Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025

Europol demonstrates $ 540 million in cryptocurrency fraud, arrests five suspects

June 30, 2025

Slide

June 30, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Slide
Global Security

Slide

AdminBy AdminJune 30, 2025No Comments4 Mins Read
Proton66 Hosting for Phishing, RAT
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


June 30, 2025Red LakshmananCybercrime / vulnerability

Hosting Proton66 for Physhing, Rat

Actor threats known as Room with high confidence is attributed to the use of the Russian hosting service that is not Proton66.

Trustwave Spiderlabs, in message Published last week, it said that she was able to make this connection, turning from digital assets related to Proton66, which led to the detection of an active threat cluster that uses the visual basic scenario (VBS) as its original attack vector and sets the Trojan remote access (rat).

Many subjects threaten count on BulletproWhile the Visual Basic (VBS) scenario may seem outdated, it’s stillHosting suppliers like Proton66 because these services intentionally ignore abuse reports and legal requests. This facilitates the launch of phishing sites, team servers and control and delivery systems for malware without interruption.

Cybersecurity company said she had determined a set of domains with a similar name scheme (for example, gfast.duckdns (.) Org, njfast.Duckdns (.) Org), starting in August 2024, all decided on the same IP -Drass (“45.135.232 () 38”)) Proton66.

The use of DNS dynamic services such as DuckDNS also plays a key role in these operations. Instead of registering new domains every time, the attackers turn subdomena tied to one IP – which complicates the detection of the defenders.

Cybersecurity

“The domains in question were used to accommodate various malicious contents, including phishing pages and VBS scripts that serve as the initial stage of deployment of malware,” said Serchi Melnyk, a researcher. “These scenarios act as a second -stage tools that are limited to public and often open source rats.”

Although the VBS may seem outdated, it is still a tool for initial access due to compatibility with Windows systems and the ability to work silently in the background. The attackers use it to load the forklifts malware, bypassing antivirus tools and attachment to users’ regular activity. These light scenarios are often the first step in multi -stage attacks that later unfold rats, data theft or Keyloggers.

Physping pages were found to be legitimate Colombian banks and financial institutions, including Bankolam, BBVA, Banco Caja Social and Davivienda. Slugas, which is also known as Aguilaciega, Apt-C-36 and APT-Q-98, known for its orientation on legal entities in South America, in particular Colombia and Ecuador.

Defined sites are designed to collect users’ accounting data and other secret information. Coridic VBS loads located on infrastructure are equipped with the capabilities for encrypted files from a remote server, essentially acting as a commodity rats such as Asyncrat or Remcos Rat.

In addition, the VBS codes analyzed the overlapping from VBS-CRYPTER, the tool associated with the CRYPTER subscription service Cryptors and tools This is used for tightening and packaging VBS loads to avoid detection.

Trustwave said he also discovered a botten panel that allows users to “control infected machines, receive exploited data and interact with infected final points through a wide range of opportunities that are usually found in the rats.”

Cybersecurity

Disclosure occurs when Darktrace revealed the details of Blind Eagle, which focused on Colombian organizations since November 2024 using the shortcomings in Windows (CVE-2024-4345) to download and execute the useful load on the next scene, the behavior that was First documented On control in March 2025.

“The perseverance called and the ability to adapt its tactics even after the output, and the speed at which the group was able to continue to use pre -installed TTPS, emphasizes that timely management of vulnerability and patch application, although substantial, is not autonomous,” company is not autonomous protection, “company company, company company Company – Note.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025

Europol demonstrates $ 540 million in cryptocurrency fraud, arrests five suspects

June 30, 2025

Pragmatic approach to NHI stocks

June 30, 2025

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025

Europol demonstrates $ 540 million in cryptocurrency fraud, arrests five suspects

June 30, 2025

Slide

June 30, 2025

Pragmatic approach to NHI stocks

June 30, 2025

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025

Europol demonstrates $ 540 million in cryptocurrency fraud, arrests five suspects

June 30, 2025

Slide

June 30, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.