Description

A complex spear-phishing campaign exposed in May 2025 has started going after CFOs and other senior financial executives in banking, energy, insurance, and investment firms around the world. Impersonating high-level recruitment efforts from Rothschild & Co, the campaign uses highly customized emails to exploit executives in countries such as Europe, Africa, Canada, the Middle East, and South Asia. Security researchers observed the activity based on CAPTCHA anomalies and evasive URL patterns, indicative of a willful and highly orchestrated effort to circumvent conventional email defenses. The attackers leverage advanced social engineering mechanisms and in-depth knowledge of corporate hierarchies, so that the emails look believable to high-value targets. Victims are sent a spurious PDF attachment to a Firebase-hosted phishing website, whose custom CAPTCHA (e.g., "9 + 10 = ?") prevents automated detection. After the form is filled out, the site takes the user to a malicious file download page impersonating secure document portals. The ZIP downloaded with the payload includes a VBS script that installs and downloads further payloads like NetBird a genuine WireGuard-based remote access tool and OpenSSH packages, which allow for stealthy access to compromised systems. The multi-stage infection process quietly raises privilege levels, establishes a concealed admin user ("user" with password "Bs\\@202122"), and enables Remote Desktop Protocol, which provides sustained attacker access. Trellix researchers associated some of the infrastructure with prior nation-state activities, although attribution isn't confirmed. The campaign represents a change of tactics by threat actors preferring stealth and persistence, as well as strategic intelligence gathering, over prompt financial exfiltration. Its precision, magnitude, and technical complexities underscore the imperative of increased executive-level phishing awareness and more robust endpoint controls for legitimate tool misuse.