TRENDING TOPICS DEC 11, 2025

Spiderman Phishing Toolkit Expands into High-Volume Bank Fraud

The Spiderman phishing framework represents a major escalation in phishing-as-a-service activity targeting European financial institutions. It offers an integrated platform that allows criminal operators to generate precise replicas of dozens of bank portals with minimal effort, enabling quick shifts between targets across multiple countries. The widespread availability of the phishing kit is evident from a large user base coordinated through a Signal group, indicating ongoing, high-volume activity. Its control panel provides operators with continuous insight into victim sessions, capturing credentials, payment data, identity details, and PhotoTAN codes in real time. Automation across every stage removes the need for technical expertise, making advanced bank phishing accessible to lower-skilled threat actors. The kit’s reach now extends into cryptocurrency theft, with dedicated modules built to harvest seed phrases from well-known wallet providers. Spiderman’s design signals a growing trend toward multi-channel financial fraud that blends traditional banking attacks with crypto-focused theft. The toolkit’s emphasis on evasion and adaptive targeting further increases its impact. The multi-step data collection workflow is tailored to overcome European financial authentication flows, enabling operators to gather login credentials, one-time codes, and full identity packets within a single victim session. The modular structure allows rapid updates, raising concerns that the kit will evolve alongside new authentication methods and banking interfaces. Given the scale, automation, and cross-platform reach of this threat, organizations should reinforce customer education, deploy stronger behavioral fraud detection, increase monitoring of credential misuse patterns, and collaborate with financial institutions to disrupt phishing infrastructure more rapidly.

Rust-Based 01flip Ransomware Expands Cross-Platform Capabilities in APAC Attacks

The newly identified 01flip ransomware family marks a shift toward more advanced development practices, using Rust to support parallel Windows and Linux targeting with nearly identical functionality across both platforms. Palo Alto Researchers first identified the malware through a suspicious Windows executable that behaved like ransomware and later uncovered a Linux version that evaded detection on VirusTotal for months. Early victims appear concentrated in Southeast Asia, with indicators suggesting compromises in critical infrastructure sectors and evidence of related data leaks shared on dark web forums. The threat actor tracked as CL-CRI-1036 gained initial access through older, exposed vulnerabilities before deploying the Sliver framework to maintain persistence, move laterally, and distribute 01flip across multiple systems. An unusual reference to a “lockbit” extension in its exclusion list raises questions about possible operational overlap, though no direct technical link has been confirmed. Both variants underscore the growing use of modern languages to evade analysis and expand platform reach, amplifying the operational flexibility of financially motivated attackers. The consistency of dependencies and library versions demonstrates a deliberate design intended to streamline cross-platform deployment. At the same time, the reliance on older vulnerabilities highlights the continued risk posed by unpatched systems. After achieving initial access, operators leveraged Sliver modules for reconnaissance, credential theft, and rapid ransomware distribution, underscoring their proficiency with multi-stage intrusion workflows. The ransom process itself is straightforward: operators demand cryptocurrency payments and communicate through encrypted channels, though they do not appear to use formal extortion leak sites at this stage. As this malware continues to evolve, organizations should strengthen endpoint monitoring for Rust-compiled binaries, enforce patching for long-standing vulnerabilities, and inspect for behaviors associated with Sliver and similar adversary-emulation frameworks. Additional defensive steps include deploying behavioral detection engines, reviewing exposure of internet-facing applications, and establishing rapid incident response pathways to contain and remediate early-stage compromise.

Update: AI-Themed Social Engineering Drives AMOS Stealer Campaign Against macOS Users

A recent investigation by Kroll uncovered a deceptive malware operation that exploits user trust in AI platforms to deliver the AMOS InfoStealer onto macOS systems. Threat actors purchased Google Ads that redirected victims to what appeared to be a legitimate ChatGPT session hosted on the real domain, dramatically reducing suspicion compared to typical phishing infrastructure. Once on the page, victims encountered a fabricated advertisement featuring ChatGPT-generated dialogue that presented a common troubleshooting narrative about Mac sound issues and offered a terminal command as the supposed fix. The command, however, initiated a malicious script that downloaded and installed AMOS, a stealer designed to capture browser data, system details, saved credentials, cookies, and crypto wallet information. This campaign blended technical exploitation with social engineering to bypass conventional phishing red flags, as the interaction originated from a trusted brand and mimicked a typical support workflow. Kroll confirmed the command itself is a known AMOS IOC, and forensic review showed how the prompt was framed to encourage unquestioned execution. The investigation also suggests the attackers manipulated ChatGPT output or spoofed the interface to circumvent safety guardrails, allowing them to present a fully malicious command under the guise of AI assistance. The campaign’s sophistication reflects broader risks emerging as AI platforms become embedded in daily and corporate processes. Nearly half of businesses rely on AI tools for operational tasks, and a significant percentage of employees use them for troubleshooting, giving attackers powerful social-engineering leverage. By positioning malicious commands within a familiar, trusted workflow, adversaries effectively removed user skepticism and achieved a clean infection path without email attachments or fraudulent websites. This marks a shift toward malware delivery strategies that rely on behavioral manipulation rather than infrastructure deception, making detection more challenging for both individuals and security teams. The attack also highlights the growing abuse of legitimate advertising platforms, where compromised or manipulated sessions can be promoted above organic search results. Organizations should strengthen guidance on validating technical instructions, improve detection of abnormal command execution on macOS, monitor for script-based ingress events, and reinforce user education on AI-generated content. Security programs should incorporate governance controls for AI usage, validate troubleshooting steps through official vendor channels, and expand monitoring for known AMOS indicators to reduce the risk of similar socially engineered compromises.

💡
Hunter Strategy encourages our readers to look for updates in our daily Trending Topics and on Twitter.