Description

Israeli cybersecurity firm Perception Point has identified a new phishing campaign named Operation PhantomBlu, targeting U.S. organizations to deploy the NetSupport RAT. This operation employs a sophisticated approach, utilizing Object Linking and Embedding (OLE) template manipulation within Microsoft Office documents to execute malicious code while evading detection. NetSupport RAT, derived from the legitimate NetSupport Manager remote desktop tool, enables threat actors to conduct various data gathering actions on compromised endpoints. The attack begins with a salary-themed phishing email from the accounting department, urging recipients to open an attached Microsoft Word document for the "monthly salary report." Analysis of email headers reveals the use of the legitimate email marketing platform Brevo (formerly Sendinblue) by the attackers. The Word document prompts victims to enter a provided password, enable editing, and double-click a printer icon to view a salary graph. This action leads to the execution of a PowerShell dropper from a ZIP archive file, retrieving and running a NetSupport RAT binary from a remote server. Operation PhantomBlu represents a departure from conventional NetSupport RAT deployment tactics, showcasing innovation in evasion tactics and social engineering. Meanwhile, Resecurity reports an increase in threat actors abusing public cloud services and Web 3.0 platforms like Pinata to generate fully undetectable phishing URLs using off-the-shelf kits. These URLs, offered on Telegram by underground vendors, are fortified with antibot barriers to evade detection. Additionally, tools like HeartSender facilitate the distribution of generated URLs at scale. The emergence of sophisticated techniques highlights the evolving nature of cyber threats, necessitating heightened vigilance and robust security measures by organizations to mitigate risks effectively.