TRENDING TOPICS APR 04, 2025

Microsoft Warns of Widespread Tax-Themed Phishing Campaigns  

Recent phishing campaigns tied to tax season target thousands of U.S. organizations with a mix of credential theft, malware delivery, and initial access operations. Microsoft Warns of emails arrive with PDF attachments containing QR codes, shortened URLs, or fake document links, redirecting victims to highly convincing phishing pages mimicking Microsoft 365, DocuSign, or tax platforms. These pages are generated using RaccoonO365, a phishing-as-a-service toolkit that tailors login portals based on the target's environment. Threat actors behind these operations, including the initial access broker Storm-0249, deliver malware families like Remcos, Latrodectus, GuLoader, and AHKBot to establish persistence and expand control. Some campaigns filter victims based on IP and system details, sending malware to high-value targets while redirecting others to harmless PDFs to avoid suspicion. Once a system is compromised, attackers can exfiltrate credentials, capture screenshots, and install secondary payloads for long-term access or resale. Beyond tax-related lures, threat actors employ various social engineering techniques to bypass secure email gateways and exploit user trust in well-known platforms. Campaigns have used fake DocuSign emails, Microsoft Excel macros, [.]LNK files disguised as tax forms, and spoofed Windows and Mac security alerts to trick users into launching malware. Trusted services—including Dropbox, Adobe, Canva, and Zoho—are being abused to host malicious files or redirect users through legitimate domains to phishing sites, making detection difficult. Some attacks are even promoted through Facebook ads, directing users to fake Windows download pages that deploy malware loaders. More advanced techniques include browser-in-browser overlays to steal gamers' credentials and use SVG files to slip past spam filters undetected. The combination of trusted branding, evasive infrastructure, and layered delivery mechanisms underscores a broader trend: phishing campaigns are no longer straightforward scams but sophisticated entry points into complex, multi-stage attacks.   

Update: North Korea's Expanding Cyber Tactics: Fake Interviews, Backdoors, and Insider Threats 

North Korean threat actors, including the Lazarus Group, have expanded their cyber operations by combining fake job interviews with a new tactic called ClickFix to trick cryptocurrency job seekers into installing a stealthy backdoor called GolangGhost. The attackers impersonate major crypto firms and convince candidates to join fake video interview platforms, where they are prompted to run commands that infect their systems with malware. This approach targets Windows and macOS users and delivers multiple payloads, including FROSTYFERRET, a data stealer mimicking Chrome camera permissions to harvest passwords and access sensitive data. Unlike past campaigns focused on software engineers, this effort targets business roles in asset management and product development, signaling a strategic pivot toward centralized finance firms. The malware supports full remote control, file theft, and browser data exfiltration, allowing long-term access to company environments. In parallel, a separate North Korean scheme involving fraudulent IT workers has gained momentum across Europe. These individuals pose as remote developers using fake identities sourced from GitHub or recycled profiles, taking on the web, CMS, and blockchain development projects while operating from sanctioned regions. Using platforms like Upwork and Telegram, they get paid through cryptocurrency and online banking services to obscure financial trails. Some actors now leverage insider access to extort companies, threatening to leak proprietary data if unpaid. The tactic has evolved to exploit companies with Bring Your Own Device policies, which lack enterprise-grade monitoring and controls. This shift in targeting and geography highlights North Korea’s flexible cyber strategy to circumvent sanctions, monetize access, and infiltrate trusted work environments under the guise of legitimate employment. 

Update: Hunters International Shifts Strategy: Ransomware Retired, Extortion Remains 

Hunters International, one of the more prolific ransomware operations in recent years, has officially shut down its ransomware-as-a-service offering and rebranded under the name "World Leaks," pivoting fully to data theft and extortion attacks. The decision follows months of declining ransomware profitability and increasing pressure from law enforcement, prompting the group to abandon encryption tactics altogether. Instead, affiliates are now using a customized exfiltration tool—likely evolved from their previous Storage Software—to automate data theft from victim networks, eliminating the risk and complexity of file encryption. Despite announcing its shutdown in late 2024, the group remained active and launched World Leaks at the start of 2025, targeting organizations globally with a refined extortion-only model. Hunters International had previously claimed over 280 victims, including Tata Technologies, AutoCanada, Hoya, Austal USA, and Integris Health, with ransom demands reaching millions. Their attacks impacted various sectors and platforms, including ESXi, Windows, Linux, and FreeBSD systems. This shift signifies a growing trend among cybercriminals: pure data extortion is less risky and still highly profitable, making it an increasingly attractive path for ransomware groups seeking to evade the spotlight while maximizing financial gain. 

💡
Hunter Strategy encourages our readers to look for updates in our daily Trending Topics and on Twitter.