasticPotential Execution via FileFix Phishing Attack, Command and Scripting Interpreter via Windows ScriptsElastic has a dedicated ClickFix detection (FileFix Phishing) covering the msiexec/Run dialog lure; the Windows Scripts rule covers the Juliet*.vbs execution phase
SigmaBase64 Encoded PowerShell Command Detected, Bad Opsec Powershell Code ArtifactsCover the Base64/PowerShell execution phase; no Sigma rule exists specifically for Deno-as-loader — custom detection needed for deno.exe with memory-execution arguments outside IDE/dev paths

Sources


2. Claude Fraud: AI Developer Tool Weaponized for MacSync + Windows Infostealer

Summary

A sophisticated multi-variant campaign — now called “Claude Fraud” by 7AI — is targeting developers and security practitioners by exploiting the Claude.ai and VS Code brands. Two confirmed attack paths: a macOS Google Ads vector delivering the MacSync infostealer via a ClickFix-style terminal command, and a trojanized VS Code extension executing PowerShell silently on Windows. Over 15,600 documented victims publicly. The attack is clever precisely because it targets people who should know better — and currently active Squarespace-hosted fake pages are still live.

What’s New (Last 24 Hours)

  • 7AI Threat Research published full technical breakdown covering both macOS and Windows attack paths (March 17)
  • Two confirmed C2 domains: a2abotnet[.]com (macOS/MacSync) and claude-code.official-version[.]com (Windows); wildcard block recommended: *.official-version[.]com
  • macOS: Code.exe → powershell.exe → mshta.exe with remote URL as primary Windows detection signal
  • macOS detection signal: osascript spawned following curl or base64 decode execution
  • MacSync targets macOS Keychain, browser credentials, session cookies, and crypto wallets; sends via HTTP POST with hardcoded auth token
  • The original claude.ai artifact vector was taken down; operators immediately pivoted to a Squarespace-hosted fake page within the same ad campaign

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
a2abotnet[.]comC2 DomainT1071.001 – Web ProtocolsDNS / ProxyBlock and alert on any DNS resolution or HTTP traffic
claude-code.official-version[.]comC2 DomainT1071.001 – Web ProtocolsDNS / ProxyBlock immediately; wildcard block *.official-version[.]com
Code.exe → powershell.exe → mshta.exe with remote URLProcess ChainT1218.005 – MshtaEDR Process CreateAlert on Code.exe (VS Code) spawning powershell.exe which spawns mshta.exe with URL argument
osascript spawned after curl or base64 decodeProcessT1059.002 – AppleScriptEDR (macOS)Hunt for osascript execution with parent curl or shell decode context
Base64-encoded bash command from terminal (macOS ClickFix)CommandT1059.004 – Unix ShellEDR (macOS) Process / Shell LogsAlert on bash -c with base64 -d piped to sh/bash in interactive terminal sessions
MacSync HTTP POST with hardcoded auth token to C2NetworkT1041 – Exfiltration Over C2 ChannelProxy / NDRDetect POST requests to a2abotnet[.]com; look for User-Agent spoofing macOS browser strings
Trojanized VS Code extension installing silentlyFileT1176 – Browser ExtensionsEDR File / RegistryMonitor VS Code extension installs outside marketplace or with unusual publisher certs

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkWindows Spearphishing Attachment Onenote Spawn Mshta, Windows Developer-Signed MSIX Package InstallationMshta spawning detection partially covers the Windows Code.exe→mshta.exe chain; no native Splunk rule targets the VS Code extension as parent
ElasticBase64 Decoded Payload Piped to Interpreter, Suspicious Web Browser Sensitive File AccessThe Base64 decode rule covers the macOS terminal bash-decode-pipe attack vector; browser credential access rule covers MacSync’s DPAPI/Keychain targeting
SigmaMSHTA Execution with Suspicious File Extensions, JXA In-memory Execution Via OSAScriptMSHTA rule covers the Windows execution chain; OSAScript rule covers macOS osascript execution post-decode; neither targets Code.exe parent specifically — extend with parent filter

Sources


3. Payload Ransomware: Babuk Derivative with ESXi Targeting and ETW Blinding

Summary

A new ransomware group calling itself “Payload” emerged in February and is already hitting hospitals, energy companies, and telecom providers across seven countries. The Windows binary is a well-implemented Babuk derivative using Curve25519 + ChaCha20, and it comes with an ESXi locker that parses vmInventory to find and encrypt VMs in parallel. Its self-removal via NTFS alternate data streams and ETW patching to blind EDRs make it a serious hunting challenge. The in-memory string MakeAmericaGreatAgain and the FBIthread-pool-%d / expand 32-byte kFBI constants are reliable detection anchors.

What’s New (Last 24 Hours)

  • GBHackers published reverse engineering analysis on March 17 with confirmed detection signatures
  • Group claimed Royal Bahrain Hospital as victim (110 GB exfiltrated, deadline March 23)
  • Total claimed victims: 12 organizations, 2,603 GB stolen data
  • ESXi locker confirmed: uses vmInventory parsing for VM disk targeting via threaded encryption
  • Windows binary kills backup/security tools, deletes shadow copies, wipes event logs, and patches ETW functions to blind endpoint detection
  • Binary self-removes via NTFS alternate data stream trick
  • Mutex name: MakeAmericaGreatAgain — unique and detectable
  • Many AV engines currently mislabeling as Babuk due to code reuse

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
Mutex: MakeAmericaGreatAgainMutexT1486 – Data Encrypted for ImpactEDR / MemoryHunt for processes creating this mutex — high-confidence Payload indicator
In-memory string expand 32-byte kFBI (Windows)Memory ArtifactT1486 – Data Encrypted for ImpactEDR Memory Scan / YARAYARA rule: scan memory for expand 32-byte kFBI string adjacent to ChaCha20 sigma constant
FBIthread-pool-%d string in Linux/ESXi ELF binaryMemory ArtifactT1486 – Data Encrypted for ImpactYARA / AV / EDR (Linux)Scan ESXi host memory and staging paths for FBIthread-pool string pattern
.payload file extension appended to encrypted filesFileT1486 – Data Encrypted for ImpactEDR File CreateAlert on rapid mass file renaming with .payload extension
Shadow copy deletion via vssadmin or PowerShellCommandT1490 – Inhibit System RecoveryEDR Process CreateAlert on vssadmin.exe delete shadows or WMI-based shadow deletion
ETW patching to disable EDR telemetryTTPT1562.001 – Disable or Modify ToolsEDR / Kernel TelemetryMonitor for NtTraceControl or WriteProcessMemory targeting ntdll ETW functions
vmInventory file access on ESXi hostsFile AccessT1082 – System Information DiscoveryESXi Syslog / File AuditAlert on unexpected processes reading /vmfs/volumes/*/vmInventory
Ransom note creation across file sharesFileT1486 – Data Encrypted for ImpactEDR File CreateAlert on bulk creation of identically-named TXT/HTML files across shares

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkDelete ShadowCopy With PowerShell, Windows WMIC Shadowcopy Delete, Disable ETW Through Registry, Ransomware Notes bulk creation, ESXi Download ErrorsShadow copy deletion rules cover T1490; ETW registry rule covers registry-based ETW disabling (supplement with process-memory patch detection); ransomware notes rule covers bulk note drop; ESXi rule covers download anomalies but not vmInventory access specifically
ElasticVolume Shadow Copy Deleted or Resized via VssAdmin, Volume Shadow Copy Deletion via PowerShell, Ransomware - Detected - Elastic Defend, Potential Linux Ransomware Note Creation DetectedStrong coverage for shadow copy destruction and behavioral ransomware detection; Linux note creation rule covers ESXi post-encryption drop; no Elastic rule specifically targets mutex-based detection for MakeAmericaGreatAgain
SigmaDeletion of Volume Shadow Copies via WMI with PowerShell, ESXi Syslog Configuration Change Via ESXCLI, Antivirus Ransomware DetectionSigma covers shadow copy deletion and ESXi config changes that may indicate attacker cleanup; AV signature rule will catch Payload once engines update from Babuk-mislabeling; YARA rules for in-memory strings are the highest-value gap to fill

Sources


4. Chrome Zero-Days CVE-2026-3909 & CVE-2026-3910 Added to CISA KEV

Summary

Google patched two zero-days in Chrome that are actively being exploited in the wild — both now in the CISA KEV catalog with a federal patch deadline of March 27. CVE-2026-3909 is an out-of-bounds write in Skia (the 2D graphics library), and CVE-2026-3910 is an improper restriction flaw in the V8 JavaScript engine. Both are drive-by exploits: a victim browses to a crafted page and the exploit fires silently. CISA has not confirmed ransomware use, but memory corruption primitives like these are standard precursors to sandbox escape and code execution.

What’s New (Last 24 Hours)

  • CISA added both CVE-2026-3909 (Skia OOB write) and CVE-2026-3910 (V8 improper restriction) to KEV on March 17
  • Federal deadline for patching: March 27, 2026
  • Exploit delivery vector: malicious/compromised HTML page — no user interaction beyond browsing required
  • CVE-2026-3909 confirmed exploitable via remotely crafted HTML, leading to memory corruption and potential code execution
  • CVE-2026-3910 targets V8 sandbox restrictions within Chromium’s JavaScript engine

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
Chrome/Chromium processes spawning unexpected child processes after page loadProcessT1203 – Exploitation for Client ExecutionEDR Process CreateAlert on chrome.exe or chromium spawning shell, cmd, powershell, or network tools as children
Outbound connections from renderer process to non-CDN IPs after browse eventNetworkT1189 – Drive-by CompromiseEDR Network / NDRMonitor for unexpected outbound from Chrome renderer sandbox processes
Chrome version below patched build on endpointsSoftwareT1203 – Exploitation for Client ExecutionAsset Inventory / Endpoint ManagementImmediately identify and patch all Chromium-based browsers (Chrome, Edge, Opera); check version via google-chrome --version
Suspicious browser child process spawned on macOSProcessT1203 – Exploitation for Client ExecutionEDR (macOS)Suspicious Browser Child Process Elastic rule fires when Chrome spawns unexpected binaries

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkCisco Secure Firewall - Citrix NetScaler Memory Overread AttemptNo direct Splunk rule for Chrome memory exploitation; network-layer coverage via firewall rules blocking malicious page sources; deploy browser version compliance checks via Splunk UBA or asset inventory
ElasticSuspicious Browser Child ProcessCovers post-exploitation child process spawning from Chrome on macOS; this is the highest-value existing detection for browser exploit post-exploitation
SigmaSuspicious Browser Child Process - MacOSCovers macOS Chrome child process anomalies; no Windows Sigma rule specifically targets Chromium renderer sandbox escape child processes — custom rule recommended for chrome.exe spawning cmd/powershell

Sources


5. Wing FTP Server CVE-2025-47813 Added to CISA KEV — Attack Chain Enabler

Summary

CISA added CVE-2025-47813 to KEV on March 16 — a medium-severity info-disclosure bug in Wing FTP Server that leaks the local installation path via a malformed UID cookie on /loginok.html. By itself, meh. But paired with CVE-2025-47812 (CVSS 10.0, already weaponized since July 2025 to run Lua payloads and install RMM tools), this becomes a reliable two-step attack chain: path disclosure unlocks the RCE. Patch deadline for federal agencies: March 30.

What’s New (Last 24 Hours)

  • CISA formally added CVE-2025-47813 to KEV catalog (March 16/17 reporting window)
  • Aviatrix TRC analysis confirmed: attackers are chaining CVE-2025-47813 path disclosure with CVE-2025-47812 RCE for privilege escalation and lateral movement
  • Exploitation path: authenticated request to /loginok.html with oversized UID cookie value → error message reveals local server path → path used to target CVE-2025-47812 RCE
  • Prior CVE-2025-47812 exploitation involved downloading malicious Lua files, reconnaissance, and RMM tool installation

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
HTTP GET/POST to /loginok.html with oversized UID cookieWeb RequestT1190 – Exploit Public-Facing ApplicationWeb/App Server LogsAlert on requests to /loginok.html with UID cookie value length > OS max path (260 bytes Windows, 4096 Linux)
Wing FTP Server error response containing local file pathLog PatternT1190 – Exploit Public-Facing ApplicationWeb/App Server LogsLook for Wing FTP error log entries containing full filesystem paths — these indicate CVE-2025-47813 triggering
Unexpected Lua file execution within Wing FTP contextProcessT1059 – Command and Scripting InterpreterEDR Process CreateAlert on lua.exe or lua script execution spawned from Wing FTP server processes
RMM tool installation (Atera, AnyDesk, etc.) after FTP exploitationProcessT1219 – Remote Access SoftwareEDR Process CreateHunt for RMM installers executed from Wing FTP server working directory
Wing FTP Server version ≤ 7.4.3SoftwareT1190 – Exploit Public-Facing ApplicationAsset InventoryInventory all Wing FTP deployments; patch to ≥ 7.4.4 immediately

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkWS FTP Remote Code Execution, Windows Privilege Escalation Suspicious Process Elevation, ConnectWise ScreenConnect Path TraversalWS FTP RCE rule covers post-exploitation process spawning from FTP server context (adaptable for Wing FTP); path traversal rule pattern is applicable to URI-based path disclosure; privilege escalation rules cover post-RCE elevation
ElasticPotential Privilege Escalation via Recently Compiled ExecutablePartial coverage of post-exploitation UID-based privilege escalation on Linux Wing FTP deployments; no Elastic rule specifically targets Wing FTP application behavior
SigmaPath Traversal Exploitation Attempts, OpenCanary - FTP Login AttemptPath traversal web rule partially covers the oversized UID cookie attempt if web logs are ingested; no Wing FTP-specific Sigma rule exists — write a custom web log rule targeting /loginok.html with large UID cookie

Sources


6. ACRStealer + HijackLoader: NT Syscall Evasion and AFD-Based C2

Summary

G DATA published a deep analysis of ACRStealer (now integrated into HijackLoader infrastructure) showing a significant evasion upgrade: the malware has ditched Win32 API calls in favor of raw NTCalls and WoW64 syscalls to bypass user-mode hooks. It’s also swapped its C2 comms from Dead Drop Resolver to NTSockets via the Ancillary Function Driver (AFD), blending with legitimate HTTPS. Steam accounts, Chrome cookies, and DPAPI-protected browser credentials are primary targets. Published March 12, within the 24h window via the X/ETLabs threat intelligence summary from March 17.

What’s New (Last 24 Hours)

  • G DATA full technical analysis surfaced via ETLabs threat intelligence summary (March 17)
  • C2 communication shifted from Dead Drop Resolver to NTSockets / Ancillary Function Driver (AFD) to avoid high-level API detection
  • Malware locates ntdll.dll, resolves functions via modified djb2 hash, uses WoW64 transition gate to bypass user-mode hooks
  • App Bound Encryption bypass to extract raw AES master keys from browser versions that implement it
  • PowerShell used for secondary payload execution and process hollowing
  • Renamed compiled binary to hex on victim hosts
  • Active IOCs: 13 files, 1 IP, 1 domain, 1 URL, 2 hashes (retrieve from G DATA report)

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
Process named hex executing from user-writable pathsProcessT1036.005 – Match Legitimate Name or LocationEDR Process CreateAlert on hex.exe or hex process from AppData, Temp, or Downloads — not standard system binary
NTSocket / AFD driver direct calls from non-system processesAPIT1071.001 – Web ProtocolsKernel Telemetry / EDRMonitor for processes making direct AFD syscalls (NtDeviceIoControlFile targeting \Device\Afd) outside browser/system context
ntdll.dll loaded and function enumerated via modified djb2 hashMemoryT1055 – Process InjectionEDR Memory ScanHunt for processes that load ntdll, resolve exports dynamically (no import table entries) — behavior visible via ETW
DPAPI CryptUnprotectData called from non-browser processAPIT1555.003 – Credentials from Web BrowsersEDR API MonitorAlert on CryptUnprotectData called by non-browser processes accessing %APPDATA%\Local\Google\Chrome\User Data
PowerShell spawned for process hollowing / secondary payloadProcessT1059.001 – PowerShellEDR Process CreateAlert on powershell.exe spawned with encoded command or from non-admin parent in user context
Steam session files accessed from non-Steam processFile AccessT1552.001 – Credentials in FilesEDR File AccessAlert on reads to %LOCALAPPDATA%\Steam\config\loginusers.vdf from non-steam.exe processes

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkWindows Credentials from Web Browsers Saved in TEMP Folder, Windows Process Injection Of Wermgr to Known Browser, Rundll32 CreateRemoteThread In BrowserBrowser credential theft rules cover the DPAPI exfiltration path; process injection rule covers hollowing attempts; no Splunk rule natively detects AFD-level network evasion — kernel telemetry gap
ElasticBrowser Process Spawned from an Unusual Parent, Suspicious Web Browser Sensitive File AccessBrowser unusual parent rule catches HijackLoader’s process hollowing attempts; browser sensitive file access rule covers Chrome credential file reads from non-browser processes
SigmaAccess to Browser Login Data, Suspicious File Access to Browser Credential Storage, Potential Browser Data StealingFile access rules directly target browser credential file reads from suspicious processes — high relevance for ACRStealer DPAPI extraction behavior; AFD-level evasion has no Sigma coverage

Sources


7. CVE-2026-32746: Critical Unpatched GNU InetUtils telnetd RCE (CVSS 9.8)

Summary

A critical out-of-bounds write vulnerability in the GNU InetUtils telnet daemon (telnetd) allows an unauthenticated remote attacker to execute arbitrary code with root privileges — no credentials needed, no user interaction required. The flaw resides in the LINEMODE Set Local Characters (SLC) suboption handler and is exploitable during the initial connection handshake, before any login prompt appears. Since telnetd typically runs as root under inetd/xinetd, successful exploitation gives immediate root access. No patch is available yet (expected by April 1, 2026). Israeli cybersecurity firm Dream discovered and disclosed the flaw on March 11, with public technical details published March 18.

What’s New (Last 24 Hours)

  • Full technical details published March 18 by multiple sources including The Hacker News, CybersecurityNews, and GBHackers
  • CVE-2026-32746 assigned with CVSS 9.8 — maximum network exploitability
  • Exploitation occurs during the initial Telnet option negotiation phase (before authentication), meaning standard login audit logs will NOT capture the attack
  • All GNU InetUtils versions through 2.7 are vulnerable (versions 1.9.3 through 2.7 confirmed)
  • No patch available — fix expected no later than April 1, 2026
  • The attack vector is a specially crafted LINEMODE SLC suboption message with oversized payload sent during connection handshake
  • CWE-77 (command injection) classification

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
LINEMODE SLC suboption with payload > 90 bytes on port 23Network SignatureT1190 – Exploit Public-Facing ApplicationIDS/IPS (Snort/Suricata)Deploy IDS rule: alert on Telnet LINEMODE SLC suboption negotiation packets exceeding 90 bytes — this is the pre-auth exploit trigger
Inbound connections to port 23 from external IPsNetworkT1190 – Exploit Public-Facing ApplicationFirewall / Network FlowImmediately audit all internet-facing port 23 services; block external access to Telnet where possible
Unexpected shell spawning from in.telnetd or telnetd processProcessT1059 – Command and Scripting InterpreterEDR Process CreateAlert on telnetd spawning processes other than login shells (e.g., wget, curl, nc, python, perl)
New files created in /tmp or world-writable dirs by telnetd child processFileT1105 – Ingress Tool TransferEDR File Create / AuditdMonitor for file creation in /tmp or /dev/shm by processes with telnetd ancestry
GNU InetUtils version ≤ 2.7 on any hostSoftwareT1190 – Exploit Public-Facing ApplicationAsset InventoryInventory all systems running telnetd; disable or firewall-restrict immediately until patch is available
Lateral movement from compromised telnetd host (root shell)TTPT1021 – Remote ServicesNDR / Auth LogsHunt for new SSH/RDP sessions originating FROM known telnetd hosts, especially with root-level credentials

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkLinux Addition of Cron Job, Linux Possible Backdoor User Modification, Linux Ingress Tool Transfer HuntingPost-exploitation coverage for persistence (cron, user creation) and tool transfer (wget/curl from telnetd); no Splunk rule specifically detects the pre-auth Telnet SLC buffer overflow — deploy custom IDS/Suricata rule and ingest alerts into Splunk
ElasticNetwork Connection via Recently Compiled Executable, Suspicious Shell Activity from BinaryCovers post-exploitation scenarios where attacker compiles tools on-host or spawns shells from binaries; no Elastic rule targets Telnet protocol exploitation specifically — gap at the network layer
SigmaLinux Reverse Shell Indicator, Linux Webshell IndicatorsReverse shell indicators partially cover the post-exploitation callback; webshell indicators may catch secondary payloads dropped by telnetd; critical gap: no Sigma/Splunk/Elastic rule exists for Telnet-level protocol exploitation — recommend deploying Suricata/Snort SLC overflow signature as primary detection

MITRE ATT&CK Mapping

TechniqueIDPhase
Exploit Public-Facing ApplicationT1190Initial Access
Command and Scripting InterpreterT1059Execution
Ingress Tool TransferT1105Command and Control
Remote ServicesT1021Lateral Movement

Sources


8. Konni APT: EndRAT Deployment via Spear-Phishing and KakaoTalk Account Hijacking

Summary

North Korea-linked threat group Konni (also tracked as UAC-0149 in some frameworks) has been running a multi-stage espionage campaign targeting South Korean individuals involved in North Korean human rights work. The attack starts with a spear-phishing email delivering a malicious LNK file inside a ZIP archive, which quietly installs EndRAT (an AutoIt-based RAT), RftRAT, and RemcosRAT for layered persistence. The distinguishing feature: after compromising a host, Konni hijacks the victim’s KakaoTalk desktop session and selectively sends malicious files to trusted contacts — turning a compromised individual into a distribution node. Genians published the full technical analysis on March 16, with wide reporting on March 17.

What’s New (Last 24 Hours)

  • Genians published full technical analysis of Konni’s integrated spear-phishing + KakaoTalk propagation campaign (March 16-17)
  • Three RAT families confirmed on a single victim host: EndRAT (AutoIt), RftRAT, and RemcosRAT — indicating high-value target selection
  • Initial LNK execution uses cmd.exe to spawn 32-bit PowerShell via SysWOW64 directory path — a technique to sidestep 64-bit security controls
  • PowerShell script locates the LNK file by matching a specific file size rather than hardcoded filename — resilient to renaming
  • Persistence established via Windows scheduled tasks
  • C2 infrastructure distributed across Finland, Japan, and the Netherlands; RftRAT C2 linked to known Konni IP 96.62.214[.]5 (Japan)
  • Post-compromise: attacker maintained long-term access, exfiltrated internal documents, and weaponized KakaoTalk to propagate malware to the victim’s contacts using North Korea-themed filenames as lures

Actionable Intel

ArtifactTypeATT&CK TechniqueData SourceHow to Use
96.62.214[.]5 (Japan-based RftRAT C2)C2 IPT1071.001 – Web ProtocolsFirewall / Proxy / NDRBlock and alert on any traffic to this IP — linked to historical Konni infrastructure
LNK file inside ZIP attachment spawning cmd.exe → powershell.exe (SysWOW64)Process ChainT1059.001 – PowerShellEDR Process CreateAlert on cmd.exe spawning powershell.exe from C:\Windows\SysWOW64 with LNK parent from user download/temp paths
PowerShell script that locates files by size rather than nameTTPT1059.001 – PowerShellScript Block Logs (4104)Hunt for PowerShell scripts using Get-ChildItem with -Length or file size matching logic in script block logs
Scheduled task created for RAT persistencePersistenceT1053.005 – Scheduled TaskEDR / Windows Event 4698Alert on scheduled tasks created by PowerShell or cmd.exe spawned from LNK execution context
EndRAT (AutoIt-compiled executable)MalwareT1059.010 – AutoHotKey & AutoITEDR Process CreateHunt for AutoIt-compiled executables (AutoIt3.exe or compiled .a3x) running from user-writable paths
RftRAT / RemcosRAT deployed alongside EndRATMalwareT1219 – Remote Access SoftwareEDR Process Create / NetworkMonitor for RemcosRAT behavioral signatures (mutex patterns, registry run keys) and outbound connections to non-standard ports
KakaoTalk desktop application sending files to contacts without user interactionLateral / PropagationT1534 – Internal SpearphishingEDR Process / File CreateAlert on KakaoTalk process creating or sending files when no keyboard/mouse input is detected (automation indicator)
North Korea-themed document filenames sent via KakaoTalkSocial EngineeringT1566.001 – Spearphishing AttachmentEmail/Messaging GatewayHunt for files with Korean-language North Korea-related filenames distributed through messaging platforms

Potential Detection Coverage Based on MITRE ATT&CK Technique

SourceDetectionsCoverage
SplunkWindows Command Shell DCRat ForkBomb Payload, Scheduled Task Deleted Or Created via CMD, Malicious PowerShell Process - Encoded Command, Any Powershell DownloadFileScheduled task creation and PowerShell download rules cover the persistence and payload retrieval phases; no Splunk rule specifically detects SysWOW64 PowerShell spawning from LNK or AutoIt-based RATs — custom correlation needed for cmd.exe → SysWOW64\powershell.exe chain
ElasticSuspicious Execution from a Mounted Device, Suspicious PowerShell Execution via Windows Scripts, Scheduled Task Created by Unusual ProcessScheduled task creation by unusual process rule covers the persistence mechanism; PowerShell suspicious args rule covers the encoded/download phases; no Elastic rule specifically targets KakaoTalk process abuse or AutoIt RAT execution
SigmaSuspicious LNK Double Extension File, Wow6432Node CurrentVersion Autorun Keys Modification, Suspicious Scheduled Task Creation via schtasks.exeLNK double extension rule partially covers the initial delivery; WOW64 registry key modification covers 32-bit persistence; schtasks creation covers the scheduled task mechanism; gap: no Sigma rule for AutoIt-compiled executable detection or KakaoTalk process abuse — custom rules needed

MITRE ATT&CK Mapping

TechniqueIDPhase
Spearphishing AttachmentT1566.001Initial Access
PowerShellT1059.001Execution
Scheduled TaskT1053.005Persistence
Internal SpearphishingT1534Lateral Movement
Remote Access SoftwareT1219Command and Control
Web ProtocolsT1071.001Command and Control

Sources