<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</title>
	<atom:link href="https://www.seqrite.com/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.seqrite.com/blog</link>
	<description></description>
	<lastBuildDate>Fri, 03 Apr 2026 10:31:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>Operation DualScript – A Multi-Stage PowerShell Malware Campaign Targeting Cryptocurrency and Financial Activity</title>
		<link>https://www.seqrite.com/blog/operation-dualscript-powershell-malware-retrorat-analysis/</link>
		
		<dc:creator><![CDATA[Niraj Makasare]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 06:16:41 +0000</pubDate>
				<category><![CDATA[Technical]]></category>
		<category><![CDATA[banking trojan]]></category>
		<category><![CDATA[Clipboard Hijacking]]></category>
		<category><![CDATA[credential access]]></category>
		<category><![CDATA[cryptocurrency theft]]></category>
		<category><![CDATA[cyber attack analysis]]></category>
		<category><![CDATA[fileless malware]]></category>
		<category><![CDATA[financial malware]]></category>
		<category><![CDATA[in-memory execution]]></category>
		<category><![CDATA[info stealer]]></category>
		<category><![CDATA[IoC]]></category>
		<category><![CDATA[malware persistence]]></category>
		<category><![CDATA[MITRE ATT&CK]]></category>
		<category><![CDATA[multi-stage infection]]></category>
		<category><![CDATA[Operation DualScript]]></category>
		<category><![CDATA[Powershell malware]]></category>
		<category><![CDATA[Remote Access Trojan]]></category>
		<category><![CDATA[RetroRAT]]></category>
		<category><![CDATA[Scheduled Tasks abuse]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[VBScript launcher]]></category>
		<guid isPermaLink="false">https://www.seqrite.com/blog/?p=10009</guid>

					<description><![CDATA[<p>Operation DualScript – A Multi-Stage PowerShell Malware Campaign Targeting Cryptocurrency and Financial Activity Introduction During our investigation, we identified a multi-stage malware infection leveraging Scheduled Task persistence, VBScript launchers, and PowerShell-based execution. The attack operates through two parallel chains: a web-based PowerShell loader that retrieves remote payloads and a secondary PowerShell loader chain that executes [&#8230;]</p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/operation-dualscript-powershell-malware-retrorat-analysis/" data-wpel-link="internal" target="_self">Operation DualScript – A Multi-Stage PowerShell Malware Campaign Targeting Cryptocurrency and Financial Activity</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1><strong>Operation DualScript – A Multi-Stage PowerShell Malware Campaign Targeting Cryptocurrency and Financial Activity</strong></h1>
<h2><strong>Introduction</strong></h2>
<p>During our investigation, we identified a multi-stage malware infection leveraging Scheduled Task persistence, VBScript launchers, and PowerShell-based execution. The attack operates through two parallel chains: a web-based PowerShell loader that retrieves remote payloads and a secondary PowerShell loader chain that executes the RetroRAT implant.</p>
<p>By abusing legitimate Windows components and executing payloads directly in memory, the attackers minimize disk artifacts and evade traditional detection mechanisms.</p>
<h3><strong>Initial Findings</strong></h3>
<p>The investigation was initiated after identifying suspicious Scheduled Tasks executing VBScript files from user-accessible directories. The tasks were configured to launch hidden PowerShell commands, indicating potential abuse of native Windows scripting components for persistence.</p>
<p>Further examination revealed multiple suspicious artifacts, including:</p>
<ul>
<li>VBScript launchers invoking PowerShell with execution policy bypass</li>
<li>A PowerShell script (ppamproServiceZuneWAL.ps1) downloading and executing remote content from an external domain</li>
<li>Additional PowerShell scripts used to execute malicious payloads directly in memory</li>
</ul>
<p>Outbound connections to a remote web resource hosting Wallet.txt confirmed active command retrieval from an external server, indicating remote command execution capability.</p>
<p>These findings confirmed the presence of a persistent multi-stage compromise leveraging web-delivered payloads and in-memory PowerShell execution techniques.</p>
<h3><strong>Infection Chain Overview</strong></h3>
<p>The compromise involves two parallel execution chains triggered through persistence established via Windows Scheduled Tasks. Both chains leverage VBScript launchers and PowerShell execution to deploy malicious components while minimizing disk artifacts.</p>
<p>One chain retrieves and executes a remote PowerShell payload that performs cryptocurrency clipboard hijacking. The second chain uses a VBScript launcher (PiceVid.vbs) to execute a PowerShell-based payload (PiceVid.ps1) that deploys the RetroRAT malware for system monitoring, financial activity tracking, and remote command execution.</p>
<p>&nbsp;</p>
<figure id="attachment_10010" aria-describedby="caption-attachment-10010" style="width: 410px" class="wp-caption aligncenter"><img decoding="async" fetchpriority="high" class="size-full wp-image-10010" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture1-1.png" alt="" width="410" height="472" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture1-1.png 410w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture1-1-261x300.png 261w" sizes="(max-width: 410px) 100vw, 410px" /><figcaption id="caption-attachment-10010" class="wp-caption-text">Fig: Multi-Stage Attack Execution Flow.</figcaption></figure>
<h3><strong>Chain 1 – Web Backdoor Components</strong></h3>
<h3><strong>Scheduled Task Persistence</strong></h3>
<p>Persistence was established through Windows Scheduled Tasks configured to execute VBScript files from user-writable directories. The tasks invoke PowerShell in hidden mode with execution policy bypass enabled.</p>
<p>This ensures reliable re-execution of the malicious chain while avoiding traditional startup registry mechanisms.</p>
<h3><strong>VBS Launcher &#8211; ppamproServiceZuneWAL.vbs</strong></h3>
<p>This script serves as an execution intermediary, launching PowerShell silently. It does not contain the payload itself but acts as a controlled entry point into the remote loader chain.</p>
<h3><strong>Remote Loader &#8211; ppamproServiceZuneWAL.ps1</strong></h3>
<p>This script functions as a web-based backdoor and performs:</p>
<ul>
<li>Single-instance validation via WMI process enumeration</li>
<li>HTTP retrieval of remote script (Wallet.txt)</li>
<li>Dynamic execution using [ScriptBlock]::Create().Invoke()</li>
</ul>
<p>The remote payload is executed entirely in memory. Because the content is hosted externally, it can be updated dynamically, enabling continuous attacker control.</p>
<figure id="attachment_10011" aria-describedby="caption-attachment-10011" style="width: 626px" class="wp-caption aligncenter"><img decoding="async" class="size-full wp-image-10011" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture2.png" alt="" width="626" height="216" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture2.png 626w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture2-300x104.png 300w" sizes="(max-width: 626px) 100vw, 626px" /><figcaption id="caption-attachment-10011" class="wp-caption-text">Fig: PowerShell Loader Performing Single-Instance Check and Downloading Remote Payload</figcaption></figure>
<p>The <em>ppamproServiceZuneWAL.ps1</em> script acts as a <strong>PowerShell-based remote loader and execution controller</strong>. Initially, it retrieves its own script name using the $MyInvocation object and runs a function named CURRENT-instance, which checks all running powershell.exe processes through WMI to determine whether another instance of the same script is already active. If a duplicate instance is detected, the script exits to prevent multiple concurrent executions. After ensuring single-instance execution, the script loads the .NET networking library System.Net.Http and uses HttpClient to download remote content from <em>hxxps://anycourse[.]net/wp-content/uploads/2025/04/Wallet[.]txt</em>. The retrieved Wallet.txt file contains PowerShell commands controlled by the attacker. Instead of saving this content to disk, the script dynamically converts the downloaded text into executable PowerShell code using [ScriptBlock]::Create() and executes it directly in memory. This mechanism effectively transforms the script into a<strong> web-based backdoor that allows attackers to remotely update and execute commands on the compromised system by simply modifying the contents of </strong>Wallet.txt on the server.</p>
<h3><strong>Web Payload – Wallet.txt</strong></h3>
<p>The downloaded file contains PowerShell instructions delivered from an external server.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-10012" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture3.png" alt="" width="517" height="340" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture3.png 517w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture3-300x197.png 300w" sizes="(max-width: 517px) 100vw, 517px" /></p>
<p>This allows the attacker to:</p>
<ul>
<li>Issue commands</li>
<li>Update or redeploy components</li>
<li>Execute reconnaissance</li>
<li>Exfiltrate data</li>
</ul>
<p>This mechanism effectively converts the compromised system into a remotely controlled PowerShell implant.</p>
<p><em>Wallet.txt</em> contains a <strong>PowerShell clipboard-hijacking script</strong> designed to steal cryptocurrency transactions. The script continuously monitors the system clipboard for copied text and uses regular expression patterns to detect cryptocurrency wallet addresses such as Bitcoin or other crypto formats. When a matching address is found, the script replaces the copied wallet address with an attacker-controlled address stored in its internal dictionary. As a result, if the victim copies a legitimate wallet address to send cryptocurrency, the clipboard is silently modified so that the funds are redirected to the attacker’s wallet instead. The script continuously monitors the clipboard at regular intervals, allowing the attacker to <strong>covertly intercept and redirect cryptocurrency payments</strong> on the compromised system.</p>
<h3>Attacker-Controlled Cryptocurrency Wallet Addresses</h3>
<p>The <em>Wallet.txt</em> payload maintains a dictionary of attacker-controlled cryptocurrency wallet addresses. When a matching wallet format is detected in the clipboard, the malware replaces the victim’s address with the corresponding attacker-controlled wallet.</p>
<p>The replacement addresses cover multiple cryptocurrencies including</p>
<p>Bitcoin (BTC), Litecoin (LTC), Ethereum (ETH), Monero (XMR), XRP, NEO, Bitcoin Cash (BCH), Dogecoin (DOGE), Dash, Stellar (XLM), Binance Coin (BNB), Tezos (XTZ), Tron (TRX), VeChain (VET), DigiByte (DGB), Qtum, Cardano (ADA), Polkadot (DOT), Cosmos (ATOM), Lisk, Kava, Algorand (ALGO), Filecoin (FIL), Nano, NEM, Waves, Zcash (ZEC), Terra, and THORChain (RUNE).</p>
<h3><strong>Chain 2 – PowerShell Loader Components</strong></h3>
<h3><strong>VBS Launcher – PiceVid.vbs</strong></h3>
<p>This script triggers execution of PiceVid.ps1, acting as the entry point for the local loader chain and is executed through the scheduled task.</p>
<h3><strong>PowerShell Loader – PiceVid.PS1</strong></h3>
<p>The script contains the RetroRAT payload and is executed directly in memory.</p>
<figure id="attachment_10013" aria-describedby="caption-attachment-10013" style="width: 626px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10013" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture4.png" alt="" width="626" height="87" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture4.png 626w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture4-300x42.png 300w" sizes="(max-width: 626px) 100vw, 626px" /><figcaption id="caption-attachment-10013" class="wp-caption-text">Fig: PowerShell Loader (PiceVid.ps1) Reconstructing and Executing RetroRAT Payload in Memory</figcaption></figure>
<p>Instead of writing the payload to a separate executable file, the script reads its contents and executes it dynamically using <strong>Invoke-Expression (IEx)</strong>.</p>
<p>This approach enables the attacker to execute the malware while minimizing detectable artifacts on disk.</p>
<p>The in-memory payload identified during analysis corresponds to <strong>RetroRAT</strong>, a Remote Access Trojan targeting financial activity associated with <strong>U.S. banking institutions and cryptocurrency platforms</strong>. The malware monitors user activity, captures keystrokes, and selectively tracks interactions with financial services in order to harvest sensitive information.</p>
<h3><strong>Analysis of Payload – RetroRAT</strong></h3>
<p>The analyzed payload, referred to as RetroRAT, is a financially motivated Remote Access Trojan (RAT) targeting cryptocurrency and banking-related activity. The malware installs a global keyboard hook and continuously monitors active window titles for keywords associated with financial applications and commonly accessed banking or cryptocurrency platforms. Its modular architecture, combined with a TCP-based command-and-control (C2) communication channel, enables the attacker to execute remote commands, manipulate files, access clipboard data, and dynamically load additional assemblies directly into memory.</p>
<h3><strong>Defense Evasion and Anti-Analysis Techniques</strong></h3>
<p>The sample implements multiple anti-analysis and defense evasion techniques to avoid detection and restrict execution in analysis environments such as sandboxes, virtual machines, and automated malware analysis systems.</p>
<h3><strong>&#8211; Sandbox Evasion Checks</strong></h3>
<p>The sample contains a hard-coded list of common sandbox and analysis environment identifiers, including known usernames such as “John Doe”, “virus”, “test user”,  “sand box” etc.<br />
During execution, these values are compared against system attributes to detect potential analysis environments. If a match is found, the malware alters its behavior, likely as an evasion mechanism.</p>
<figure id="attachment_10014" aria-describedby="caption-attachment-10014" style="width: 666px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10014" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture5.png" alt="" width="666" height="64" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture5.png 666w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture5-300x29.png 300w" sizes="(max-width: 666px) 100vw, 666px" /><figcaption id="caption-attachment-10014" class="wp-caption-text">Fig – Current Username check against Commonly used Sandbox Usernames</figcaption></figure>
<figure id="attachment_10015" aria-describedby="caption-attachment-10015" style="width: 588px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="wp-image-10015 size-full" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture6.png" alt="" width="588" height="534" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture6.png 588w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture6-300x272.png 300w" sizes="(max-width: 588px) 100vw, 588px" /><figcaption id="caption-attachment-10015" class="wp-caption-text">Fig – Current Username check against Commonly used Sandbox Usernames</figcaption></figure>
<h3><strong>&#8211; Virtual Machine Detection</strong></h3>
<p>Malware also checks if is running under Virtual Machine by querying to Virtual Machine directories, drivers and related services. If it found any traces, it exits itself.</p>
<p>&nbsp;</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-10016" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture7.png" alt="" width="651" height="372" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture7.png 651w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture7-300x171.png 300w" sizes="(max-width: 651px) 100vw, 651px" /></p>
<figure id="attachment_10017" aria-describedby="caption-attachment-10017" style="width: 606px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="wp-image-10017 size-full" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture8.png" alt="" width="606" height="381" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture8.png 606w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture8-300x189.png 300w" sizes="(max-width: 606px) 100vw, 606px" /><figcaption id="caption-attachment-10017" class="wp-caption-text">Fig – Virtual Machine Artifacts Check</figcaption></figure>
<h3><strong>&#8211; Use of obfuscation</strong></h3>
<p>The payload makes heavy use of basic but effective obfuscation. Method and class names are aggressively renamed, and several identifiers contain Unicode control characters that make them appear broken inside the decompiler. In addition, most meaningful strings are stored encoded and reconstructed at runtime. This prevents straightforward static analysis and forces the analyst to observe values dynamically. Using de4dot, we were able to partially de-obfuscate binary, restoring readable method names.</p>
<h3><strong>Mutex Usage</strong></h3>
<p>Early during the execution, binary checks if a named mutex is already present into the system. If it is found, malware instantly terminates its execution by using Environment.Exit(0). The technique is commonly used by malware to avoid reinfecting the system.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-10018" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture9.png" alt="" width="374" height="81" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture9.png 374w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture9-300x65.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture9-370x81.png 370w" sizes="(max-width: 374px) 100vw, 374px" /></p>
<figure id="attachment_10019" aria-describedby="caption-attachment-10019" style="width: 611px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10019" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture10.png" alt="" width="611" height="95" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture10.png 611w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture10-300x47.png 300w" sizes="(max-width: 611px) 100vw, 611px" /><figcaption id="caption-attachment-10019" class="wp-caption-text">Fig – Mutex</figcaption></figure>
<h3><strong>Multi-Threaded Execution</strong></h3>
<p>The malware spawns multiple worker threads to execute different components of its functionality in parallel. This design allows the malware to maintain continuous monitoring and background activity without interrupting other operations such as command-and-control communication or data processing.</p>
<h3><strong>&#8211; Thread 1 – Keyboard Event Interception Loop</strong></h3>
<ul>
<li>new Thread(new ThreadStart(GClass25.smethod_1)).Start();</li>
</ul>
<p>The implant creates a separate execution thread to handle keyboard interception by using SetWindowsHookExA(). Within this routine,  a low-level (WH_KEYBOARD_LL) hook is registered allowing the malware to monitors low-level keyboard input.</p>
<figure id="attachment_10020" aria-describedby="caption-attachment-10020" style="width: 666px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10020" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture11.png" alt="" width="666" height="366" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture11.png 666w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture11-300x165.png 300w" sizes="(max-width: 666px) 100vw, 666px" /><figcaption id="caption-attachment-10020" class="wp-caption-text">Fig – Thread-1 – Keyboard Event Interception</figcaption></figure>
<p>Once the hook is installed, thread immediately enters a message loop using Application.Run(). This ensures the hook remains active for the lifetime of the process, allowing the implant to capture keystrokes continuously.</p>
<figure id="attachment_10021" aria-describedby="caption-attachment-10021" style="width: 286px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10021" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture12.png" alt="" width="286" height="84" /><figcaption id="caption-attachment-10021" class="wp-caption-text">Fig – Hook Remains Active</figcaption></figure>
<p>Inside the hook callback, the malware checks whether the intercepted message corresponds to a key press event. The condition <em>if (int_2 &gt;= 0 &amp;&amp; intptr_1 == (IntPtr)256)</em> ensures that the hook processes only valid key press events. The value 256 corresponds to the WM_KEYDOWN message in Windows, meaning the code executes only when a key is pressed.</p>
<figure id="attachment_10022" aria-describedby="caption-attachment-10022" style="width: 508px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10022" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture13.png" alt="" width="508" height="184" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture13.png 508w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture13-300x109.png 300w" sizes="(max-width: 508px) 100vw, 508px" /><figcaption id="caption-attachment-10022" class="wp-caption-text">Fig – Monitor Key Press events</figcaption></figure>
<p>At the end of this thread, malware calls UnhookWindowsHookEx() to remove previously installed keyboard hook. This ensures continuous keystroke monitoring until malware is terminated.</p>
<h3><strong>-Thread 2 – Keyword-Based Monitoring of U.S. Banking and Cryptocurrency Services</strong></h3>
<ul>
<li>new Thread(new ThreadStart(GClass11.smethod_0)).Start();</li>
</ul>
<p>In addition to the Thread 1 that intercepts keyboard events, the malware launches this additional thread responsible for independently handling runtime checks tied to user’s financial activity.</p>
<p>Firstly, it prepares and initializes directory and names of the log files which are used later for storing the monitoring results. Here, two separate files are initialized, one for cryptocurrency related activity (&#8220;crypto_results.txt&#8221;) and another for banking related activity (“banks_results.txt”). These files are stored under the user’s %localappdata% directory.</p>
<figure id="attachment_10023" aria-describedby="caption-attachment-10023" style="width: 560px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10023" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture14.png" alt="" width="560" height="195" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture14.png 560w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture14-300x104.png 300w" sizes="(max-width: 560px) 100vw, 560px" /><figcaption id="caption-attachment-10023" class="wp-caption-text">Fig – Result files for storing Financial Data Logs</figcaption></figure>
<p>Next, the malware initializes two string arrays named “array” and “array2”. The values of these arrays are dynamically reconstructed at runtime through internal decoding routines. This technique conceals meaningful keywords from static inspection while still allowing the malware to use them during execution.<br />
The first array (array) contains 47 (0x2F) cryptocurrency-related keywords, including platforms such as coinbase, blockchain, bitcoin, and others. The second array (array2) contains 51 (0x33) keywords associated with financial institutions and payment services, including bankofamerica, wellsfargo, chime, and paypal.<br />
A closer inspection of the keywords in array2 reveals the malware author’s strong focus on the U.S. financial ecosystem, covering major national banks, regional institutions, digital banking platforms, and widely used online payment services.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-10024" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture15.png" alt="" width="645" height="361" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture15.png 645w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture15-300x168.png 300w" sizes="(max-width: 645px) 100vw, 645px" /></p>
<figure id="attachment_10025" aria-describedby="caption-attachment-10025" style="width: 651px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10025" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture16.png" alt="" width="651" height="369" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture16.png 651w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture16-300x170.png 300w" sizes="(max-width: 651px) 100vw, 651px" /><figcaption id="caption-attachment-10025" class="wp-caption-text">Fig – Preparing Banking Keywords</figcaption></figure>
<h3><strong>Banking and Cryptocurrency Focused Monitoring Loop</strong></h3>
<p>After initializing keyword list and result files, the malware enters a continuous monitoring loop which is designed to track user interactions with the financial services.</p>
<figure id="attachment_10026" aria-describedby="caption-attachment-10026" style="width: 666px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10026" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture17.png" alt="" width="666" height="355" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture17.png 666w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture17-300x160.png 300w" sizes="(max-width: 666px) 100vw, 666px" /><figcaption id="caption-attachment-10026" class="wp-caption-text">Fig – Financial Services Monitoring</figcaption></figure>
<p>Two HashSet objects are created for previously created result files, allowing the malware to avoid duplicate logging and maintain a record of already identified matches.</p>
<p>Inside an infinite loop, the malware repeatedly retrieves the title of the currently active window.</p>
<figure id="attachment_10027" aria-describedby="caption-attachment-10027" style="width: 666px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10027" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture18.png" alt="" width="666" height="143" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture18.png 666w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture18-300x64.png 300w" sizes="(max-width: 666px) 100vw, 666px" /><figcaption id="caption-attachment-10027" class="wp-caption-text">Fig – Retrieving Title of Active Window</figcaption></figure>
<p>The captured text is normalized using .ToLower() before being compared against predefined keyword lists containing cryptocurrency platforms and banking-related services. Whenever a match is identified and has not been recorded earlier, the corresponding keyword is written to a dedicated results file using File.AppendAllText(). Additionally, the malware begins capturing and recording subsequent keystrokes associated with that session, allowing it to collect potentially sensitive user input related to financial activity.</p>
<figure id="attachment_10028" aria-describedby="caption-attachment-10028" style="width: 666px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10028" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture19.png" alt="" width="666" height="95" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture19.png 666w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture19-300x43.png 300w" sizes="(max-width: 666px) 100vw, 666px" /><figcaption id="caption-attachment-10028" class="wp-caption-text">Fig – Appending Captured Data to Results Files</figcaption></figure>
<p>This logic effectively links foreground user activity with targeted financial keywords, indicating that the malware selectively monitors sessions involving banking services, payment platforms, or cryptocurrency services rather than indiscriminately logging all activity.</p>
<h3><strong>C2 Connection and Data Exfiltration</strong></h3>
<p>The method smethod_5() implements the malware’s primary command-and-control (C2) communication routine. It continuously attempts to establish a network connection with predefined remote servers and manages the life-cycle of the active communication channel. Once a connection is successfully established, this routine enables further interaction with the remote server, forming the foundation for data exchange and remote control.</p>
<figure id="attachment_10029" aria-describedby="caption-attachment-10029" style="width: 666px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10029" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture20.png" alt="" width="666" height="461" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture20.png 666w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture20-300x208.png 300w" sizes="(max-width: 666px) 100vw, 666px" /><figcaption id="caption-attachment-10029" class="wp-caption-text">Fig – C2 Connection and Data Exfiltration</figcaption></figure>
<p>Initially, the binary iterates through a list of hardcoded domains (Class15.string_0) and associated ports (Class15.int_0).</p>
<figure id="attachment_10030" aria-describedby="caption-attachment-10030" style="width: 531px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10030" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture21.png" alt="" width="531" height="192" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture21.png 531w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture21-300x108.png 300w" sizes="(max-width: 531px) 100vw, 531px" /><figcaption id="caption-attachment-10030" class="wp-caption-text">Fig – C2 Domains and Port</figcaption></figure>
<p>For each domain–port combination, a TcpClient object is created.  Once a TCP connection is established, a validation routine (smethod_6) is executed, that act as a handshake check to confirm that the remote server responds with an expected identifier.</p>
<figure id="attachment_10031" aria-describedby="caption-attachment-10031" style="width: 666px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10031" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture22.png" alt="" width="666" height="364" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture22.png 666w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture22-300x164.png 300w" sizes="(max-width: 666px) 100vw, 666px" /><figcaption id="caption-attachment-10031" class="wp-caption-text">Fig – TCP Network Handshake using a String</figcaption></figure>
<p>Identifier we observed in our sample is string &#8220;RETRO-OK-2025&#8221;. Connections failing this validation are immediately closed and the next candidate server is tried.<br />
After successful C2 validation malware enables RAT feature that periodically collects captured keystroke data stored in local result files and transmits it to the C2 server.</p>
<figure id="attachment_10032" aria-describedby="caption-attachment-10032" style="width: 666px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10032" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture23.png" alt="" width="666" height="262" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture23.png 666w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture23-300x118.png 300w" sizes="(max-width: 666px) 100vw, 666px" /><figcaption id="caption-attachment-10032" class="wp-caption-text">Fig – Data Exfiltration</figcaption></figure>
<p>The malware reads the collected keystroke data from the result file using File.ReadAllText(). The stolen data is combined with victim identification information and packaged into a structured message using the internal packet-building routine (GClass10). The message is then transmitted to the C2 server through the active TCP communication channel (GClass12), where the payload is encrypted before transmission.<br />
This mechanism enables the malware to reliably collect and transmit sensitive user input to the remote C2 infrastructure, allowing the attacker to harvest financial and credential-related information from the compromised system.</p>
<h3><strong>RAT Module</strong></h3>
<p>As a Remote Access Trojan, the malware supports a range of remote control capabilities. Commands received from the C2 server are processed through a centralized dispatcher implemented as a switch statement, which evaluates command identifiers defined in the GEnum1 enumeration and invokes the corresponding functionality.</p>
<figure id="attachment_10033" aria-describedby="caption-attachment-10033" style="width: 613px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10033" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture24.png" alt="" width="613" height="399" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture24.png 613w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture24-300x195.png 300w" sizes="(max-width: 613px) 100vw, 613px" /><figcaption id="caption-attachment-10033" class="wp-caption-text">Fig – Command Dispatcher Implemented as a Switch</figcaption></figure>
<p>Depending on the command value, different modules are invoked to perform operations such as remote desktop monitoring, file system manipulation, command execution, and system control.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-10034" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture25.png" alt="" width="622" height="119" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture25.png 622w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture25-300x57.png 300w" sizes="(max-width: 622px) 100vw, 622px" /></p>
<figure id="attachment_10035" aria-describedby="caption-attachment-10035" style="width: 619px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-10035" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture26.png" alt="" width="619" height="73" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture26.png 619w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture26-300x35.png 300w" sizes="(max-width: 619px) 100vw, 619px" /><figcaption id="caption-attachment-10035" class="wp-caption-text">Fig – Action on Victim Based on Command from C2</figcaption></figure>
<p>This RAT functionality allows attackers to interactively monitor and control the infected system in addition to financial data theft.</p>
<h4><strong>RAT Command Capabilities</strong></h4>
<table width="633">
<tbody>
<tr>
<td width="276"><strong>Capability</strong></td>
<td width="357"><strong>Action</strong></td>
</tr>
<tr>
<td width="276"><strong>Remote Desktop / Screen Monitoring</strong></td>
<td width="357">Start/stop screen capture and configure remote desktop streaming</td>
</tr>
<tr>
<td width="276"><strong>File Manager Operations</strong></td>
<td width="357">Browse directories, upload/download files, manage file system</td>
</tr>
<tr>
<td width="276"><strong>Process / System Monitoring</strong></td>
<td width="357">Enumerate processes, collect system information, manage tasks</td>
</tr>
<tr>
<td width="276"><strong>Command Execution</strong></td>
<td width="357">Execute commands or programs on the compromised system</td>
</tr>
<tr>
<td width="276"><strong>System Control</strong></td>
<td width="357">Shutdown/reboot system or terminate malware client</td>
</tr>
<tr>
<td width="276"><strong>Memory / Advanced Operations</strong></td>
<td width="357">Perform memory or process manipulation tasks</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h3><strong>Targeted Financial Keywords</strong></h3>
<table>
<tbody>
<tr>
<td colspan="4" width="493"><strong>CryptoCurrency</strong></td>
</tr>
<tr>
<td width="118">coinbase</td>
<td width="129">metamask</td>
<td width="121">bitflyer</td>
<td width="125">poloniex</td>
</tr>
<tr>
<td width="118">blockchain</td>
<td width="129">trustwallet</td>
<td width="121">bitget</td>
<td width="125">probit</td>
</tr>
<tr>
<td width="118">freewallet</td>
<td width="129">bitpay</td>
<td width="121">gate</td>
<td width="125">hitbtc</td>
</tr>
<tr>
<td width="118">wallet</td>
<td width="129">paxful</td>
<td width="121">coincheck</td>
<td width="125">mercatox</td>
</tr>
<tr>
<td width="118">bitcoin</td>
<td width="129">localbitcoins</td>
<td width="121">deribit</td>
<td width="125">hotbit</td>
</tr>
<tr>
<td width="118">btc</td>
<td width="129">crypto</td>
<td width="121">bitso</td>
<td width="125">digifinex</td>
</tr>
<tr>
<td width="118">binance</td>
<td width="129">bitfinex</td>
<td width="121">bitmart</td>
<td width="125">bitbank</td>
</tr>
<tr>
<td width="118">kraken</td>
<td width="129">bitstamp</td>
<td width="121">exmo</td>
<td width="125">luno</td>
</tr>
<tr>
<td width="118">etoro</td>
<td width="129">okx</td>
<td width="121">bitpanda</td>
<td width="125">gemini</td>
</tr>
<tr>
<td width="118">coingecko</td>
<td width="129">bybit</td>
<td width="121">liquid</td>
<td width="125">bitbns</td>
</tr>
<tr>
<td width="118">coinmarketcap</td>
<td width="129">kucoin</td>
<td width="121">coinmetro</td>
<td width="125">cointiger</td>
</tr>
<tr>
<td width="118">tradingview</td>
<td width="129">huobi</td>
<td width="121">bittrex</td>
<td width="125"></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>&nbsp;</p>
<table>
<tbody>
<tr>
<td colspan="4" width="511"><strong>Financial Institutions / Payment Platforms </strong></td>
</tr>
<tr>
<td width="119">bankofamerica</td>
<td width="138">fifththirdbank</td>
<td width="122">firstrepublic</td>
<td width="132">frostbank</td>
</tr>
<tr>
<td width="119">wellsfargo</td>
<td width="138">huntington</td>
<td width="122">zionsbank</td>
<td width="132">onb</td>
</tr>
<tr>
<td width="119">chase</td>
<td width="138">synchrony</td>
<td width="122">commercebank</td>
<td width="132">firstcitizens</td>
</tr>
<tr>
<td width="119">citibank</td>
<td width="138">keybank</td>
<td width="122">bankofthewest</td>
<td width="132">centurylinkbank</td>
</tr>
<tr>
<td width="119">usbank</td>
<td width="138">americanexpress</td>
<td width="122">onefinance</td>
<td width="132">synovus</td>
</tr>
<tr>
<td width="119">capitalone</td>
<td width="138">discover</td>
<td width="122">go2bank</td>
<td width="132">firsthorizon</td>
</tr>
<tr>
<td width="119">pnc</td>
<td width="138">nbkc</td>
<td width="122">green-dot</td>
<td width="132">ebay</td>
</tr>
<tr>
<td width="119">tdbank</td>
<td width="138">sofi</td>
<td width="122">simple</td>
<td width="132">paypal</td>
</tr>
<tr>
<td width="119">truist</td>
<td width="138">chime</td>
<td width="122">aspiration</td>
<td width="132">payeer</td>
</tr>
<tr>
<td width="119">ally</td>
<td width="138">varobank</td>
<td width="122">nbkcbank</td>
<td width="132">amazon</td>
</tr>
<tr>
<td width="119">bbt</td>
<td width="138">axosbank</td>
<td width="122">flagstar</td>
<td width="132">checkout</td>
</tr>
<tr>
<td width="119">suntrust</td>
<td width="138">citizensbank</td>
<td width="122">bmo</td>
<td width="132">payment</td>
</tr>
<tr>
<td width="119">regions</td>
<td width="138">m&amp;tbank</td>
<td width="122">everbank</td>
<td width="132"></td>
</tr>
</tbody>
</table>
<h3><strong>Conclusion</strong></h3>
<p>Operation DualScript is a multi-stage malware campaign that abuses legitimate Windows components such as Scheduled Tasks, VBScript, and PowerShell to maintain persistence while minimizing disk artifacts. The attack operates through two parallel chains: a web-based PowerShell loader that deploys a cryptocurrency clipboard hijacker and a secondary PowerShell loader chain that executes the RetroRAT implant directly in memory.</p>
<p>By combining financial theft through wallet manipulation with remote access capabilities, the attackers achieve both targeted cryptocurrency theft and persistent system monitoring. This campaign highlights the growing abuse of trusted system utilities and in-memory execution techniques to evade traditional detection mechanisms.</p>
<h3><strong>Indicators of Compromise</strong></h3>
<h3>File-Based</h3>
<table width="602">
<tbody>
<tr>
<td width="191"><strong>Artifact</strong></td>
<td width="239"><strong>MD5 Hash</strong></td>
<td width="172"><strong>Detection</strong></td>
</tr>
<tr>
<td width="191">RetroRat</td>
<td width="239">7546ada1e3144371724db209ba4c5f37</td>
<td width="172">Trojan.RetroRAT.S3882604</td>
</tr>
<tr>
<td width="191">PiceVid.ps1</td>
<td width="239">173b27e7541427929da72ebf37c6db8e</td>
<td width="172">Script.RetroRat.50517.GC</td>
</tr>
<tr>
<td width="191">PiceVid.vbs</td>
<td width="239">243af69d85550232da45f5a30703a4a3</td>
<td width="172">Script.RetroRat.50517.GC</td>
</tr>
<tr>
<td width="191">ppamproServiceZuneWAL.ps1</td>
<td width="239">43cac07a501e7a717023e0fa8f6111e0</td>
<td width="172">Script.Trojan.49593.GC</td>
</tr>
<tr>
<td width="191">ppamproServiceZuneWAL.vbs</td>
<td width="239">163c38bd7ff7dd27e88eaef1a7a4819f</td>
<td width="172">Ps.Trojan.50374</td>
</tr>
<tr>
<td width="191">Wallet.txt</td>
<td width="239">1dc82fd02a0db3e338128b6f587d7122</td>
<td width="172">Script.RetroRat.50517.GC</td>
</tr>
</tbody>
</table>
<p>Network-Based</p>
<table>
<tbody>
<tr>
<td width="186"><strong>URL / Domain</strong></td>
<td width="83"><strong>Category</strong></td>
</tr>
<tr>
<td width="186">info[.]1cooldns[.]com</td>
<td width="83">Malware</td>
</tr>
<tr>
<td width="186">floatsdk[.]1cooldns[.]com</td>
<td width="83">Malware</td>
</tr>
<tr>
<td width="186">thewpiratebay[.]st</td>
<td width="83">Malware</td>
</tr>
</tbody>
</table>
<h3><strong>Mitre Mapping</strong></h3>
<table>
<tbody>
<tr>
<td width="147"><strong>Tactic</strong></td>
<td width="446"><strong>Technique</strong></td>
<td width="92"><strong>Technique ID</strong></td>
</tr>
<tr>
<td width="147">Persistence</td>
<td width="446">Scheduled Task/Job</td>
<td width="92">T1053.005</td>
</tr>
<tr>
<td width="147">Execution</td>
<td width="446">Command and Scripting Interpreter: PowerShell</td>
<td width="92">T1059.001</td>
</tr>
<tr>
<td width="147">Execution</td>
<td width="446">Command and Scripting Interpreter: VBScript</td>
<td width="92">T1059.005</td>
</tr>
<tr>
<td width="147">Defense Evasion</td>
<td width="446">Obfuscated/Compressed Files and Information</td>
<td width="92">T1027</td>
</tr>
<tr>
<td width="147">Defense Evasion</td>
<td width="446">Impair Defenses: Disable or Modify Tools (Execution Policy Bypass)</td>
<td width="92">T1562.001</td>
</tr>
<tr>
<td width="147">Discovery</td>
<td width="446">Process Discovery</td>
<td width="92">T1057</td>
</tr>
<tr>
<td width="147">Collection</td>
<td width="446">Input Capture: Keylogging</td>
<td width="92">T1056.001</td>
</tr>
<tr>
<td width="147">Collection</td>
<td width="446">Clipboard Data</td>
<td width="92">T1115</td>
</tr>
<tr>
<td width="147">Collection</td>
<td width="446">Screen Capture</td>
<td width="92">T1113</td>
</tr>
<tr>
<td width="147">Credential Access</td>
<td width="446">Input Capture</td>
<td width="92">T1056</td>
</tr>
<tr>
<td width="147">Command and Control</td>
<td width="446">Application Layer Protocol (Web Protocols)</td>
<td width="92">T1071</td>
</tr>
<tr>
<td width="147">Exfiltration</td>
<td width="446">Exfiltration Over C2 Channel</td>
<td width="92">T1041</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p><strong>Authors:</strong><br />
Niraj Makasare<br />
<a href="https://www.seqrite.com/blog/author/prashil/" data-wpel-link="internal" target="_self" rel="follow">Prashil Moon</a><br />
<a href="https://www.seqrite.com/blog/author/rayapati-saiquickheal-com/" data-wpel-link="internal" target="_self" rel="follow">Rayapati Lakshmi Prasanna Sai</a></p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/operation-dualscript-powershell-malware-retrorat-analysis/" data-wpel-link="internal" target="_self">Operation DualScript – A Multi-Stage PowerShell Malware Campaign Targeting Cryptocurrency and Financial Activity</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Homoglyph Attacks: How Lookalike Characters Are Exploited for Cyber Deception</title>
		<link>https://www.seqrite.com/blog/homoglyph-attacks-lookalike-characters-cyber-deception/</link>
		
		<dc:creator><![CDATA[Matin Tadvi]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 04:47:16 +0000</pubDate>
				<category><![CDATA[Technical]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DNS Security]]></category>
		<category><![CDATA[Domain Spoofing]]></category>
		<category><![CDATA[Homoglyph Attack]]></category>
		<category><![CDATA[IDN (Internationalized Domain Names)]]></category>
		<category><![CDATA[MITRE ATT&CK]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Punycode]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Unicode Security]]></category>
		<guid isPermaLink="false">https://www.seqrite.com/blog/?p=10004</guid>

					<description><![CDATA[<p>Homoglyph Attacks: How Lookalike Characters Are Exploited for Cyber Deception Table of Contents: Introduction What is a Homoglyph Attack? Practical Homoglyph Confusable Practical Homoglyph Confusable Table Why Homoglyph Attacks Are Effective Common Homoglyph Use Cases and Attack Vectors Real-World Examples and Campaign Patterns Technical Deep Dive — Unicode, IDNs, and Punycode Unicode and Scripts IDNs [&#8230;]</p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/homoglyph-attacks-lookalike-characters-cyber-deception/" data-wpel-link="internal" target="_self">Homoglyph Attacks: How Lookalike Characters Are Exploited for Cyber Deception</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Homoglyph Attacks: How Lookalike Characters Are Exploited for Cyber Deception</h1>
<p><strong><u>Table of Contents</u></strong><strong>:</strong></p>
<ul>
<li>Introduction</li>
<li>What is a Homoglyph Attack?</li>
<li>Practical Homoglyph Confusable
<ul>
<li>Practical Homoglyph Confusable Table</li>
</ul>
</li>
<li>Why Homoglyph Attacks Are Effective</li>
<li>Common Homoglyph Use Cases and Attack Vectors</li>
<li>Real-World Examples and Campaign Patterns</li>
<li>Technical Deep Dive — Unicode, IDNs, and Punycode
<ul>
<li>Unicode and Scripts</li>
<li>IDNs and Punycode</li>
<li>Mixed Scripts and Confusable</li>
</ul>
</li>
<li>Attack Flow — Step-by-Step</li>
<li>Why Detection Can Fail — Subtle Technical Pitfalls</li>
<li>MITRE ATT&amp;CK Mapping (High-Level)</li>
<li>Defensive Measures and Operational Recommendations
<ul>
<li>Policy and Governance</li>
<li>Technical Controls</li>
<li>Operational Practices</li>
</ul>
</li>
<li>Best-Practice Checklist</li>
<li>Emerging Trends to Watch</li>
<li>Conclusion</li>
</ul>
<p>&nbsp;</p>
<h2><strong>Introduction</strong></h2>
<p>You glance at a URL, see a familiar brand name, and click — only to hand your credentials to an attacker. That tiny visual mistake (an “o” that’s actually a Greek omicron, a lowercase “l” replaced by a capital “I”) is exactly what homoglyph attacks exploit. Homoglyphs are visually similar characters from different character sets (Latin, Cyrillic, Greek, full-width forms, etc.). When attackers swap characters in domains, filenames, message display names, or code, humans — and often automated defences — are fooled.</p>
<p>Homoglyph attacks are a low-cost, high-impact deception technique. They are used for phishing, brand impersonation, malware distribution, supply-chain confusion, and bypassing simplistic detection rules. This blog explains the technical mechanics (Unicode, IDNs, Punycode), how attackers operationalize homoglyphs, detection and hunting approaches, real-world usage patterns, MITRE mapping, and practical defences — including how layered protections like Quick Heal / Seqrite help.</p>
<h2><strong>What is a homoglyph attack?</strong></h2>
<p>A homoglyph is a character that looks like another character. For example:</p>
<ul>
<li>Latin a (U+0061) vs Cyrillic а (U+0430)</li>
<li>Latin o (U+006F) vs Greek ο (omicron, U+03BF)</li>
<li>Latin I (capital i, U+0049) vs lowercase l (ell, U+006C) vs Cyrillic І (U+0406)</li>
</ul>
<p>A homoglyph attack replaces one or more characters in an identifier (domain, filename, email display name) with visually confusable alternatives to impersonate a trusted resource. When used in Internationalized Domain Names (IDNs), these domains are represented in ASCII using Punycode (the xn-- prefix) but often rendered in browsers using the original Unicode characters — giving an authentic-looking URL to users.</p>
<h3><strong><em>A quick Punycode example (conceptual, anonymized):</em></strong></h3>
<p>Displayed domain:  gοogle-example[.]com    (Greek omicron used instead of Latin &#8216;o&#8217;)</p>
<p>Punycode (ASCII):  xn--gogle-example-abc[.]com</p>
<h2><strong>Practical Homoglyph Confusable</strong></h2>
<p>Homoglyph attacks exploit visually similar characters from different language scripts such as Latin, Cyrillic, and Greek. These lookalike letters can deceive users, spoof trusted domains, and even bypass some automated filters.</p>
<p>Below is a quick reference showing commonly abused homoglyph pairs seen in phishing and impersonation campaigns.</p>
<h3><strong>Practical Homoglyph Confusable Table</strong></h3>
<table width="99%">
<tbody>
<tr>
<td width="7%"><strong>Visual</strong></td>
<td width="20%"><strong>Legitimate Character</strong></td>
<td width="22%"><strong>Lookalike(s)</strong></td>
<td width="17%"><strong>Script</strong></td>
<td width="31%"><strong>Common Use in Attacks</strong></td>
</tr>
<tr>
<td width="7%">a</td>
<td width="20%">a (U+0061)</td>
<td width="22%">а (U+0430)</td>
<td width="17%">Cyrillic</td>
<td width="31%">“paypаl”, “fаcebook”</td>
</tr>
<tr>
<td width="7%">e</td>
<td width="20%">e (U+0065)</td>
<td width="22%">е (U+0435)</td>
<td width="17%">Cyrillic</td>
<td width="31%">“mіcrosoft”, “tеsla”</td>
</tr>
<tr>
<td width="7%">o</td>
<td width="20%">o (U+006F)</td>
<td width="22%">ο (U+03BF), о (U+043E)</td>
<td width="17%">Greek / Cyrillic</td>
<td width="31%">“gοogle”, “microsοft”</td>
</tr>
<tr>
<td width="7%">i</td>
<td width="20%">i (U+0069)</td>
<td width="22%">ı (U+0131), І (U+0406)</td>
<td width="17%">Turkish / Cyrillic</td>
<td width="31%">“instаgram”, “mіcrosoft”</td>
</tr>
<tr>
<td width="7%">l</td>
<td width="20%">l (U+006C)</td>
<td width="22%">I (U+0049)</td>
<td width="17%">Latin</td>
<td width="31%">“googIe”, “micros0ft”</td>
</tr>
<tr>
<td width="7%">c</td>
<td width="20%">c (U+0063)</td>
<td width="22%">с (U+0441)</td>
<td width="17%">Cyrillic</td>
<td width="31%">“faсebook”, “miсrosoft”</td>
</tr>
<tr>
<td width="7%">p</td>
<td width="20%">p (U+0070)</td>
<td width="22%">р (U+0440)</td>
<td width="17%">Cyrillic</td>
<td width="31%">“раypal”, “droрbox”</td>
</tr>
<tr>
<td width="7%">s</td>
<td width="20%">s (U+0073)</td>
<td width="22%">ѕ (U+0455)</td>
<td width="17%">Cyrillic</td>
<td width="31%">“microѕoft”, “ѕlack”</td>
</tr>
<tr>
<td width="7%">y</td>
<td width="20%">y (U+0079)</td>
<td width="22%">у (U+0443)</td>
<td width="17%">Cyrillic</td>
<td width="31%">“уahoo”, “раypal”</td>
</tr>
<tr>
<td width="7%">x</td>
<td width="20%">x (U+0078)</td>
<td width="22%">х (U+0445)</td>
<td width="17%">Cyrillic</td>
<td width="31%">“хbox”, “linυx”</td>
</tr>
<tr>
<td width="7%">d</td>
<td width="20%">d (U+0064)</td>
<td width="22%">ԁ (U+0501)</td>
<td width="17%">Cyrillic</td>
<td width="31%">“clouԁflare”</td>
</tr>
<tr>
<td width="7%">h</td>
<td width="20%">h (U+0068)</td>
<td width="22%">һ (U+04BB)</td>
<td width="17%">Cyrillic</td>
<td width="31%">“һbo”, “һulu”</td>
</tr>
<tr>
<td width="7%">n</td>
<td width="20%">n (U+006E)</td>
<td width="22%">n (U+0578)</td>
<td width="17%">Armenian</td>
<td width="31%">“liпkedin”, “amazoп”</td>
</tr>
<tr>
<td width="7%">m</td>
<td width="20%">m (U+006D)</td>
<td width="22%">rn (sequence)</td>
<td width="17%">Latin (visual trick)</td>
<td width="31%">“rnicrosoft” instead of “microsoft”</td>
</tr>
<tr>
<td width="7%">0</td>
<td width="20%">0 (digit zero)</td>
<td width="22%">O (U+004F), о (U+043E)</td>
<td width="17%">Latin / Cyrillic</td>
<td width="31%">“micr0soft”, “g00gle”</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h2><strong>Why homoglyph attacks are effective?</strong></h2>
<ol>
<li><strong>Human perception:</strong> People evaluate URLs visually and are poor at spotting subtle character differences.</li>
<li><strong>Display vs. storage mismatch:</strong> Systems may store ASCII (Punycode) but display Unicode, introducing confusion.</li>
<li><strong>Policy/allowlist gaps</strong>: Allowlisting based on visible strings (without normalization) can miss IDN-based lookalikes.</li>
<li><strong>Certificate and hosting availability:</strong> Attackers can obtain TLS certs for lookalike domains (Let’s Encrypt and similar), raising perceived legitimacy.</li>
<li><strong>Automation gaps:</strong> Many security pipelines don’t normalize Unicode or run mixed-script detection, so homographs slip through.</li>
</ol>
<h2><strong>Common homoglyph use cases and attack vectors</strong></h2>
<ul>
<li><strong>Spear-phishing &amp; credential harvesting:</strong> Phishing emails contain links to lookalike domains that host credential-collection forms.</li>
<li><strong>Business Email Compromise (BEC):</strong> Invoice/payment scams where the sender’s display name or a domain in an invoice looks correct but contains homoglyphs.</li>
<li><strong>Malvertising / malware distribution:</strong> Executables and updates are hosted on lookalike domains to trick analysts and sandboxes.</li>
<li><strong>Username/display name spoofing:</strong> On Slack/Teams/Email, attackers register accounts where the display name uses homoglyphs to impersonate coworkers.</li>
<li><strong>Supply-chain &amp; developer confusion:</strong> Package names, repo names, or variable identifiers with lookalike characters cause devs to pull malicious code or execute wrong binaries.</li>
</ul>
<h2><strong>Real-world examples and campaign patterns</strong></h2>
<p>To stay actionable and responsible, the following are anonymized patterns and publicly reported behaviours (no brand finger-pointing):</p>
<ul>
<li><strong>Finance-targeted phishing:</strong> Campaigns register lookalike domains of payment portals with mixed Latin/Cyrillic characters, host credential forms, and send follow-ups to improve success.</li>
<li><strong>SaaS impersonation:</strong> Attackers registered IDNs visually identical to a popular SaaS login page to harvest credentials, often pairing the domain with a valid TLS certificate and a convincing HTML login form.</li>
<li><strong>Executive impersonation in BEC:</strong> Display names in email clients (or slight domain modifications) are used to request urgent transfers; perpetrators rely on users not inspecting the actual return-path domain.</li>
<li><strong>Malware distribution via lookalike downloads sites:</strong> Fake download portals (e.g., for installers) hosted on homoglyph domains to push malicious payloads that sandbox detonation misses because domain reputation is new.</li>
</ul>
<h2><strong>Technical deep dive — Unicode, IDNs, and Punycode</strong></h2>
<h3><strong>Unicode and scripts</strong></h3>
<p>Unicode is a comprehensive character set that includes many scripts (Latin, Cyrillic, Greek, Armenian, Hebrew, Arabic, etc.). Many glyphs across different scripts look similar or identical at typical font sizes.</p>
<h3><strong>IDNs and Punycode</strong></h3>
<p>The Domain Name System (DNS) historically supports only ASCII. To allow non-ASCII names, IDNA (Internationalized Domain Names in Applications) employs Punycode — an ASCII-compatible encoding prefixed by xn--. For example, пример (Cyrillic) becomes xn--e1afmkfd.</p>
<p>Browsers decide whether to display the Unicode form or the Punycode form based on heuristics. If a domain uses characters from a single script and that script matches the user’s locale, browsers often display the Unicode string — which is visually deceptive for someone used to Latin characters.</p>
<h3><strong>Mixed scripts and confusable</strong></h3>
<p>Attackers often use mixed-script domains, combining Latin letters with a few Cyrillic or Greek characters in positions that are visually sensitive (brand name core, domain label start/end).</p>
<p>Technical mechanics that matter for detection:</p>
<ul>
<li>Normalization forms (NFC, NFD, NFKC) change canonical decomposition/composition and affect string comparisons.</li>
<li>Confusables tables (Unicode consortium) list visually confusable characters; defenders can use these for fuzzy matching.</li>
<li>BIDI (bidirectional) controls can reverse text rendering (\u202E), used by attackers to obfuscate filenames or display names.</li>
</ul>
<h2><strong>Attack flow — step-by-step</strong></h2>
<ol>
<li><strong>Recon &amp; Branding</strong>: Attacker gathers brand names, common subdomains, and localized scripts used by the target.</li>
<li><strong>Domain prep:</strong> Register homoglyph domain(s) via a registrar that accepts IDNs; optionally obtain TLS certs.</li>
<li><strong>Hosting &amp; content:</strong> Set up phishing page, download portal, or redirect flows; configure email templates to point to the domain.</li>
<li><strong>Delivery:</strong> Send emails, ads, or social messages linking to the homoglyph domain; exploit typical trust cues (logos, similar wording).</li>
<li><strong>Collection &amp; exploitation:</strong> Harvest credentials, push malware, monetize via fraud or sale on access markets.</li>
<li><strong>Persistence:</strong> Use harvested credentials to expand access or register more lookalike domains to rotate campaigns.</li>
</ol>
<h2><strong>Why detection can fail — subtle technical pitfalls</strong></h2>
<ul>
<li><strong>No Unicode normalization:</strong> Tools that compare strings directly without Unicode normalization miss matches.</li>
<li><strong>Font/rendering variance:</strong> Some fonts reveal differences (serifs), others hide them (sans-serif at small sizes).</li>
<li><strong>Mixed-script heuristics:</strong> Not all filters flag mixed scripts; some legitimacy checks only ensure ASCII.</li>
<li><strong>TLS false sense of security:</strong> A valid certificate is not proof of identity; certificate transparency helps but doesn’t block registration patterns.</li>
</ul>
<h2><strong>MITRE ATT&amp;CK mapping (high-level)</strong></h2>
<ul>
<li>Homoglyph attacks most commonly align with phishing-based initial access, where lookalike domains host credential-harvesting pages.</li>
<li>Attackers rely on open-source intelligence to craft believable impersonation targets and acquire deceptive domains and TLS certificates during the resource-development phase.</li>
<li>Masquerading techniques are used to evade defences, ultimately enabling credential theft, fraud, or broader intrusion activity.</li>
</ul>
<p>&nbsp;</p>
<table>
<tbody>
<tr>
<td width="148"><strong>Stage</strong></td>
<td width="220"><strong>Technique</strong></td>
<td width="106"><strong>ATT&amp;CK ID</strong></td>
<td width="221"><strong>Homoglyph relevance</strong></td>
</tr>
<tr>
<td width="148">Initial Access</td>
<td width="220">Phishing: Spear phishing Link</td>
<td width="106">T1566.002</td>
<td width="221">Lookalike domains host credential pages</td>
</tr>
<tr>
<td width="148">Reconnaissance</td>
<td width="220">Search Open Websites/Domains</td>
<td width="106">T1593</td>
<td width="221">OSINT used to craft target-specific homoglyphs</td>
</tr>
<tr>
<td width="148">Resource Development</td>
<td width="220">Acquire Domain</td>
<td width="106">T1583.001</td>
<td width="221">Register homoglyph domains and TLS certs</td>
</tr>
<tr>
<td width="148">Defence Evasion</td>
<td width="220">Masquerading / Deceptive Naming</td>
<td width="106">T1036</td>
<td width="221">Homoglyphs impersonate trusted names</td>
</tr>
<tr>
<td width="148">Credential Access</td>
<td width="220">Phishing for Credentials</td>
<td width="106">T1531 / T1556</td>
<td width="221">Harvested credentials used for takeover</td>
</tr>
<tr>
<td width="148">Impact</td>
<td width="220">Data Encrypted for Impact / Fraud</td>
<td width="106">T1486 / T1490</td>
<td width="221">Initial vector leads to larger intrusions</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h2><strong>Defensive Measures and Operational Recommendations</strong></h2>
<h3><strong>Policy and governance</strong></h3>
<ul>
<li>Organizations should maintain a formal domain-defence strategy that includes registering common lookalike domains for high-value brands and services.</li>
<li>Clear IDN usage policies should prohibit mixed-script domains in official communications.</li>
</ul>
<h3><strong>Technical controls</strong></h3>
<ul>
<li>Email gateways and web proxies must normalize Unicode and clearly surface Punycode warnings for suspicious links.</li>
<li>DNS filtering systems should treat newly observed xn-- domains as high risk until reviewed.</li>
<li>Certificate transparency monitoring should alert security teams when certificates are issued for lookalike domains.</li>
</ul>
<h3><strong>Operational practices</strong></h3>
<ul>
<li>Brand-monitoring programs should track domain registrations and abuse reports in near real time.</li>
<li>Phishing simulations should include realistic homoglyph-based scenarios to improve user awareness.</li>
<li>Incident response playbooks should document takedown workflows, including registrar and hosting provider escalation.</li>
</ul>
<h2><strong>Best-Practice Checklist</strong></h2>
<ul>
<li>Enforce multi-factor authentication on all sensitive services.</li>
<li>Normalize and inspect all inbound URLs, displaying Punycode when appropriate.</li>
<li>Monitor certificate transparency and passive DNS data for newly registered lookalike domains.</li>
<li>Block or strictly review mixed-script domains.</li>
<li>Run phishing simulations that include homoglyph techniques.</li>
<li>Register defensive domain variations for critical brands.</li>
<li>Require secondary verification for financial or credential-related requests.</li>
</ul>
<h2><strong>Emerging Trends to Watch</strong></h2>
<ul>
<li>Attackers increasingly automate homoglyph generation and domain registration at scale.</li>
<li>AI-assisted phishing improves the credibility of lures while homoglyph domains host the deception layer.</li>
<li>Homoglyph abuse is expanding into software supply chains through deceptive package and repository names.</li>
<li>Cross-channel impersonation combines homoglyphs with chat platforms and voice cloning to increase trust and success rates.</li>
</ul>
<h2><strong>Conclusion</strong></h2>
<p>Homoglyph attacks demonstrate how minor visual manipulation can lead to major security failures. By exploiting Unicode complexity and human perception, attackers bypass both users and poorly normalized defences.</p>
<p>Effective mitigation requires layered controls: Unicode normalization, confusable matching, mixed-script detection, proactive domain monitoring, and strong user verification processes. When combined, these measures significantly raise the cost and complexity for attackers—turning a simple deception technique into a far less effective threat.</p>
<h2>Authors</h2>
<p><span data-teams="true"><strong>Author</strong>: Matin Tadvi<br />
<strong>Co-Author</strong>: Niraj Makasare</span></p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/homoglyph-attacks-lookalike-characters-cyber-deception/" data-wpel-link="internal" target="_self">Homoglyph Attacks: How Lookalike Characters Are Exploited for Cyber Deception</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Weaponizing Legitimate Low-Level Tools: How Ransomware Evades Antivirus Protections</title>
		<link>https://www.seqrite.com/blog/weaponizing-legitimate-tools-ransomware-antivirus-evasion/</link>
		
		<dc:creator><![CDATA[Matin Tadvi]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 13:51:48 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://www.seqrite.com/blog/?p=10000</guid>

					<description><![CDATA[<p>Weaponizing Legitimate Low-Level Tools: How Ransomware Evades Antivirus Protections Table of Contents Introduction The &#8220;Dual-Use Dilemma&#8221;: Why Attackers Prefer Legitimate Tools Why Antivirus Neutralization Matters Historical Evolution of Antivirus Neutralization The Ransomware Kill Chain Stages of Abusing Legitimate Low-Level Tools Stage 1: Low-Level Tools for Antivirus Neutralization &#38; Privilege Escalation Stage 2: Credential Theft, Kernel [&#8230;]</p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/weaponizing-legitimate-tools-ransomware-antivirus-evasion/" data-wpel-link="internal" target="_self">Weaponizing Legitimate Low-Level Tools: How Ransomware Evades Antivirus Protections</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Weaponizing Legitimate Low-Level Tools: How Ransomware Evades Antivirus Protections</h1>
<h2><strong>Table of Contents</strong></h2>
<ul>
<li>Introduction</li>
<li>The &#8220;Dual-Use Dilemma&#8221;: Why Attackers Prefer Legitimate Tools</li>
<li>Why Antivirus Neutralization Matters</li>
<li>Historical Evolution of Antivirus Neutralization</li>
<li>The Ransomware Kill Chain</li>
<li>Stages of Abusing Legitimate Low-Level Tools
<ul>
<li>Stage 1: Low-Level Tools for Antivirus Neutralization &amp; Privilege Escalation</li>
<li>Stage 2: Credential Theft, Kernel Manipulation &amp; Ransomware Deployment Tools</li>
</ul>
</li>
<li>Live Campaign Examples: From Antivirus Kill to Ransomware</li>
<li>Threat Actor TTP Mapping (MITRE ATT&amp;CK)</li>
<li>Emerging Trends &amp; Future Threats</li>
<li>How Seqrite Protect Against These Activities</li>
<li>Detection &amp; Incident Response Recommendations for Advanced Threats</li>
<li>Security Best Practices &amp; Recommendations</li>
<li>Conclusion</li>
</ul>
<h2><strong>Introduction:</strong></h2>
<p>Ransomware isn’t just a piece of malicious code anymore — it’s run like a business. Modern attacks unfold in carefully planned stages, targeting everyone from home users to small businesses and large enterprises. Instead of relying only on custom malware, today’s adversaries act more like penetration testers with bad intentions: they study defences, look for weak spots, and then turn legitimate low-level tools against the very systems meant to be protected.</p>
<p>Take utilities like Process Hacker, IOBit Unlocker, PowerRun, or AuKill. These were originally created to help IT teams troubleshoot systems, manage the registry, or work with drivers. But in the wrong hands, they become weapons, used to silently shut down antivirus protections before ransomware ever shows its face.</p>
<h2><strong>Why attackers prefer them:</strong></h2>
<ul>
<li><strong>Trust Factor:</strong> Because they’re digitally signed and commonly used, security systems often treat them as safe.</li>
<li><strong>Capability:</strong> They give attackers SYSTEM- or even kernel-level control, something regular malware often can’t achieve on its own.</li>
<li><strong>Stealth:</strong> Their activity looks like normal admin work, leaving very few traces behind.</li>
</ul>
<p>This “dual-use dilemma” is exactly what makes them so dangerous — tools designed to fix problems can just as easily be turned into the perfect weapons for dismantling security, all without raising alarms.</p>
<h2><strong>Why Antivirus Neutralization Matters</strong></h2>
<p>Disabling antivirus isn’t just a minor step in a ransomware campaign—it’s a deliberate tactic to clear the way for payload execution. Security tools are built to block malicious files, record suspicious behavior, and alert defenders in real time. By shutting them down, attackers ensure their operations remain quiet and uninterrupted.</p>
<h2><strong>Here’s how disabling security measures directly benefits the attacker:</strong></h2>
<ul>
<li>Antivirus would block ransomware payloads at the moment of execution.</li>
<li>EDR would capture and log abnormal file encryption behaviours.</li>
<li>Forensic artifacts could give SOC teams a chance to respond.</li>
<li>By disabling these protections, attackers create a silent zone where ransomware can run undetected.</li>
</ul>
<h2><strong>Historical Evolution of Antivirus Neutralization</strong></h2>
<p>Ransomware groups haven’t just been standing still—they’ve been steadily refining how they bypass antivirus defences. What started as simple, script-based attacks has grown into highly sophisticated operations, including kernel-level manipulations and ready-made modules that now come standard in ransomware-as-a-service (RaaS) kits. The table below summarizes this progression:</p>
<table width="710">
<tbody>
<tr>
<td width="104"><strong>Period</strong></td>
<td width="301"><strong>Primary Neutralization Technique</strong></td>
<td width="305"><strong>Representative Ransomware Families</strong></td>
</tr>
<tr>
<td>2015 – 2017</td>
<td>Basic scripts (taskkill/net stop)</td>
<td width="305">CryptoLocker, WannaCry</td>
</tr>
<tr>
<td>2018 – 2020</td>
<td>Process Hacker abuse</td>
<td width="305">Ryuk, DoppelPaymer</td>
</tr>
<tr>
<td>2021 – 2023</td>
<td>Kernel-level driver manipulation</td>
<td width="305">Conti, LockBit 2.0</td>
</tr>
<tr>
<td>2024 – Present</td>
<td>Prepackaged Antivirus killer modules in RaaS kits</td>
<td width="305">LockBit 3.0, BlackCat</td>
</tr>
</tbody>
</table>
<p>Over the years, attackers have moved from running simple commands to tampering directly with the operating system, and now they rely on automated RaaS kits that bundle antivirus neutralizers by default—making these attacks faster, stealthier, and harder to stop.</p>
<h2><strong>The Ransomware Kill Chain</strong></h2>
<p>Ransomware attacks typically follow a deliberate sequence of steps, often referred to as the kill chain, which takes an intrusion from initial compromise all the way to widespread encryption and operational disruption. When attackers use legitimate low-level tools, this chain becomes even stealthier and more efficient. Each stage is carefully crafted to bypass defences, gain higher privileges, and ensure the ransomware completes its mission undetected.</p>
<ul>
<li><strong>Initial Access</strong> – Attackers gain entry through phishing emails, stolen credentials, or misused Remote Access Tools (RATs), establishing their first foothold.</li>
<li><strong>Privilege Escalation</strong> – Tools like PowerRun or YDArk are exploited to obtain SYSTEM- or kernel-level permissions.</li>
<li><strong>Antivirus Neutralization</strong> – Security software is disabled by stopping or unloading antivirus and EDR processes.</li>
<li><strong>Credential Theft</strong> – Utilities such as Mimikatz extract stored passwords and tokens to move laterally across the network.</li>
<li><strong>Persistence &amp; Cleanup</strong> – Tools like Unlock_IT or Atool_ExperModel remove logs and disable startup routines to hide traces of the intrusion.</li>
<li><strong>Payload Execution</strong> – Finally, the ransomware is deployed, encrypting files while blending with normal system activity.</li>
</ul>
<h2><strong>Stages of Abusing Legitimate Low-Level Tools</strong></h2>
<p>Adversaries typically follow a 2 stage process when abusing administrative and low-level utilities in ransomware campaigns. Each stage has a clear objective and leverages a distinct set of tools:</p>
<h3><strong>Stage 1: Low-Level Tools for Antivirus Neutralization &amp; Privilege Escalation</strong></h3>
<p>Attackers often rely on a mix of file unlockers, process killers, privilege escalation utilities, and credential dumpers. By abusing these categories of legitimate tools, they systematically disable antivirus defences, erase traces, and prepare the environment for ransomware execution. The table below consolidates the most commonly abused tools into four major categories.</p>
<table width="706">
<tbody>
<tr>
<td width="131"><strong>Tool</strong></td>
<td width="137"><strong>Legitimate Purpose</strong></td>
<td width="291"><strong>Attack Scenario (Malicious Use + </strong><strong>Silent Command line </strong><strong>Example + Technical Flow)</strong></td>
<td width="147"><strong>Security Impact</strong></td>
</tr>
<tr>
<td width="131"><strong>IOBit Unlocker</strong></td>
<td width="137">Unlock locked files</td>
<td width="291">Deletes Antivirus binaries silently → IOBitUnlocker.exe /delete &#8220;C:\Program Files\AV\avp.exe&#8221; → Uses NtUnlockFile API to bypass OS locks</td>
<td width="147">Prevents Antivirus from restarting or updating</td>
</tr>
<tr>
<td width="131"><strong>TDSSKiller</strong></td>
<td width="137">Rootkit removal</td>
<td width="291">Abused to unload Antivirus kernel drivers → tdsskiller.exe -silent -tdlfs → Blocks Antivirus kernel modules from reloading</td>
<td width="147">Weakens kernel-level defence</td>
</tr>
<tr>
<td width="131"><strong>Windows Kernel Explorer (WKE)</strong></td>
<td width="137">Kernel debugger</td>
<td width="291">Direct driver unloading &amp; kernel object manipulation via PsSetCreateProcessNotifyRoutine → attacker controls OS kernel</td>
<td width="147">Grants full OS control</td>
</tr>
<tr>
<td width="131"><strong>Atool_ExperModel</strong></td>
<td width="137">Registry/process diagnostic</td>
<td width="291">Deletes Antivirus startup keys → atool.exe /regdel HKLM\SOFTWARE\AVVendor\Startup → Breaks persistence by removing scheduled tasks</td>
<td width="147">Antivirus fails to auto-start after reboot</td>
</tr>
<tr>
<td width="131"><strong>Process Hacker</strong></td>
<td width="137">Task manager/debugger</td>
<td width="291">Terminates Antivirus processes via SeDebugPrivilege → taskkill /IM Antivirusguard.exe /F</td>
<td width="147">Instantly shuts down real-time Antivirus monitoring</td>
</tr>
<tr>
<td width="131"><strong>ProcessKO</strong></td>
<td width="137">Fast process termination</td>
<td width="291">Terminates Antivirus services instantly → ProcessKO.exe -kill Antivirusservice.exe</td>
<td width="147">Clears real-time protection in seconds</td>
</tr>
</tbody>
</table>
<h3><strong>Stage 2: Credential Theft, Kernel Manipulation &amp; Ransomware Deployment Tools</strong></h3>
<p>Once antivirus processes are neutralized, attackers pivot to stealing credentials, manipulating kernel-level defences, and executing ransomware payloads with elevated privileges. These tools are far more dangerous because they operate at the SYSTEM or kernel level, allowing adversaries to move laterally, disable security callbacks, and launch encryption payloads without interruption. The table below highlights the most commonly abused tools in this stage:</p>
<p>&nbsp;</p>
<table width="717">
<tbody>
<tr>
<td width="110"><strong>Tool</strong></td>
<td width="159"><strong>Legitimate Purpose</strong></td>
<td width="301"><strong>Attack Scenario (Malicious Use + Silent Command Line Example + Technical Flow)</strong></td>
<td width="147"><strong>Security Impact</strong></td>
</tr>
<tr>
<td width="110"><strong>0th3r_av5.exe</strong></td>
<td width="159">Admin utility disguise</td>
<td width="301">Script-driven tool iterates over Antivirus services silently, bulk-kills processes simultaneously</td>
<td width="147">Neutralizes multiple Antivirus agents at once</td>
</tr>
<tr>
<td width="110"><strong>HRSword</strong></td>
<td width="159">Service/driver management utility (legitimate admin tool)</td>
<td width="301">Manipulates service/driver state to disable Antivirus and prevent reinstallation → example silent command: HRSword.exe /service stop &#8220;avservice&#8221; /disable → stops target service, sets ServiceStart to disabled, and updates service binary path or recovery options to prevent automatic restart</td>
<td width="147">Prevents Antivirus service recovery and reinstallation; extends attacker dwell time and hinders remediation</td>
</tr>
<tr>
<td width="110"><strong>YDArk</strong></td>
<td width="159">Kernel manipulation</td>
<td width="301">Disables Antivirus callbacks → ydark.exe -unload Antivirusdriver.sys → Hooks PsSetCreateThreadNotifyRoutine for stealth persistence</td>
<td width="147">Undermines kernel protections</td>
</tr>
<tr>
<td width="110"><strong>PowerRun</strong></td>
<td width="159">Run apps as SYSTEM</td>
<td width="301">Executes ransomware payload at SYSTEM level → PowerRun.exe ransomware.exe</td>
<td width="147">Bypasses user-level restrictions, full privilege</td>
</tr>
<tr>
<td width="110"><strong>Unlock_IT</strong></td>
<td width="159">Unlock files/registry</td>
<td width="301">Deletes Antivirus logs → UnlockIT.exe /unlock HKLM\Security\AVLogs → Erases registry entries and forensic traces</td>
<td width="147">Breaks log-based investigation</td>
</tr>
<tr>
<td width="110"><strong>HackTool AuKill</strong></td>
<td width="159">Antivirus neutralizer</td>
<td width="301">Explicitly kills Antivirus/EDR processes → Antiviruskiller.exe &#8211;kill &#8211;all</td>
<td width="147">Creates blind spot for ransomware deployment</td>
</tr>
<tr>
<td width="110"><strong>Mimikatz</strong></td>
<td width="159">Credential dump tool</td>
<td width="301">Extracts cached admin creds → mimikatz.exe privilege::debug sekurlsa::logonpasswords → Reads LSASS memory</td>
<td width="147">Enables lateral spread via stolen credentials</td>
</tr>
</tbody>
</table>
<h2><strong>Live Campaign Examples: From Antivirus Kill to Ransomware:</strong></h2>
<p>Ransomware operators often rely on legitimate low-level system utilities to neutralize Antivirus protections, escalate privileges, and create the perfect environment for payload execution. Below is a consolidated view of widely abused tools and the ransomware campaigns where they have been observed:</p>
<p><strong> </strong></p>
<table width="712">
<tbody>
<tr>
<td width="181"><strong>Tool</strong></td>
<td width="531"><strong>Associated Ransomware Campaigns</strong></td>
</tr>
<tr>
<td width="181"><strong>IOBit Unlocker</strong></td>
<td width="531">LockBit Black 3.0, Weaxor, TRINITY, Proton / Shinra, Mimic, Makop, Dharma, Mallox, Phobos</td>
</tr>
<tr>
<td width="181"><strong>Process Hacker</strong></td>
<td width="531">Phobos, Makop, Dharma, GlobeImposter 2.0</td>
</tr>
<tr>
<td width="181"><strong>Windows Kernel Explorer (WKE)</strong></td>
<td width="531">Dharma (.cezar Family), TRINITY, MedusaLocker</td>
</tr>
<tr>
<td width="181"><strong>HRSword</strong></td>
<td width="531">Phobos, GlobeImposter 2.0, Makop</td>
</tr>
<tr>
<td width="181"><strong>YDArk</strong></td>
<td width="531">Weaxor, Phobos</td>
</tr>
<tr>
<td width="181"><strong>TDSSKiller</strong></td>
<td width="531">BlackBit</td>
</tr>
<tr>
<td width="181"><strong>Atool (Atool_ExperModel)</strong></td>
<td width="531">Trigona</td>
</tr>
<tr>
<td width="181"><strong>ProcessKO</strong></td>
<td width="531">Makop</td>
</tr>
<tr>
<td width="181"><strong>0th3r_av5.exe</strong></td>
<td width="531">MedusaLocker</td>
</tr>
<tr>
<td width="181"><strong>Unlock_IT</strong></td>
<td width="531">TargetCompany</td>
</tr>
<tr>
<td width="181"><strong>Mimikatz</strong></td>
<td width="531">INC Ransomware</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h2><strong>Threat Actor TTP Mapping (MITRE ATT&amp;CK)</strong></h2>
<p>Every ransomware campaign follows a pattern, and attackers rarely act randomly. They carefully select tools and techniques that align with their objectives at each stage of the attack. By mapping these actions to the MITRE ATT&amp;CK framework, we can better understand how legitimate low-level utilities are repurposed for malicious use.</p>
<p>The table below shows how adversaries move from privilege escalation to disabling defences, stealing credentials, and finally executing their ransomware payload — all while abusing trusted tools that were never designed for crime. This mapping makes it easier for defenders to visualize the attacker’s playbook and identify opportunities to detect or disrupt the intrusion before damage is done.</p>
<p>&nbsp;</p>
<table width="724">
<tbody>
<tr>
<td width="132"><strong>Stage</strong></td>
<td width="170"><strong>Technique</strong></td>
<td width="114"><strong>MITRE ATT&amp;CK Sub-Technique ID</strong></td>
<td width="143"><strong>Tools</strong><strong> Involved</strong></td>
<td width="165"><strong>Activities</strong></td>
</tr>
<tr>
<td width="132"><strong>Privilege Escalation</strong></td>
<td width="170">Abuse Elevation Control Mechanism</td>
<td width="114">T1548.002</td>
<td width="143">PowerRun, WKE, YDArk</td>
<td width="165">SYSTEM/kernel access</td>
</tr>
<tr>
<td width="132"><strong>Defence Evasion</strong></td>
<td width="170">Disable Security Tools</td>
<td width="114">T1562.001</td>
<td width="143">AuKill, IOBit Unlocker, ProcessKO, Process Hacker</td>
<td width="165">Bypass Antivirus/EDR</td>
</tr>
<tr>
<td width="132"><strong>Credential Access</strong></td>
<td width="170">OS Credential Dumping</td>
<td width="114">T1003.001</td>
<td width="143">Mimikatz</td>
<td width="165">Lateral movement</td>
</tr>
<tr>
<td width="132"><strong>Persistence</strong></td>
<td width="170">Modify Registry</td>
<td width="114">T1112</td>
<td width="143">Unlock_IT, Atool_ExperModel</td>
<td width="165">Maintain Antivirus-disabled state</td>
</tr>
<tr>
<td width="132"><strong>Defence Evasion</strong></td>
<td width="170">File Deletion / Log Cleaning</td>
<td width="114">T1070.004</td>
<td width="143">Unlock_IT</td>
<td width="165">Removes forensic evidence</td>
</tr>
<tr>
<td width="132"><strong>Discovery</strong></td>
<td width="170">System Service Discovery</td>
<td width="114">T1082</td>
<td width="143">Process Hacker, PowerRun</td>
<td width="165">Identify running Antivirus processes</td>
</tr>
<tr>
<td width="132"><strong>Impact</strong></td>
<td width="170">Inhibit System Recovery</td>
<td width="114">T1490</td>
<td width="143">ProcessKO, Unlock_IT</td>
<td width="165">Blocks recovery options</td>
</tr>
<tr>
<td width="132"><strong>Impact</strong></td>
<td width="170">Data Encrypted for Impact</td>
<td width="114">T1486</td>
<td width="143">All tools</td>
<td width="165">Prepares ransomware payload</td>
</tr>
</tbody>
</table>
<h2><strong>Emerging Trends &amp; Future Threats</strong></h2>
<p>Ransomware is becoming faster, smarter, and harder to detect. Key emerging trends include:</p>
<ul>
<li><strong>RaaS Antivirus Killers</strong> – Prebuilt scripts in ransomware kits designed to disable antivirus defences automatically.</li>
<li><strong>Kernel-Level Escalation</strong> – Attackers exploit drivers to gain stealthy, high-level control over systems.</li>
<li><strong>Multi-tool Chains</strong> – Utilities like PowerRun, Unlock_IT, and AuKill are combined to bypass security layers reliably.</li>
<li><strong>AI-Assisted Techniques</strong> – AI helps automatically select the most effective neutralization method for each environment.</li>
<li><strong>Supply Chain Attacks</strong> – Trojanized administrative tools and fake software updates create new infection vectors.</li>
<li><strong>Cloud Endpoint Targeting</strong> – Hybrid cloud infrastructures and their security tools are increasingly vulnerable to sophisticated attacks.</li>
</ul>
<p>These trends indicate that ransomware is evolving toward more automated, precise, and evasive operations, making proactive defence strategies essential.</p>
<h2><strong>How Seqrite Protect Against These Activities</strong></h2>
<p><a href="https://www.seqrite.com/" data-wpel-link="internal" target="_self" rel="follow">Seqrite</a> offer layered defences to counter sophisticated ransomware and Antivirus-neutralization tactics through <a href="https://www.seqrite.com/endpoint-protection-cloud/" data-wpel-link="internal" target="_self" rel="follow">Seqrte EPP:</a></p>
<ul>
<li><strong>Virus Protection</strong> – Identifies and blocks trojanized installers, malicious scripts, and ransomware payloads before they can execute.</li>
<li><strong>Antivirus Self Protection</strong> – Prevents attackers from forcibly terminating or uninstalling Antivirus software.</li>
<li><strong>Behavioural Detection</strong> – Monitors for suspicious actions such as mass process termination, registry tampering.</li>
<li><strong>Ransomware Protection</strong> – Detects abnormal file encryption activity in real time, stopping ransomware before it spreads</li>
<li><strong>Application Control</strong> – Restricts execution of unapproved utilities and administrative tools to prevent misuse. Together, these features provide proactive and reactive protection, keeping endpoints safe even against advanced, multi-stage attacks.</li>
</ul>
<p>We continuously monitor the threat landscape and proactively hunt for new or modified variants of abused utilities, rapidly updating our detection modules and behavior rules to maintain effective coverage.</p>
<h2><strong>Detection &amp; Incident Response Recommendations for Advanced Threats</strong></h2>
<p>Protecting against modern ransomware requires proactive monitoring and structured response strategies:</p>
<ul>
<li><strong>Process Termination Monitoring</strong> – Detect suspicious mass termination of antivirus or EDR processes.</li>
<li><strong>Registry &amp; File Auditing</strong> – Track changes to Antivirus-related registry keys, logs, and startup entries.</li>
<li><strong>Behavioural Analysis</strong> – Identify unusual SYSTEM-level execution and kernel-level modifications.</li>
<li><strong>Credential Theft Detection</strong> – Monitor access patterns to LSASS and other credential stores.</li>
<li><strong>Application Control</strong> – Limit execution to whitelisted administrative tools to prevent misuse.</li>
<li><strong>Playbooks &amp; Alerts</strong> – Automate alerts for attack sequences such as privilege escalation → Antivirus termination → registry/log changes → ransomware execution.</li>
<li><strong>Endpoint Isolation</strong> – Rapidly isolate affected devices to contain the threat and prevent lateral movement.</li>
</ul>
<p>These steps help organizations detect sophisticated attacks early and respond in a structured, timely manner, reducing the risk of full-scale disruption.</p>
<h2><strong>Security Best Practices &amp; Recommendations</strong></h2>
<p>Implementing proactive security measures can greatly reduce the risk of ransomware and advanced attacks:</p>
<ul>
<li><strong>Enforce MFA for Administrators</strong> – Require multi-factor authentication to protect privileged accounts from compromise.</li>
<li><strong>Enable Application Whitelisting</strong> – Block unapproved or unverified binaries, stopping malicious tools before they can execute.</li>
<li><strong>Monitor Termination Events</strong> – Continuously detect and alert on suspicious commands like sc stop, net stop, or taskkill.</li>
<li><strong>Restrict Low-Level Tool Usage</strong> – Limit execution to vetted, business-critical administrative tools only.</li>
<li><strong>Audit Registry Changes</strong> – Track and flag modifications to registry keys associated with Antivirus, EDR, or startup configurations.</li>
<li><strong>Educate SOC Teams</strong> – Train security analysts to spot subtle attempts to bypass or neutralize defences.</li>
<li><strong>Isolate Administrative Utilities</strong> – Provide access to sensitive tools only via secure, monitored jump boxes.</li>
</ul>
<p>Following these best practices ensures that organizations maintain strong control over critical systems, detect suspicious activity early, and minimize the impact of potential attacks.</p>
<h2><strong>Conclusion</strong></h2>
<p>Low-level administrative tools, originally designed to make IT operations more efficient, have increasingly been weaponized in ransomware campaigns. Attackers exploit them to disable antivirus and EDR defences, maintain stealthy persistence, and prepare systems for silent, large-scale encryption. What were once trusted utilities have now become some of the most dangerous enablers of cyberattacks.</p>
<p>The key takeaway is clear: dual-use tools represent a serious risk to enterprise security. Combating this threat requires layered defences that combine the strength of Quick Heal / Seqrite protection with strict governance and control over administrative utilities. By reclaiming these tools as trusted allies of defenders rather than weapons for attackers, organizations can deny adversaries their stealth advantage and safeguard critical infrastructure against modern ransomware campaigns.</p>
<p>We continuously monitor the threat landscape, proactively hunt for new or modified tool variants, and feed those discoveries directly into our detection modules — ensuring our coverage evolves as attackers change tactics.</p>
<h2>Authors</h2>
<p><span data-teams="true"><strong>Author</strong>: Matin Tadvi<br />
<strong>Co-Author</strong>: Sumit Patil</span></p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/weaponizing-legitimate-tools-ransomware-antivirus-evasion/" data-wpel-link="internal" target="_self">Weaponizing Legitimate Low-Level Tools: How Ransomware Evades Antivirus Protections</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Operation GhostMail: Russian APT exploits Zimbra Webmail to Target Ukraine State Agency</title>
		<link>https://www.seqrite.com/blog/operation-ghostmail-zimbra-xss-russian-apt-ukraine/</link>
		
		<dc:creator><![CDATA[Sathwik Ram Prakki]]></dc:creator>
		<pubDate>Tue, 17 Mar 2026 12:57:23 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[APT28]]></category>
		<category><![CDATA[browser stealer]]></category>
		<category><![CDATA[CVE-2025-66376]]></category>
		<category><![CDATA[Cyber Espionage]]></category>
		<category><![CDATA[Cybersecurity Research]]></category>
		<category><![CDATA[DNS exfiltration]]></category>
		<category><![CDATA[Operation GhostMail]]></category>
		<category><![CDATA[Phishing attack]]></category>
		<category><![CDATA[Russian APT]]></category>
		<category><![CDATA[Seqrite Labs]]></category>
		<category><![CDATA[SOAP API abuse]]></category>
		<category><![CDATA[Ukraine cyber attack]]></category>
		<category><![CDATA[webmail security]]></category>
		<category><![CDATA[Zimbra vulnerability]]></category>
		<category><![CDATA[Zimbra XSS]]></category>
		<guid isPermaLink="false">https://www.seqrite.com/blog/?p=9974</guid>

					<description><![CDATA[<p>Operation GhostMail: Russian APT exploits Zimbra Webmail to Target Ukraine State Agency Contents Introduction Target Phishing Email Infection Analysis Stage-1: JavaScript Loader Stage-2: Browser Stealer Infrastructure and Attribution CVE Assessment Conclusion Seqrite Coverage IOCs MITRE ATT&#38;CK Introduction Seqrite Labs identified a targeted phishing campaign that exploits a cross-site scripting (XSS) vulnerability in Zimbra Collaboration (ZCS) [&#8230;]</p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/operation-ghostmail-zimbra-xss-russian-apt-ukraine/" data-wpel-link="internal" target="_self">Operation GhostMail: Russian APT exploits Zimbra Webmail to Target Ukraine State Agency</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Operation GhostMail: Russian APT exploits Zimbra Webmail to Target Ukraine State Agency</h1>
<h2>Contents</h2>
<ul>
<li>Introduction</li>
<li>Target</li>
<li>Phishing Email</li>
<li>Infection Analysis
<ul>
<li>Stage-1: JavaScript Loader</li>
<li>Stage-2: Browser Stealer</li>
</ul>
</li>
<li>Infrastructure and Attribution</li>
<li>CVE Assessment</li>
<li>Conclusion</li>
<li>Seqrite Coverage</li>
<li>IOCs</li>
<li>MITRE ATT&amp;CK</li>
</ul>
<h2>Introduction</h2>
<p>Seqrite Labs identified a targeted phishing campaign that exploits a cross-site scripting (XSS) vulnerability in <strong>Zimbra Collaboration</strong> (ZCS) to compromise a Ukrainian government entity. The phishing email has no malicious attachments, no suspicious links, no macros. The entire attack chain lives inside the HTML body of a single email, there are no malicious attachments.</p>
<p>A social engineered internship inquiry is used to deliver an obfuscated JavaScript payload embedded directly in the email body. When the victim opens the email in a vulnerable Zimbra webmail session, it exploits <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-66376" data-wpel-link="external" target="_blank" rel="nofollow">CVE-2025-66376</a> which is a stored XSS bug caused by inadequate sanitization of CSS @import directives within the HTML content. The script executes silently in the browser and begins harvesting credentials, session tokens, backup 2FA codes, browser-saved passwords, and the contents of the victim’s mailbox going back 90 days with all the data exfiltrated over both DNS and HTTPS.</p>
<p>Based on technical overlaps with Zimbra exploitation and geopolitical targeting alignment, we assess with moderate confidence that this campaign aligns with tradecraft previously documented with <strong>Russian state-sponsored</strong> intrusion sets targeting Ukrainian government entities. This has been reported to CERT-UA.</p>
<h2>Target</h2>
<ul>
<li><u>Country</u>: Ukraine</li>
<li><u>Sector</u>: Government</li>
</ul>
<p>The email recipient is from the Ukrainian State Hydrology Agency that operates in a sector classified as critical national infrastructure responsible for the navigational, maritime and hydrographic support of shipping. It operates under the Ministry of Infrastructure (specifically within the State Service for Maritime and River Transportation of Ukraine). The targeting is consistent with broader cyber operations conducted against Ukrainian public-sector institutions amid ongoing regional conflict dynamics.</p>
<h2>Phishing Email</h2>
<p>The phishing email was received on 22<sup>nd</sup> January 2026 from a student of the National Academy of Internal Affairs (NAVS) to the Ukrainian Hydrology government agency (The student mail ID is likely a compromised one, based on the sender IP in the header). The email message written in Ukrainian, presents as a routine internship inquiry, where the student introduces as a 4th-year student asking if the recipient knows of any internship opportunities or contacts if they could reach out to. Additionally, the sender apologizes in case the email reaches the wrong inbox, which is a classic tactic to build trust.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9975" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig1.png" alt="" width="656" height="472" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig1.png 656w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig1-300x216.png 300w" sizes="(max-width: 656px) 100vw, 656px" /></p>
<p>Key Observations:</p>
<ul>
<li>Sent from infrastructure associated with NAVS</li>
<li>Appears legitimate at first glance</li>
<li>No malicious attachment, no suspicious external link</li>
<li>Malicious code embedded directly in HTML body</li>
<li>Zero detections on VirusTotal, where it was initially identified and uploaded on 26-Feb from Ukraine.</li>
</ul>
<p><img decoding="async" loading="lazy" class="aligncenter size-large wp-image-9981" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig2-1024x378.png" alt="" width="768" height="284" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig2-1024x378.png 1024w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig2-300x111.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig2-768x283.png 768w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig2.png 1036w" sizes="(max-width: 768px) 100vw, 768px" /></p>
<p>The attacker composed this email manually through the Zimbra web interface on Chrome 132 (stable release on 14-Jan-2026) and not an automated tool behavior.</p>
<ul>
<li>8.15_GA_4717 – SENDER&#8217;s Zimbra server version</li>
<li>10.1.7_GA_4200002 – ZimbraWebClient front-end UI build number</li>
</ul>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9982" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig3.png" alt="" width="710" height="260" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig3.png 710w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig3-300x110.png 300w" sizes="(max-width: 710px) 100vw, 710px" /></p>
<p>The email contains hidden malicious JavaScript embedded in &lt;div style=&#8221;display:none&#8221;&gt; block. It is a large base64-encoded script within the HTML body. The @import tag-name bypass is designed to look like malformed HTML to regex-based inspection while remaining valid to a browser parse.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9983" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig4.png" alt="" width="728" height="261" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig4.png 728w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig4-300x108.png 300w" sizes="(max-width: 728px) 100vw, 728px" /></p>
<p>The exploit in this sample corresponds to CVE-2025-66376, a stored XSS vulnerability in Zimbra Collaboration Suite patched in ZCS 10.0.18 / 10.1.13 (November 2025). The CVE description specifies: &#8220;insufficient sanitization of HTML content, specifically involving crafted tag structures and attribute values that include an @import directive and other script injection vectors. The vulnerability is triggered when a user views a crafted e-mail message in the Classic UI.&#8221;</p>
<p>The bypass operates on the @import token being stripped from inside tag names and attribute key/value strings. The email also contains secondary decoys using the same principle, broken &lt;script&gt; and &lt;style&gt; tags with @import noise injected into the tag name itself, and an HTML comment inserted mid-tag-name. This tag-name bypass causes AntiSamy to reconstruct &lt;svg/onload=eval(atob(`PAYLOAD`))&gt; from fragmented tokens, and executes the outer Base64 decoded code and the self-executing function runs.</p>
<h2>Infection Analysis</h2>
<p>Victim receives phishing email in Zimbra webmail. Execution requires the victim to open the email in browser-based Zimbra interface with an active authenticated session. The JavaScript executes within that session context, inheriting its cookies, localStorage, and same-origin SOAP API rights.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-large wp-image-9984" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig5-1024x615.png" alt="" width="768" height="461" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig5-1024x615.png 1024w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig5-300x180.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig5-768x462.png 768w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig5-1536x923.png 1536w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig5-2048x1231.png 2048w" sizes="(max-width: 768px) 100vw, 768px" /></p>
<h3>Stage-1: JavaScript Loader</h3>
<p>The loader is wrapped in a self-executing function that starts with preventing multiple injections by checking if the script with ID “<strong>zmb_pl_v3_</strong>” is already running or not. The next critical part is decoding the base64 payload using <strong>atob()</strong> and then performing XOR operation with the key “<strong>twichcba5e</strong>” to load the final JavaScript payload. It injects the code into top-level document as it contains the session context, access to cookies and escape webmail iframe sandbox.</p>
<figure id="attachment_9985" aria-describedby="caption-attachment-9985" style="width: 536px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-9985" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig6.png" alt="Fig. 1 – Decoded JavaScript Loader (Stage-1)" width="536" height="589" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig6.png 536w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig6-273x300.png 273w" sizes="(max-width: 536px) 100vw, 536px" /><figcaption id="caption-attachment-9985" class="wp-caption-text">Fig. 1 – Decoded JavaScript Loader (Stage-1)</figcaption></figure>
<h3>Stage-2: Browser Stealer</h3>
<p>The final payload is a stealer that executes in browser memory. This captures login credentials, SOAP session tokens, mail content and attachments, cookies, etc. It starts with generating a session token for each execution which is a random 12-char alphanumeric string used as a unique victim identifier in every C2 request. The hardcoded C2 domain is <strong>zimbrasoft[.]com[.]ua</strong>. Any exception caught anywhere in the payload sends POST request to /v/p with the stage name, error message, and stack trace. The C2 operator sees exactly which step failed and why on every victim machine. A try/catch wrapper around every task is seen to isolate failures, so one broken operation doesn&#8217;t abort the others.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9986" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig7.png" alt="" width="813" height="518" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig7.png 813w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig7-300x191.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig7-768x489.png 768w" sizes="(max-width: 813px) 100vw, 813px" /></p>
<p>Then we have the Zimbra SOAP wrapper that sends authenticated SOAP requests to the victim&#8217;s own Zimbra server at “<strong>/service/soap/</strong>”. The X-Zimbra-Csrf-Token header carries the stolen CSRF token, making requests indistinguishable from legitimate webmail activity. The SOAP calls are wrapped to return null on failure instead of throwing error, this allows other parallel operations even if one SOAP call is rejected.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9987" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig8.png" alt="" width="765" height="340" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig8.png 765w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig8-300x133.png 300w" sizes="(max-width: 765px) 100vw, 765px" /></p>
<p>DNS exfiltration encodes values as RFC 4648 Base32 and divides them into 60-character segments and constructs a DNS hostname in this form:</p>
<ul>
<li>d-&lt;token&gt;.&lt;key&gt;.&lt;base32_chunk&gt;.i[.]zimbrasoft[.]com[.]ua</li>
</ul>
<p>Next, it serializes JSON objects as application/octet-stream blobs and POSTs them to /v/d with an X-Filename header, which is used for larger structured objects like the full server config dump. The beacon is a simple POST request to /v/p, used for small structured data alongside or instead of DNS. It can also send the same value through both DNS and HTTPS. DNS gets through even when HTTPS is blocked; HTTPS carries complete data when it isn&#8217;t.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9988" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig9.png" alt="" width="787" height="818" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig9.png 787w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig9-289x300.png 289w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig9-768x798.png 768w" sizes="(max-width: 787px) 100vw, 787px" /></p>
<p>Zimbra Classic UI stores the session CSRF token in plaintext here: localStorage.getItem(&#8220;csrfToken&#8221;). Without it, all SOAP calls would be rejected. This runs first synchronously, before any SOAP operation starts.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9989" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig10.png" alt="" width="763" height="454" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig10.png 763w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig10-300x179.png 300w" sizes="(max-width: 763px) 100vw, 763px" /></p>
<p>All nine parallel operations are launched simultaneously with <strong>Promise.all</strong>. From the C2&#8217;s perspective, this maximizes data yield per victim session if the tab closes after 10 seconds, everything that could fire already has.</p>
<p><strong>SendStartPing</strong>: Notifies C2 after the payload execution starts. This lets the attacker correlate start/finish times per victim.</p>
<p><strong>gather_email</strong>: Two-method email harvest which first scrapes inline &lt;script&gt; tags for the <em>batchInfoResponse</em> JS variable Zimbra embeds on page load. It falls back to <em>GetIdentitiesRequest</em> SOAP, which returns all configured identities including aliases and exfiltrates via DNS and HTTPS.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9990" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig11.png" alt="" width="825" height="706" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig11.png 825w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig11-300x257.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig11-768x657.png 768w" sizes="(max-width: 825px) 100vw, 825px" /></p>
<p><strong>gather_environment</strong>: Fingerprints the client and calls <em>GetInfoRequest</em> to pull the full server configuration response, then dumps the entire JSON as <em>zimbra_batch_analytics.json.</em> This object contains Zimbra version, account quota, configured features, server hostname, and dozens of account preferences.</p>
<ol>
<li>Classic (?client=advanced)</li>
<li>HTML (/h/)</li>
<li>Modern (/modern/).</li>
</ol>
<p><strong>gather_2fa_codes</strong>: It uses <em>GetScratchCodesRequest</em> which returns the account&#8217;s backup 2FA recovery codes. These are one-time codes meant for emergency access and with them, the attacker can authenticate even if the victim changes their password and revokes all sessions. Each code is exfiltrated individually via DNS.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9991" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig12.png" alt="" width="807" height="728" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig12.png 807w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig12-300x271.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig12-768x693.png 768w" sizes="(max-width: 807px) 100vw, 807px" /></p>
<p><strong>gather_app_password</strong>: This uses <em>CreateAppSpecificPasswordRequest</em> to mint a new persistent credential named <em>ZimbraWeb</em>. App-specific passwords survive password resets. This is the attacker&#8217;s long-term access mechanism: once created, it enables direct IMAP or API auth indefinitely, and exfiltrates via DNS.</p>
<p><strong>gather_device_status</strong>: <em>GetDeviceStatusRequest</em> (namespace urn:zimbraSync) is used that returns all ActiveSync-connected mobile devices with details like device IDs, types, sync state. It is useful for building a target profile and potentially for follow-on mobile attacks.</p>
<p><strong>gather_oauth_consumers</strong>: <em>GetOAuthConsumersRequest</em> is used to list every third-party OAuth app authorized on the account. This reveals other platforms the target uses, and which of them have API-level access to the inbox.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9992" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig13.png" alt="" width="705" height="615" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig13.png 705w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig13-300x262.png 300w" sizes="(max-width: 705px) 100vw, 705px" /></p>
<p><strong>gather_autocomplete_password</strong>: It injects two hidden form fields (autocomplete=&#8221;username&#8221; and autocomplete=&#8221;current-password&#8221;) off-screen in the DOM and waits 5 seconds for the browser&#8217;s password manager to autofill them. Then it reads whatever appeared, exfiltrates it and cleans up all injected elements. This is the only operation that doesn&#8217;t need a CSRF token as it targets the browser and not Zimbra.</p>
<p><strong>enable_mail_protocols</strong>: The <em>ModifyPrefsRequest</em> sets zimbraPrefImapEnabled: TRUE on the victim&#8217;s account. This silently enables IMAP access, which the app password can then use for persistent mailbox surveillance from any IMAP client.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9992" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig13.png" alt="" width="705" height="615" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig13.png 705w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig13-300x262.png 300w" sizes="(max-width: 705px) 100vw, 705px" /></p>
<p>Coming to the most impact section which is <strong>sendArchives</strong> for 90-day email exfiltration. It loops day 0 through 89, downloading each day&#8217;s non-junk emails from Zimbra&#8217;s built-in export endpoint “/home/~/?fmt=tgz”. It uploads each day&#8217;s .tgz directly through <a href="https://js-[token].i.zimbrasoft.com.ua/v/d" data-wpel-link="external" target="_blank" rel="nofollow">/v/d</a>. Two upload modes are used:</p>
<ol>
<li>Streaming (ReadableStream piped directly, no memory buffer) for modern browsers.</li>
<li>Buffered array with a 500 MB cap for older ones.</li>
</ol>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9994" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig15.png" alt="" width="884" height="788" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig15.png 884w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig15-300x267.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig15-768x685.png 768w" sizes="(max-width: 884px) 100vw, 884px" /></p>
<p>This uses localStorage keys (zd_comp_YYYY-MM-DD) as checkpoints. If the tab reopens, already exfiltrated days are skipped. The timeout is set to 24 hours per day, meaning it will sit and stream as long as the tab is open.</p>
<p>Finally, the <strong>sendFinishPing </strong>beacons to confirm that all operations have been completed. The C2 can use start/finish to measure how long a victim session lasted and infer what was captured.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9995" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig16.png" alt="" width="875" height="773" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig16.png 875w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig16-300x265.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/fig16-768x678.png 768w" sizes="(max-width: 875px) 100vw, 875px" /></p>
<h2>Infrastructure and Attribution</h2>
<p>The C2 domain has been created on 2026-01-20 12:10:33+02, just before the phishing email was sent with registrar as ua.drs. Two generated domains have been identified so far:</p>
<ol>
<li>js-l1wt597cimk[.]i[.]zimbrasoft[.]com[.]ua</li>
<li>js-26tik3egye4[.]i[.]zimbrasoft[.]com[.]ua</li>
</ol>
<p>Multiple Russian-linked APTs have previously exploited Zimbra at scale against Eastern European targets: Fancy Bear (APT28), Cozy Bear (APT29) and Winter Vivern (TA473). APT29’s <a href="https://www.ic3.gov/CSA/2024/241010.pdf" data-wpel-link="external" target="_blank" rel="nofollow">documented</a> Zimbra exploitation is on a command injection vulnerability that steals email credentials via a vulnerable mail server. This is a server-side attack requiring no email interaction, which is a completely different attack class from what we see in the phishing email, which is an HTML email XSS payload requiring the victim to open it in webmail. Whereas <a href="https://www.proofpoint.com/us/blog/threat-insight/exploitation-dish-best-served-cold-winter-vivern-uses-known-zimbra-vulnerability" data-wpel-link="external" target="_blank" rel="nofollow">TA473</a> did not use sophisticated tooling but only lighter JavaScript credential stealers with Zimbra XSS vulnerability. This doesn’t have structured SOAP API abuse and no dual-channel exfiltration.</p>
<p>As mentioned under ESET’s Operation <a href="https://www.welivesecurity.com/en/eset-research/operation-roundpress/" data-wpel-link="external" target="_blank" rel="nofollow">RoundPress</a> research in 2024, APT28 expanded from Roundcube to Zimbra, Horde, and MDaemon, targeting governmental entities and defense companies in Eastern Europe. The payload structure we decoded maps closely to SpyPress.ZIMBRA which harvests the victim&#8217;s contact list by making a SOAP request to the Zimbra API endpoint and fetches email source for exfiltration. Based on these overlaps and targeting, we attribute Operation GhostMail to APT28 with medium confidence.</p>
<h2>Conclusion</h2>
<p>Operation GhostMail demonstrates the continued evolution of webmail-focused intrusion, where attackers rely entirely on browser-resident stealers rather than traditional malware binaries. By embedding obfuscated JavaScript directly within an HTML email and exploiting a Zimbra webmail XSS condition, the threat actor achieves full session interception without dropping files, exploiting macros, or triggering endpoint-based detections. The abuse of legitimate SOAP API calls for credential harvesting and mailbox export highlights how platform-native functionality can be weaponized for stealthy data collection.</p>
<p>The targeting of a Ukrainian government entity aligns with ongoing geopolitical cyber activity observed against public-sector institutions in the region. While definitive attribution requires further infrastructure or code-overlap confirmation, the techniques used are consistent with previously documented Russian state-sponsored groups exploiting webmail platforms across Eastern Europe. The importance of strict HTML sanitization in webmail environments, rapid patch management, and monitoring anomalous SOAP activity is indicative of browser-based session compromises.</p>
<h2>Seqrite Coverage</h2>
<p>Script.Trojan.50486.GC</p>
<h2>Recommendations</h2>
<ul>
<li>Migrate from Zimbra 8.8.15 immediately to a supported release (10.1.x minimum) or an alternative platform.</li>
<li>Audit all accounts for app-specific passwords named ZimbraWeb or created around the date of any suspicious email. Revoke them immediately.</li>
<li>Audit account settings for unexpected zimbraPrefImapEnabled: TRUE changes, particularly on accounts that do not have a business need for IMAP access.</li>
<li>Check Zimbra audit logs for access to /home/~/?fmt=tgz from unusual source IPs or outside normal business hours.</li>
<li>Deploy SOAP API monitoring at the application layer. Calls to GetScratchCodesRequest and CreateAppSpecificPasswordRequest in particular should be nearly absent in normal usage and easy to baseline.</li>
<li>Implement DNS filtering for the IOC domains and consider behavioral alerting for the d-[a-z0-9]{12}.i.* subdomain pattern that characterizes the DNS exfiltration channel.</li>
<li>Review whether IMAP and POP3 access should be enabled by default for user accounts. Disabling unused protocols at the administrative level removes one persistence vector even if credentials are later compromised.</li>
<li>Brief staff that HTML email bodies can carry executable payloads in webmail environments. The absence of attachments and links is not a reliable safety indicator.</li>
</ul>
<h2>IOCs</h2>
<p><strong>Email</strong><br />
c010f64080b0b0997b362a8e6b9c618e</p>
<p><strong>C2</strong><br />
zimbrasoft[.]com[.]ua<br />
js-[a-z0-9]{12}.i.zimbrasoft[.]com[.]ua</p>
<h2>MITRE ATT&amp;CK</h2>
<table width="624">
<tbody>
<tr>
<td width="116"><strong>Tactic</strong></td>
<td width="94"><strong>TID</strong></td>
<td width="213"><strong>Technique</strong></td>
<td width="202"><strong>Procedure</strong></td>
</tr>
<tr>
<td width="116">Resource Development</td>
<td width="94">T1583.001</td>
<td width="213">Acquire Infrastructure: Domains</td>
<td width="202">C2 domain registered just before the attack</td>
</tr>
<tr>
<td width="116">Resource Development</td>
<td width="94">T1586.002</td>
<td width="213">Compromise Accounts: Email Accounts</td>
<td width="202">Phishing email sent from NAVS email</td>
</tr>
<tr>
<td width="116">Initial Access</td>
<td width="94">T1566.001</td>
<td width="213">Phishing: Spearphishing Attachment</td>
<td width="202">HTML email with embedded XSS payload</td>
</tr>
<tr>
<td width="116">Execution</td>
<td width="94">T1059.007</td>
<td width="213">Command and Scripting Interpreter: JavaScript</td>
<td width="202">Browser-resident payload</td>
</tr>
<tr>
<td width="116">Execution</td>
<td width="94">T1203</td>
<td width="213">Exploitation for Client Execution</td>
<td width="202">CVE-2025-66376 XSS exploited</td>
</tr>
<tr>
<td width="116">Persistence</td>
<td width="94">T1098.001</td>
<td width="213">Account Manipulation: Additional Cloud Credentials</td>
<td width="202">CreateAppSpecificPasswordRequest mints a new persistent credential</td>
</tr>
<tr>
<td width="116">Defense Evasion</td>
<td width="94">T1027</td>
<td width="213">Obfuscated Files or Information</td>
<td width="202">XOR + Base64 layered encoding, @import token</td>
</tr>
<tr>
<td width="116">Defense Evasion</td>
<td width="94">T1564.001</td>
<td width="213">Hide Artifacts: Hidden Files and Directories</td>
<td width="202">Payload hidden from visual inspection</td>
</tr>
<tr>
<td width="116">Credential Access</td>
<td width="94">T1528</td>
<td width="213">Steal Application Access Token</td>
<td width="202">GetOAuthConsumersRequest</td>
</tr>
<tr>
<td width="116">Credential Access</td>
<td width="94">T1539</td>
<td width="213">Steal Web Session Cookie</td>
<td width="202">CSRF token from localStorage</td>
</tr>
<tr>
<td width="116">Credential Access</td>
<td width="94">T1111</td>
<td width="213">Multi-Factor Authentication Interception</td>
<td width="202">Backup 2FA code theft via GetScratchCodesRequest</td>
</tr>
<tr>
<td width="116">Credential Access</td>
<td width="94">T1555.003</td>
<td width="213">Credentials from Password Stores: Credentials from Web Browsers</td>
<td width="202">Autocomplete DOM injection harvest</td>
</tr>
<tr>
<td width="116">Discovery</td>
<td width="94">T1082</td>
<td width="213">System Information Discovery</td>
<td width="202">GetInfoRequest server fingerprint</td>
</tr>
<tr>
<td width="116">Discovery</td>
<td width="94">T1087.003</td>
<td width="213">Account Discovery: Email Account</td>
<td width="202">GetIdentitiesRequest and DOM scraping</td>
</tr>
<tr>
<td width="116">Discovery</td>
<td width="94">T1069</td>
<td width="213">Permission Groups Discovery</td>
<td width="202">GetOAuthConsumersRequest</td>
</tr>
<tr>
<td width="116">Discovery</td>
<td width="94">T1120</td>
<td width="213">Peripheral Device Discovery</td>
<td width="202">GetDeviceStatusRequest</td>
</tr>
<tr>
<td width="116">Collection</td>
<td width="94">T1114.002</td>
<td width="213">Email Collection: Remote</td>
<td width="202">90-day sweep</td>
</tr>
<tr>
<td width="116">Collection</td>
<td width="94">T1185</td>
<td width="213">Browser Session Hijacking</td>
<td width="202">window.top.document iframe escape</td>
</tr>
<tr>
<td width="116">Collection</td>
<td width="94">T1213</td>
<td width="213">Data from Information Repositories</td>
<td width="202">Config dump zimbra_batch_analytics.json</td>
</tr>
<tr>
<td width="116">Exfiltration</td>
<td width="94">T1041</td>
<td width="213">Exfiltration Over C2 Channel</td>
<td width="202">HTTPS POST /v/d and /v/p</td>
</tr>
<tr>
<td width="116">Exfiltration</td>
<td width="94">T1071.004</td>
<td width="213">Application Layer Protocol: DNS</td>
<td width="202">Base32-encoded DNS exfiltration</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h2>Authors</h2>
<p>Sathwik Ram Prakki<br />
Kartik Jivani</p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/operation-ghostmail-zimbra-xss-russian-apt-ukraine/" data-wpel-link="internal" target="_self">Operation GhostMail: Russian APT exploits Zimbra Webmail to Target Ukraine State Agency</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Operation CamelClone: Multi-Region Espionage Campaign Targets Government and Defense Entities Amidst Regional Tensions</title>
		<link>https://www.seqrite.com/blog/operation-camelclone-multi-region-espionage-campaign-targets-government-and-defense-entities-amidst-regional-tensions/</link>
		
		<dc:creator><![CDATA[Priya Patel]]></dc:creator>
		<pubDate>Fri, 13 Mar 2026 11:16:46 +0000</pubDate>
				<category><![CDATA[Technical]]></category>
		<guid isPermaLink="false">https://www.seqrite.com/blog/?p=9955</guid>

					<description><![CDATA[<p>Contents Introduction Key Targets Industries Affected Geographical focus Geopolitical Context Infection Chain Timeline of Activity Initial Findings Looking into the Decoy Documents Technical Analysis Stage 1 &#8211; Malicious Archive Delivery Stage 2 &#8211; Malicious Shortcut Execution Stage 3 &#8211; HOPPINGANT JavaScript Loader Infrastructure &#38; Attribution Conclusion SEQRITE Protection Indicators of Compromise (IOCs) MITRE ATT&#38;CK Mapping [&#8230;]</p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/operation-camelclone-multi-region-espionage-campaign-targets-government-and-defense-entities-amidst-regional-tensions/" data-wpel-link="internal" target="_self">Operation CamelClone: Multi-Region Espionage Campaign Targets Government and Defense Entities Amidst Regional Tensions</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><strong>Contents</strong></h3>
<ul>
<li>Introduction</li>
<li>Key Targets
<ul>
<li>Industries Affected</li>
<li>Geographical focus</li>
<li>Geopolitical Context</li>
</ul>
</li>
<li>Infection Chain</li>
<li>Timeline of Activity</li>
<li>Initial Findings
<ul>
<li>Looking into the Decoy Documents</li>
</ul>
</li>
<li>Technical Analysis
<ul>
<li>Stage 1 &#8211; Malicious Archive Delivery</li>
<li>Stage 2 &#8211; Malicious Shortcut Execution</li>
<li>Stage 3 &#8211; HOPPINGANT JavaScript Loader</li>
</ul>
</li>
<li>Infrastructure &amp; Attribution</li>
<li>Conclusion</li>
<li>SEQRITE Protection</li>
<li>Indicators of Compromise (IOCs)</li>
<li>MITRE ATT&amp;CK Mapping</li>
<li>Authors</li>
</ul>
<h3>Introduction</h3>
<p>Seqrite Labs APT Team has been monitoring threats across the globe and recently identified a campaign targeting multiple countries. Also looking across the Middle East, taking into account of the current geopolitical tensions. What makes this campaign interesting is the targeting of different regions within a similar timeframe while using the same infection techniques throughout the campaign.</p>
<p>In this blog, we will analyze the infection chain used in this campaign, which starts with a malicious archive and eventually leads to the deployment of a legitimate tool that is abused by the threat actor. We will also look at the infrastructure used in the campaign, where the attackers leverage public anonymous file-sharing websites to host and distribute their payloads.</p>
<p>Finally, we also map the techniques observed in this campaign with the MITRE ATT&amp;CK framework and take a look at the infrastructure used by the attackers.</p>
<h3>Key Targets</h3>
<h4>Industries Affected</h4>
<ul>
<li>Government agencies</li>
<li>Defense and military organizations</li>
<li>Foreign affairs and international cooperation departments</li>
<li>Policy and diplomatic institutions</li>
<li>Energy and strategic resource sectors</li>
</ul>
<h4>Geographical Focus</h4>
<ul>
<li>Algeria</li>
<li>Mongolia</li>
<li>Ukraine</li>
<li>Kuwait</li>
</ul>
<h4>Geopolitical Context</h4>
<p>The countries targeted in this campaign may not seem connected at first glance, but each holds a key position in the current geopolitical environment. Ukraine is still at the centre of an active conflict with Russia, with hybrid tactics escalating as we head into 2026. Algeria, one of North Africa&#8217;s largest energy exporter, sits at the intersection of competing European, Russian, and Chinese interests. This is especially <a href="https://www.atlanticcouncil.org/blogs/menasource/what-will-2026-bring-for-the-middle-east-and-north-africa/" data-wpel-link="external" target="_blank" rel="nofollow">relevant</a> as Algeria and Morocco approach toward relations and North Africa moves closer to the centre of US regional policy.</p>
<p>Mongolia&#8217;s position has grown increasingly complex as it <a href="https://thediplomat.com/2025/09/mongolia-exits-sco-observer-status-draws-closer-to-china-and-russia/" data-wpel-link="external" target="_blank" rel="nofollow">recently</a> deepened ties with China and Russia while simultaneously maintaining Western partnerships, making it a high-value intelligence target for multiple competing state actors. The lure theme used against Mongolia: &#8220;Expanding cooperation with China&#8221; directly mirrors this tension. Kuwait remains a key Gulf security partner with ongoing defence procurement activities, and the Gulf region broadly continues to face destabilising military activity and strategic competition.</p>
<h3>Infection Chain</h3>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9956" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-0.png" alt="" width="1000" height="443" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-0.png 1000w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-0-300x133.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-0-768x340.png 768w" sizes="(max-width: 1000px) 100vw, 1000px" /></p>
<h4>Timeline of Activity</h4>
<p>The following timeline shows the sequence of the campaigns we observed during our research.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9957" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-1.png" alt="" width="969" height="543" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-1.png 969w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-1-300x168.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-1-768x430.png 768w" sizes="(max-width: 969px) 100vw, 969px" /></p>
<h4>Initial Findings</h4>
<p>As we have been hunting for malicious spear-phishing threat artefacts, the first interesting threat associated with this campaign was identified on VirusTotal, where we observed a file named وزارة_السكن_والعمران_والمدينة.png.zip. According to the information available, the file was submitted from Algeria on 24th February. The filename translates to “Ministry of Housing, Urban Development, and the City,” which suggests the lure is impersonating an official government entity. Based on this naming convention, the attackers were targeting individuals working in government bodies responsible for housing, urban development, or municipal administration. When we first came across this spear-phishing element, we initially thought it might be a regional activity targeting a specific country.</p>
<p>However, as we continued our research, we identified another sample using the same infrastructure and similar techniques. This sample targeted Mongolia and used the lure Хятад улстай хамтын ажиллагаагаа өргөжүүлж байна.zip. After translating the filename, which is <em>“Expanding cooperation with China,”</em> it suggests that the lure is intended for individuals working in government institutions, diplomatic offices, or organizations involved in international cooperation and foreign affairs.</p>
<p>During further monitoring in March, we found two additional samples that appear to be part of the same campaign. One of the lures was named Algerian Ukrainian proposals for cooperation.zip, which references cooperation between countries and likely targets individuals involved in diplomatic relations, government departments, or organizations engaged in international partnerships. Another sample that we recently observed uses the lure Weapons requirements for the Kuwait Air Force.zip, which suggests that the attackers may be attempting to target defense or military-related entities, particularly those involved in procurement, logistics, or strategic planning.</p>
<h3>Looking into the Decoy Documents</h3>
<p>The first file from the campaign that we observed in the wild was وزارة_السكن_والعمران_والمدينة.png.zip. The filename is written in Arabic and translates to “Ministry of Housing, Urban Development, and the City.”</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9958" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-2.png" alt="" width="683" height="263" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-2.png 683w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-2-300x116.png 300w" sizes="(max-width: 683px) 100vw, 683px" /></p>
<p>The ZIP archive contains two files: دعوة للمشاركة.lnk, which translates to “Invitation for participation.lnk,” and another file named وزارة_السكن_والعمران_والمدينة.png, which means “Ministry of Housing, Urban Development, and the City.png.” Based on the filenames, both documents appear legitimate and are likely intended to trick victims into opening them.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9959" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-3.png" alt="" width="773" height="591" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-3.png 773w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-3-300x229.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-3-768x587.png 768w" sizes="(max-width: 773px) 100vw, 773px" /></p>
<p>After looking into the decoy image, we found that the logo belongs to an official ministry in Algeria. This suggests that the threat actors likely used the logo to target victims who may be associated with government institutions or related organizations.</p>
<p>The second sample we found was submitted shortly after the first one was shared. The sample was initially packed in a ZIP file named Хятад улстай хамтын ажиллагаагаа өргөжүүлж байна.zip, which translates to “Expanding cooperation with China.” The ZIP file contains two files: Хятад улстай хамтын ажиллагаагаа өргөжүүлж байна.lnk, meaning “Expanding cooperation with China”, and a lure image named Мон-Атом ХХК.jpg.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-large wp-image-9960" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-4-1024x534.png" alt="" width="768" height="401" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-4-1024x534.png 1024w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-4-300x157.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-4-768x401.png 768w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-4.png 1188w" sizes="(max-width: 768px) 100vw, 768px" /></p>
<p>The image contains the logo of <strong>MonAtom LLC</strong>, a state-owned company in Mongolia responsible for uranium exploration and nuclear energy development. This suggests that the attackers were attempting to reference or impersonate an organization connected to Mongolia’s nuclear or energy sector. The third payload we found was in the very beginning on the month of March, and it was named Algerian Ukrainian proposals for cooperation.zip.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9961" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-5.png" alt="" width="666" height="271" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-5.png 666w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-5-300x122.png 300w" sizes="(max-width: 666px) 100vw, 666px" /></p>
<p>Further looking into the zip file, we found that it contains two files which are Algerian Ukrainian proposals for cooperation.lnk and MHUV.png. According to the data we found, this file was uploaded from Ukraine. Interestingly, it contains the same logo that we observed in the first sample, which was targeting Algeria and referenced the Ministry of Housing, Urban Development, and the city. By looking at the timeline and the lure theme, we observed that the same threat actor is likely targeting both Ukraine and Algeria, using the same lure and focusing on a similar area of interest in their attacks.</p>
<p>Well, now the most recent sample we found, on 4th March, was WeaponsrequirementsfortheKuwaitAirForce.zip, and the sample was originally uploaded from Italy. But, further looking inside the lure, we found that the targeting was a different geographical location. The ZIP file which we found contains two more files: Weapons requirements for the Kuwait Air Force.lnk and Kuwait Armed Forces.png.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9962" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-6.png" alt="" width="988" height="591" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-6.png 988w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-6-300x179.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-6-768x459.png 768w" sizes="(max-width: 988px) 100vw, 988px" /></p>
<p>The lure image contains the official emblem of the Kuwaiti Armed Forces, which was likely used to make the file appear legitimate and to gain the trust of the victims targeted by this threat group.</p>
<p>Beyond the image-based decoys mentioned above, the threat actor also deploys another lure document from the remote C2 server, which is part of the later stage of the infection chain.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9963" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-7.png" alt="" width="935" height="529" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-7.png 935w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-7-300x170.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-7-768x435.png 768w" sizes="(max-width: 935px) 100vw, 935px" /></p>
<p>However, the decoy documents were totally null padded which we believe were likely used to divert the attention of the victims. In this section, we saw the set of decoys in form of images and null-padded documents. In the next section, we will look into the technical analysis of the complete infection chain used by the threat actor.</p>
<h3>Technical Analysis</h3>
<p>In this section, we will go through the technical details of the infection chain used in this campaign. As mentioned earlier, the campaigns we observed follow almost the same technique, even though the lure documents are different. To explain the behavior clearly, we will focus on the most recent sample.</p>
<p>The infection starts from a ZIP archive that contains a shortcut file along with a lure image. When the victim interacts with the shortcut file, it triggers the next stages of the attack. In the later stages of the infection chain, additional components are downloaded from a public file-sharing website. The attackers eventually make use of <a href="https://github.com/rclone/" data-wpel-link="external" target="_blank" rel="nofollow">Rclone</a>, a legitimate tool, for exfiltration purposes.</p>
<h3>Stage 1 &#8211; Malicious Archive Delivery</h3>
<p>The initial phishing vector we observed was a ZIP file named Weapons requirements for the Kuwait Air Force.zip.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9964" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-8.png" alt="" width="617" height="251" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-8.png 617w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-8-300x122.png 300w" sizes="(max-width: 617px) 100vw, 617px" /></p>
<p>The ZIP file contains two files: Weapons requirements for the Kuwait Air Force.lnk and the official logo of the Kuwait Armed Forces. The LNK file contains a malicious PowerShell command that triggers the next stage of execution, which we will examine in the following section.</p>
<h3>Stage 2 &#8211; Malicious Shortcut Execution</h3>
<p>After looking into the contents of the LNK file, we found that it contains a PowerShell command that connects to the anonymous file-sharing website filebulldogs[.]com to download the further and final <strong>payload</strong>, which is a JavaScript loader, which we track under the alias of HOPPINGANT.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-large wp-image-9965" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-9-1024x40.png" alt="" width="768" height="30" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-9-1024x40.png 1024w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-9-300x12.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-9-768x30.png 768w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-9-1536x60.png 1536w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-9.png 1598w" sizes="(max-width: 768px) 100vw, 768px" /></p>
<p>Looking into the command-line arguments of the malicious LNK file, we found that the command changes the directory to $ENV:Temp, downloads a JavaScript file named f.js from hxxps://filebulldogs[.]com/uploads/AVQB61TVOX/f.js using Invoke-WebRequest, saves it in the Temp directory, and then executes the downloaded script to proceed with the next stage of the attack.</p>
<p>In the next section, we will look into the JavaScript loader, <strong>HOPPINGANT</strong> which we found this file uniquely used across every campaign we mentioned, making it consistent in terms of the campaign execution. Now, let us look inside the working of the loader.</p>
<h3>Stage 3 &#8211; HOPPINGANT JavaScript Loader</h3>
<p><img decoding="async" loading="lazy" class="aligncenter size-large wp-image-9966" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-10-1024x350.png" alt="" width="768" height="263" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-10-1024x350.png 1024w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-10-300x103.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-10-768x263.png 768w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-10-1536x526.png 1536w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-10.png 1698w" sizes="(max-width: 768px) 100vw, 768px" /></p>
<p>After looking into the file f.js, which we named the HOPPINGANT loader, we observed that the file contains a Windows Script Host (WSH) JavaScript that creates a Wscript.Shellobject and executes two Base64-encoded PowerShell commands. These commands are executed using the powershell -enc argument, which allows the attacker to hide the actual PowerShell instructions inside encoded data. After decoding the Base64-encoded PowerShell commands executed by the <strong>HOPPINGANT</strong> loader, we observed that the script performs multiple actions to retrieve additional payloads and prepare the system for data exfiltration.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9967" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-11.png" alt="" width="767" height="81" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-11.png 767w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-11-300x32.png 300w" sizes="(max-width: 767px) 100vw, 767px" /></p>
<p>First, the script changes the working directory to the Temp folder and downloads a file named document.pdf from the remote server hosted on filebulldogs.com. This is the same lure document we mentioned earlier, which is stuffed with null bytes just to distract the victim.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-large wp-image-9968" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-12-1024x211.png" alt="" width="768" height="158" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-12-1024x211.png 1024w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-12-300x62.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-12-768x158.png 768w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-12-1536x317.png 1536w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-12.png 1868w" sizes="(max-width: 768px) 100vw, 768px" /></p>
<p>The script also downloads another archive named a.zip from the same remote server and extracts its contents. After extracting the ZIP file, we found an executable file named l.exe, which is later copied to the user profile directory and executed. Upon further analysis, we identified that l.exe is a legitimate software, Rclone, specifically version <strong>v1.70.3</strong>.</p>
<p>After executing the binary, the script reconstructs a password using a simple XOR-based decoding routine from an array of integer values. Using this decoded password, the script logs into the publicly used remote storage service Mega by creating a new remote profile with the username oliwiagibbons@onionmail[.]org and the decoded password. The email addresses used in all four campaigns are different from other.</p>
<p>Once the remote connection is established, the executable l.exe is used to collect and upload files from the victim’s system. The script specifically targets documents from the Desktop directory, including .doc, .docx, .pdf, and .txt files. In addition, it also attempts to exfiltrate Telegram session data from the Telegram Desktop\\tdata directory. The collected files are then uploaded to the Mega storage account, allowing the attackers to retrieve the stolen data remotely. The threat abuses legitimate software and publicly available services to exfiltrate data from the victim’s system. In the next section, we will look into the infrastructure and attribution related to this campaign.</p>
<h3>Infrastructure &amp; Attribution</h3>
<p>During our research, we observed that the campaign relies on publicly accessible services to host and deliver the malicious payloads. Unlike traditional APT operations that stand up dedicated C2 infrastructure, this threat actor has entirely built their operation on top of legitimate public platforms, making network-based detection significantly harder.</p>
<p>Initially, we found that the primary network artefact connected to this campaign is the anonymous file-sharing website filebulldogs[.]com, which serves as the sole staging server throughout the entire infection chain. Every campaign we observed, whether targeting Algeria, Mongolia, Ukraine, or Kuwait, uses this same domain to host the HOPPINGANT JavaScript loader (f.js), the payload archive (a.zip), and the decoy documents (document.pdf). However, the threat actor changes the upload path for each campaign by using different directory names such as /uploads/AVQB61TVOX/, /uploads/OKW5RN48ZJ/, and /uploads/F1OQY9GU84/. We believe this helps separate each campaign and reduces the risk of all payloads being removed at the same time. It also allows the attackers to run multiple campaigns within short time periods.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9969" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-13.png" alt="" width="710" height="557" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-13.png 710w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-13-300x235.png 300w" sizes="(max-width: 710px) 100vw, 710px" /></p>
<p>Now, going ahead to the exfiltration side of the operation, we saw that the threat actor abuses MEGA[.]nz, a publicly available cloud storage service, as the remote endpoint for stolen data. The MEGA accounts used across the campaigns are all registered under <a href="http://onionmail.org" data-wpel-link="external" target="_blank" rel="nofollow">onionmail.org</a> email addresses, an anonymous email service popular among threat actors for its lack of identity verification. Across the variants we analyzed, we identified four distinct MEGA accounts which are recently registered:</p>
<ol>
<li>coreyroberson@onionmail[.]org &#8211; registered on 17-Feb, 2026</li>
<li>keatonwalls@onionmail[.]org &#8211; registered on 20-Feb, 2026</li>
<li>oliwiagibbons@onionmail[.]org</li>
<li>theresaunderwood@onionmail[.]org</li>
</ol>
<p>The credentials used for these accounts are stored inside the HOPPINGANT loader and are hidden using a simple XOR encoding method with the same key value of 56. This key is reused in all the campaign samples we analyzed. In addition, the Rclone configuration parameters remain the same across the campaigns, including 12 threads, 12 transfers, and a bandwidth limit of 100M. The reuse of the same encoding key and identical Rclone settings indicates that all the observed samples are likely part of the same coordinated campaign.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-large wp-image-9970" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-14-1024x433.png" alt="" width="768" height="325" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-14-1024x433.png 1024w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-14-300x127.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-14-768x325.png 768w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-14.png 1176w" sizes="(max-width: 768px) 100vw, 768px" /></p>
<p>Only one account “Corey Roberson“ contained files around 4 KB in the storage. These have gibberish data written inside documents that have random names.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-9971" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-15.png" alt="" width="769" height="243" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-15.png 769w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/image-15-300x95.png 300w" sizes="(max-width: 769px) 100vw, 769px" /></p>
<p>At this stage, we are not attributing this campaign to any known threat actor. However, the targeting pattern across government, defense, diplomatic, and energy sectors in countries such as Algeria, Mongolia, Ukraine, and Kuwait, combined with the use of geopolitically themed lures, suggests that the activity is broadly consistent with intelligence gathering rather than financial cybercrime. We are tracking these campaigns under Operation <strong>CamelClone</strong>. The targeting pattern suggests an actor with interests in monitoring the foreign policy positions, defence capabilities, and diplomatic alignments of states navigating major-power rivalries.</p>
<h3>Conclusion</h3>
<p>Seqrite Labs has identified multiple campaigns that we track as <strong>Operation CamelClone</strong>. During our investigation, we observed multiple samples targeting government, defense, and diplomatic themes across Algeria, Mongolia, Ukraine, and Kuwait within a short period of time. The attackers rely on ZIP archives with lure documents to initiate the infection chain.</p>
<p>One interesting aspect of this campaign is that the threat actor does not rely on traditional command-and-control infrastructure. Instead, the payloads are hosted on a public file-sharing service, filebulldogs[.]com, while stolen data is uploaded to MEGA storage using the legitimate tool Rclone.</p>
<p>Across the four campaigns analyzed, we observed the same <strong>HOPPINGANT</strong> loader, the reuse of the same XOR key for password decoding, and similar Rclone configuration parameters. These similarities indicate that the samples are likely part of the same operation.</p>
<p>At this stage, we are not attributing this activity to any known threat group. However, the choice of lures and the sectors referenced in the decoy documents suggest an information-gathering objective. We continue to monitor this activity for overlaps and share updates if additional campaigns related to this operation are identified.</p>
<h4>SEQRITE Protection</h4>
<p>Lnk.Trojan.50485</p>
<p>Lnk.Trojan.50481.GC</p>
<p>Script.Trojan.50480.GC</p>
<h4>Indicators of Compromise (IOCs)</h4>
<p>Hash (SHA-256)<strong>File</strong></p>
<table width="100%" cellspacing="0" cellpadding="0">
<tbody>
<tr data-local-id="79df4394-5e34-4359-8f7b-64901bb4fb00">
<td data-local-id="90a18522-2308-45c2-baaf-2e08125dd0ef">31f1a97c72f596162f0946df74838d3bef89289ce630adba8791c0f3220980ee</td>
<td data-local-id="8b57e931-dad0-43dd-bf49-26bf7f0ba488">وزارة_السكن_والعمران_والمدينة.png.zip</td>
</tr>
<tr data-local-id="936fec90-1b64-4341-8715-74d745a81707">
<td data-local-id="710d1363-70bc-4be1-a138-5920afea0a5f">51af876b0f7fde362c69219f7dec39f7fb667fb53dc5fe2cbdf841d6c5951460</td>
<td data-local-id="70c54c12-29d6-4136-8c32-a068c0dc2d9d">Weapons%20requirements%20for%20the%20Kuwait%20Air%20Force.zip</td>
</tr>
<tr data-local-id="97d439cd-1ed2-43b6-82bb-0c43dbf3fd94">
<td data-local-id="1015b519-019a-4a55-8e3d-71b2d03e74ae">27d7a398a58c12093bc49f7144dac2f079232768096d0558c226ea5c53782e29</td>
<td data-local-id="28ec0a6a-c7e7-435d-893c-fc77334f7de9">Algerian Ukrainian proposals for cooperation.zip</td>
</tr>
<tr data-local-id="630038f5-8747-4bda-94cd-985fc32234c9">
<td data-local-id="f64e5473-abb4-419d-a99f-08425e253987">4a0e2649f89e11121ffe55546ee081ac07472db650d094314414ebf26fcb7a8e</td>
<td data-local-id="d3ba2ccb-4716-4f68-bd81-ba4a1e16ccf4">Хятад улстай хамтын ажиллагаагаа өргөжүүлж байна.zip</td>
</tr>
<tr data-local-id="67198fed-ab33-4151-93cb-61cfbbb67495">
<td data-local-id="44fc7635-ef2d-4360-8715-82d7f5f56963">92962bfa6df48ec0f13713c437af021f4138dc5a419bc92bc8a376d625a6519a</td>
<td data-local-id="e311e9dc-92d9-4d34-959b-055c6dc05831">دعوة للمشاركة.lnk</td>
</tr>
<tr data-local-id="1b2bdc37-f5e1-4786-814b-071bca2d34ed">
<td data-local-id="4b261a22-1948-4071-8809-9c3e14b53ab4">1d0ea66d347325902e20a12e1f2f084be45d3d6045264e513dcc420b9928013c</td>
<td data-local-id="85c0db73-debd-4c1b-a104-e26815cbf688">Weapons requirements for the Kuwait Air Force.lnk</td>
</tr>
<tr data-local-id="bc2c3b20-ba43-421d-af85-7f0faa832dc0">
<td data-local-id="1c34e271-ee85-42fe-a7a5-15d967814f53">2671e1f43b2e5911310c5b3f124c076055eec5dee4e596854332ffcf791fd740</td>
<td data-local-id="8de0becd-6af0-4368-b80f-27be86dd876c">Algerian Ukrainian proposals for cooperation.lnk</td>
</tr>
<tr data-local-id="23e1fb75-bdbe-4e31-a01e-1f1d740e7046">
<td data-local-id="e18ffa36-99b0-4f67-9284-40d41b28aff5">2902cdee050a60c3129b4bb84e74ddda7b129c3473556f689d83609d9a5981a7</td>
<td data-local-id="b7ae2b84-ca69-4c80-a712-37c077b2db42">Хятад улстай хамтын ажиллагаагаа өргөжүүлж байна.lnk</td>
</tr>
<tr data-local-id="08d353b2-cad6-4333-b549-87729ca677ba">
<td data-local-id="a6e12558-73f7-4d62-83ca-307bcde74cfd">630ac67d8db777ae0b93e066bd13b21908e79f23a41a64448f0a4ea38c063a44</td>
<td data-local-id="78d04478-a10c-49f0-ae4e-68358091cfcb">f.js</td>
</tr>
<tr data-local-id="6d32d362-e84e-4104-808a-0da6f85acaf5">
<td data-local-id="5c71bb33-cdbc-4a46-a681-51d9a0c45414">230a22a1f1800f11718b43a7ce9390d2ef0fa9dc212d954c8fafbfbe997bbbef</td>
<td data-local-id="ac47c057-4a35-4fd0-88fa-58ab56718b35">f.js</td>
</tr>
<tr data-local-id="19fa5693-a9b4-4f64-9ea6-c5247733696f">
<td data-local-id="355855e6-548f-4beb-bcb4-9e87a13a1847">62c477c0827752ffeb8ea243497eef1c666fc41025d287909d021bceb5b8e699</td>
<td data-local-id="e9a11e8c-d531-4644-b2a2-c3aa5a2fb601">f.js</td>
</tr>
<tr data-local-id="c0792fbb-7f6a-4dee-88ca-42db2181736f">
<td data-local-id="a2d01ca7-5eae-4941-b8c6-382be9be0b6b">2dcaaedfad798dad87f27aef39885d2879825c4c8bed1dcd9e863aba0d463103</td>
<td data-local-id="98392bd1-e14c-421f-a29c-e19c56a5d63e">f.js</td>
</tr>
<tr data-local-id="d3c640bb-05a5-4a13-9d02-d3d743717ed1">
<td data-local-id="b5b71275-cf8d-40e7-a64d-53367bf39bb5">3e36b396c4cb71b8eaae2300c21bec26700b27ce5f6be83ef6b86d214e294c8b</td>
<td data-local-id="c33ea8d9-722e-437f-80b6-392d51327e51">l.exe</td>
</tr>
</tbody>
</table>
<h4>Email-Address</h4>
<table data-table-width="760" data-layout="default" data-local-id="552790ca-de4e-4474-bea7-b13a4965da77">
<tbody>
<tr data-local-id="49b50bfe3d8a">
<td data-local-id="6df0b7290b63">oliwiagibbons@onionmail[.]org</td>
</tr>
<tr data-local-id="5c19ddd2afaa">
<td data-local-id="bf06512177f5">theresaunderwood@onionmail[.]org</td>
</tr>
<tr data-local-id="1de4cc30513c">
<td data-local-id="a4b672c0bdd0">keatonwalls@onionmail[.]org</td>
</tr>
<tr data-local-id="2b75df84b1c0">
<td data-local-id="7448d0e45d40">coreyroberson@onionmail[.]org</td>
</tr>
</tbody>
</table>
<h4>URLs</h4>
<table data-table-width="760" data-layout="default" data-local-id="94bc7190-e229-40b9-a73b-7690e661fd57">
<tbody>
<tr data-local-id="eed0d2d21cc6">
<td data-local-id="df5bcf3d61cc">hxxps://filebulldogs[.]com/uploads/AVQB61TVOX/f.js</td>
</tr>
<tr data-local-id="fc9c18c1bc83">
<td data-local-id="5373802f2156">hxxps://filebulldogs[.]com/uploads/OKW5RN48ZJ/f.js</td>
</tr>
<tr data-local-id="c25027e34d25">
<td data-local-id="9a60b1f8db46">hxxps://filebulldogs[.]com/uploads/F1OQY9GU84/f.js</td>
</tr>
<tr data-local-id="7c40b6cab089">
<td data-local-id="8e7cc787349f">hxxps://filebulldogs[.]com/uploads/82WX5GP8CI/f.js</td>
</tr>
<tr data-local-id="a88120b485e0">
<td data-local-id="be21388e1fa4">hxxps://filebulldogs[.]com/uploads/AVQB61TVOX/document.pdf</td>
</tr>
<tr data-local-id="3ea809e57962">
<td data-local-id="0f9f83968084">hxxps://filebulldogs[.]com/uploads/OKW5RN48ZJ/document.pdf</td>
</tr>
<tr data-local-id="7b18196bb9dd">
<td data-local-id="bfd1068a5dc1">hxxps://filebulldogs[.]com/uploads/F1OQY9GU84/document.pdf</td>
</tr>
<tr data-local-id="87d45db7bf01">
<td data-local-id="f076f880ff92">hxxps://filebulldogs[.]com/uploads/82WX5GP8CI/document.pdf</td>
</tr>
<tr data-local-id="1f40098d3e67">
<td data-local-id="31a0243bbe06">hxxps://filebulldogs[.]com/uploads/AVQB61TVOX/a.zip</td>
</tr>
<tr data-local-id="ea8209410a22">
<td data-local-id="1387b5a644df">hxxps://filebulldogs[.]com/uploads/OKW5RN48ZJ/a.zip</td>
</tr>
<tr data-local-id="88312903b067">
<td data-local-id="970f9c06d309">hxxps://filebulldogs[.]com/uploads/F1OQY9GU84/a.zip</td>
</tr>
<tr data-local-id="990731e60cba">
<td data-local-id="cae1d84b6753">hxxps://filebulldogs[.]com/uploads/82WX5GP8CI/a.zip</td>
</tr>
</tbody>
</table>
<h4>MITRE ATT&amp;CK Mapping</h4>
<p>Tactic<strong>Technique ID</strong><strong>Technique Name</strong></p>
<table data-table-width="760" data-layout="default" data-local-id="89483646-eb2f-4908-ac2a-c8e85bd77cf9">
<tbody>
<tr data-local-id="b3c64d93-a986-4640-bfaf-52efdc664f12">
<td data-local-id="3858c2bb-b263-42b5-b12b-007d2e1855d5">Initial Access</td>
<td data-local-id="ab6d0953-1a49-4fe0-bbf4-41ccb9ef267d">T1566.001</td>
<td data-local-id="db7002fe-7855-42ae-8763-5a29dacb701b">Phishing: Spearphishing Attachment</td>
</tr>
<tr data-local-id="24506b1a-f62e-4a0e-b8db-893ac184c23c">
<td data-local-id="9c851fdd-889b-4ac7-af30-b5602255e474">Execution</td>
<td data-local-id="955f6b46-3bc8-4e77-b212-e1fdd282dcdc">T1204.002</td>
<td data-local-id="c1eaf54b-d1f8-4110-9532-bbf5772cfe95">User Execution: Malicious File</td>
</tr>
<tr data-local-id="d128d64b-9855-4f44-a856-29d0633c1f96">
<td data-local-id="3eaa26b2-8152-4ae1-b763-f9226f61aca2"></td>
<td data-local-id="22eeb122-aab5-4b51-ba4d-6a2d46f529f2">T1059.001</td>
<td data-local-id="bc509128-6926-4c39-91ad-276c6b59d1f6">Command and Scripting Interpreter: PowerShell</td>
</tr>
<tr data-local-id="1ede81e1-d264-4d98-ab1a-3e93d147346d">
<td data-local-id="6792aa3d-dae6-4de6-b9b7-7ff9e587eb80"></td>
<td data-local-id="4a4d1fd4-a5cf-4916-acec-e41de3f91516">T1059.007</td>
<td data-local-id="33780b45-af60-4199-854e-fc4f562bb64d">Command and Scripting Interpreter: JavaScript</td>
</tr>
<tr data-local-id="f082b2b0-485e-487a-85c7-fcf60125aa9c">
<td data-local-id="502916ea-273c-46ab-92ad-6f21e1562ba9">Defense Evasion</td>
<td data-local-id="dab6f558-7333-4ad3-ae34-081bee857773">T1027</td>
<td data-local-id="b41742b9-81e2-46f1-b503-1482a5c2d9a9">Obfuscated Files or Information</td>
</tr>
<tr data-local-id="dd4e36d9-8ff5-4ad3-ad71-e7561e4871f3">
<td data-local-id="7360edb1-e7a1-4a9a-b868-a0f9f4bc965b"></td>
<td data-local-id="20bdede1-bce1-4677-87ad-622e76322008">T1218</td>
<td data-local-id="ba921a8b-9ee5-40cb-83f6-63c70bec456e">System Binary Proxy Execution</td>
</tr>
<tr data-local-id="ff20a509-5ac8-4335-b2c6-0a0281d59537">
<td data-local-id="3f75d044-d128-48bc-90bf-5b495004fca5">Command and Control</td>
<td data-local-id="610c5b6d-9998-4a60-82c5-aa2694b00688">T1071.001</td>
<td data-local-id="83fdfc3f-1893-4a92-8aeb-12277c532365">Application Layer Protocol: Web Protocols</td>
</tr>
<tr data-local-id="7325b483-caf3-4c40-acba-2a60def9c7c9">
<td data-local-id="879f1564-414d-4327-8250-0396b01f230d"></td>
<td data-local-id="497d45a2-35cc-4cea-91ee-0da9bbbba1c0">T1105</td>
<td data-local-id="d574a752-42fb-43eb-bbe7-b63d3b7397cd">Ingress Tool Transfer</td>
</tr>
<tr data-local-id="4b689c4c-3661-43f8-8dd6-78ec7cb99a93">
<td data-local-id="b252ec68-6470-4793-8c2b-72af51424ac9">Collection</td>
<td data-local-id="1ea0fd9f-009e-4b95-bca9-25380f261286">T1005</td>
<td data-local-id="c2cca30a-b19d-470c-9efd-f8fc44eafcfd">Data from Local System</td>
</tr>
<tr data-local-id="4141d510-e44c-49ff-aeb2-a81aad5bb4a8">
<td data-local-id="e9e22dcb-bc56-41bf-8adf-a4cbde5108d2"></td>
<td data-local-id="d3c409d2-3a47-4736-95cc-2ed39a882513">T1213</td>
<td data-local-id="2f91d983-bdf0-4345-b574-8c857534dcfe">Data from Information Repositories</td>
</tr>
<tr data-local-id="a44e28c6-1d0c-494f-99a5-6807eb032ae6">
<td data-local-id="8b3c3ede-21dd-491a-a98e-b10bff08897c">Exfiltration</td>
<td data-local-id="7f5056b7-3e5b-4ae4-8319-c68802212e89">T1567.002</td>
<td data-local-id="59312cf0-05e9-4ec2-9d97-2132348123d4">Exfiltration to Cloud Storage</td>
</tr>
</tbody>
</table>
<h5>Authors</h5>
<ul>
<li>Priya Patel</li>
<li>Kartik Jivani</li>
<li>Sathwik Ram Prakki</li>
</ul>
<style>
.content td {line-break: anywhere;}<br />
</style>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/operation-camelclone-multi-region-espionage-campaign-targets-government-and-defense-entities-amidst-regional-tensions/" data-wpel-link="internal" target="_self">Operation CamelClone: Multi-Region Espionage Campaign Targets Government and Defense Entities Amidst Regional Tensions</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Secure Communication Protocols and Their Implementation</title>
		<link>https://www.seqrite.com/blog/secure-communication-protocols-and-their-implementation/</link>
		
		<dc:creator><![CDATA[Umar Khan A]]></dc:creator>
		<pubDate>Fri, 13 Mar 2026 10:30:27 +0000</pubDate>
				<category><![CDATA[Technical]]></category>
		<guid isPermaLink="false">https://www.seqrite.com/blog/?p=9952</guid>

					<description><![CDATA[<p>From Encryption to Real-World Attack Prevention In today’s hyper-connected digital environment, secure communication is not just about encrypting data—it is about preventing attackers from abusing exposed services. Secure communication protocols protect data in transit, but misconfigurations and weak access controls often turn legitimate protocols into attack vectors. This blog explores secure communication protocols, their implementation, [&#8230;]</p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/secure-communication-protocols-and-their-implementation/" data-wpel-link="internal" target="_self">Secure Communication Protocols and Their Implementation</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><strong>From Encryption to Real-World Attack Prevention</strong></h3>
<p>In today’s hyper-connected digital environment, secure communication is not just about encrypting data—it is about <strong>preventing attackers from abusing exposed services</strong>. Secure communication protocols protect data in transit, but misconfigurations and weak access controls often turn legitimate protocols into attack vectors.</p>
<p>This blog explores secure communication protocols, their implementation, real-world threats such as brute-force attacks, and practical defensive measures aligned with industry best practices.</p>
<h3><strong>1. Introduction to Secure Communication Protocols</strong></h3>
<p>Secure communication protocols are standardized rules and mechanisms that protect data exchanged across networks. Their primary goals are:</p>
<ul>
<li><strong>Confidentiality</strong> – preventing unauthorized disclosure</li>
<li><strong>Integrity</strong> – ensuring data is not altered in transit</li>
<li><strong>Authentication</strong> – verifying the identity of communicating parties</li>
</ul>
<p>Without these protocols, attackers can intercept, manipulate, or impersonate legitimate communications.</p>
<h3><strong>2. Core Secure Communication Protocols</strong></h3>
<h3><strong>TLS/SSL</strong></h3>
<p>TLS (formerly SSL) is the backbone of secure internet communication.</p>
<ul>
<li><strong>Use cases:</strong> HTTPS, APIs, email transport</li>
<li><strong>Security model:</strong> Asymmetric key exchange + symmetric encryption</li>
<li><strong>Implementation:</strong> Requires valid certificates issued by trusted Certificate Authorities (CAs)</li>
</ul>
<h3><strong>IPsec</strong></h3>
<p>IPsec secures communication at the network layer.</p>
<ul>
<li><strong>Use cases:</strong> VPNs, site-to-site tunnels</li>
<li><strong>Modes:</strong> Transport (payload only), Tunnel (entire packet)</li>
<li><strong>Strength:</strong> Protects traffic regardless of application</li>
</ul>
<h3><strong>SSH</strong></h3>
<p>SSH enables secure remote administration.</p>
<ul>
<li><strong>Use cases:</strong> Remote login, command execution, file transfer</li>
<li><strong>Security:</strong> Public key authentication and encrypted sessions</li>
</ul>
<h3><strong>S/MIME</strong></h3>
<p>S/MIME secures email communication using PKI.</p>
<ul>
<li><strong>Capabilities:</strong> Email encryption and digital signatures</li>
<li><strong>Trust model:</strong> Certificate-based identity verification</li>
</ul>
<h3><strong>HTTPS</strong></h3>
<p>HTTPS combines HTTP with TLS to secure web traffic.</p>
<ul>
<li><strong>Critical for:</strong> E-commerce, authentication portals, APIs</li>
<li><strong>Risk if misconfigured:</strong> Weak ciphers or expired certificates.</li>
</ul>
<h3><strong>3. Where Secure Protocols Fail in Practice</strong></h3>
<p>Even when secure protocols are deployed, attackers often bypass encryption by targeting <strong>authentication weaknesses</strong>, especially on services exposed to the internet.</p>
<p>Commonly abused services:</p>
<ul>
<li><strong>SMB (445)</strong></li>
<li><strong>RDP (3389)</strong></li>
<li><strong>MSSQL (1433)</strong></li>
</ul>
<p>The most frequent attack technique against these services is the <strong>brute-force attack</strong>, where automated tools attempt thousands of credential combinations until access is gained.</p>
<h3><strong>4. Brute-Force Attacks: Turning Secure Services into Entry Points</strong></h3>
<h3><strong>What Is a Brute-Force Attack?</strong></h3>
<p>A brute-force attack systematically attempts multiple username and password combinations to gain unauthorized access. Once successful, attackers may:</p>
<ul>
<li>Deploy malware or ransomware</li>
<li>Steal sensitive data</li>
<li>Establish persistent access</li>
</ul>
<p>These attacks are especially effective against <strong>publicly exposed services with weak authentication controls</strong>.</p>
<h3><strong>5. Attack Flow (Conceptual Diagram)</strong></h3>
<figure id="attachment_9953" aria-describedby="caption-attachment-9953" style="width: 626px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-9953" src="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture1.png" alt="" width="626" height="430" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture1.png 626w, https://www.seqrite.com/blog/wp-content/uploads/2026/03/Picture1-300x206.png 300w" sizes="(max-width: 626px) 100vw, 626px" /><figcaption id="caption-attachment-9953" class="wp-caption-text">Brute-Force Attack Lifecycle and Defensive Controls</figcaption></figure>
<p>This flow highlights a critical reality: <strong>encryption alone does not stop credential abuse</strong>.</p>
<h3><strong>6. MITRE ATT&amp;CK Mapping</strong></h3>
<table>
<tbody>
<tr>
<td width="265"><strong>Attack Stage</strong></td>
<td width="233"><strong>MITRE Technique</strong></td>
</tr>
<tr>
<td width="265">Credential Guessing</td>
<td width="233">T1110 – Brute Force</td>
</tr>
<tr>
<td width="265">Valid Account Abuse</td>
<td width="233">T1078 – Valid Accounts</td>
</tr>
<tr>
<td width="265">Remote Access</td>
<td width="233">T1021 – Remote Services</td>
</tr>
<tr>
<td width="265">Credential Access (Post-Compromise)</td>
<td width="233">T1003 – OS Credential Dumping</td>
</tr>
<tr>
<td width="265">Persistence</td>
<td width="233">T1053 – Scheduled Tasks / Jobs</td>
</tr>
</tbody>
</table>
<p>This mapping shows how a simple brute-force attempt can evolve into a full intrusion lifecycle.</p>
<h3><strong>7. Defensive Controls: Securing Services Beyond Encryption</strong></h3>
<h3><strong>Authentication Hardening</strong></h3>
<ul>
<li>Use <strong>strong, unique, complex passwords</strong></li>
<li>Avoid default usernames such as <em>Administrator</em>, <em>Admin</em>, <em>SA</em>, <em>root</em></li>
<li>Enforce periodic password rotation policies</li>
</ul>
<h3><strong>Account Lockout Policies</strong></h3>
<ul>
<li>Lock accounts after a defined number of failed attempts</li>
<li>Apply time-based or administrator-unlock policies to slow automated attacks</li>
</ul>
<h3><strong>MSSQL-Specific Protection</strong></h3>
<ul>
<li>Disable default <strong>SA</strong> account</li>
<li>Change default port <strong>1433</strong></li>
<li>Restrict public access to database services</li>
<li>Apply least-privilege access controls</li>
</ul>
<h3><strong>Network Exposure Reduction</strong></h3>
<ul>
<li>Monitor and restrict access to common attack ports:
<ul>
<li>SMB – 445</li>
<li>RDP – 3389</li>
<li>MSSQL – 1433</li>
</ul>
</li>
<li>Allow access <strong>only from trusted IP addresses</strong></li>
</ul>
<h3><strong>VPN Over Direct Exposure</strong></h3>
<p>Use VPNs with encrypted tunnels instead of direct NAT or port forwarding to reduce attack surface.</p>
<h3><strong>Multi-Factor Authentication (MFA)</strong></h3>
<p>Enable MFA on all internet-facing services to render brute-force attacks ineffective, even if credentials are compromised.</p>
<h3><strong>Defensive Checklist</strong></h3>
<p><strong>Use this as a quick security baseline:</strong></p>
<ul>
<li>☐ TLS/SSL certificates valid and using strong ciphers</li>
<li>☐ SMB, RDP, MSSQL not publicly exposed</li>
<li>☐ Strong password &amp; lockout policies enforced</li>
<li>☐ Default accounts disabled or renamed</li>
<li>☐ MFA enabled on external services</li>
<li>☐ VPN used instead of direct access</li>
<li>☐ IDS/IPS logs reviewed regularly</li>
<li>☐ Common ports strictly monitored</li>
<li>☐ Incident response plan documented</li>
</ul>
<h3><strong>8. Conclusion</strong></h3>
<p>Secure communication protocols are foundational to cybersecurity—but <strong>they are not sufficient on their own</strong>. Real-world security requires combining encryption with strong authentication, controlled exposure, continuous monitoring, and incident readiness.</p>
<p>By aligning secure protocol implementation with brute-force prevention strategies and MITRE ATT&amp;CK–informed defenses, organizations can significantly reduce their attack surface and strengthen their overall security posture.</p>
<p><strong>Authors:</strong></p>
<div data-olk-copy-source="MessageBody">Niraj Lazarus Makasare</div>
<div>Sumit Patil</div>
<div>Umar Khan A</div>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/secure-communication-protocols-and-their-implementation/" data-wpel-link="internal" target="_self">Secure Communication Protocols and Their Implementation</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI in Cybersecurity: A Game Changer or Overhyped?</title>
		<link>https://www.seqrite.com/blog/ai-in-cybersecurity-a-game-changer-or-overhyped/</link>
		
		<dc:creator><![CDATA[Bineesh P]]></dc:creator>
		<pubDate>Thu, 05 Mar 2026 09:11:19 +0000</pubDate>
				<category><![CDATA[AI (Artificial Intelligence)]]></category>
		<category><![CDATA[AI in cybersecurity]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[cyber defense]]></category>
		<category><![CDATA[cyber threat intelligence]]></category>
		<category><![CDATA[cybersecurity trends]]></category>
		<category><![CDATA[Generative AI]]></category>
		<category><![CDATA[security automation]]></category>
		<category><![CDATA[Seqrite]]></category>
		<category><![CDATA[SOC Automation]]></category>
		<category><![CDATA[threat detection]]></category>
		<guid isPermaLink="false">https://www.seqrite.com/blog/?p=9947</guid>

					<description><![CDATA[<p>Artificial Intelligence (AI) has moved from being a futuristic buzzword to a boardroom priority. In cybersecurity, especially, AI is often positioned as the silver bullet, capable of detecting threats in milliseconds, predicting attacks before they happen, and automating complex investigations without human intervention. But is AI truly a game-changer in cybersecurity? Or is it another [&#8230;]</p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/ai-in-cybersecurity-a-game-changer-or-overhyped/" data-wpel-link="internal" target="_self">AI in Cybersecurity: A Game Changer or Overhyped?</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.seqrite.com/blog/ai-in-secops-security-shield/" data-wpel-link="internal" target="_self" rel="follow">Artificial Intelligence</a> (AI) has moved from being a futuristic buzzword to a boardroom priority. In cybersecurity, especially, AI is often positioned as the silver bullet, capable of detecting threats in milliseconds, predicting attacks before they happen, and automating complex investigations without human intervention.</p>
<p>But is AI truly a game-changer in cybersecurity? Or is it another overhyped technology riding the wave of digital transformation?</p>
<p>The answer lies somewhere in between.</p>
<h3><strong>The Rising Complexity of Modern Threats</strong></h3>
<p>Cyber threats today are faster, stealthier, and more automated than ever before. Attackers use <a href="https://www.seqrite.com/blog/how-seqrite-endpoint-protection-blocks-non-human-threats-like-bots-and-malware/" data-wpel-link="internal" target="_self" rel="follow">AI-driven phishing</a> kits, automated vulnerability scanning, deepfakes, and polymorphic malware to bypass traditional defenses.</p>
<p>Organizations are dealing with:</p>
<ul>
<li>Massive volumes of log data</li>
<li>Distributed cloud environments</li>
<li>Hybrid workforces</li>
<li>Expanding attack surfaces</li>
<li>Increasing compliance obligations</li>
</ul>
<p>Traditional rule-based security systems struggle in such dynamic environments. Static signatures cannot keep up with constantly evolving threats. This is where AI begins to prove its value.</p>
<h3><strong>Where AI Truly Changes the Game</strong></h3>
<ol>
<li>
<h4><strong> Real-Time Threat Detection at Scale</strong></h4>
</li>
</ol>
<p>AI-powered systems can process enormous volumes of data across endpoints, networks, servers, and cloud environments. Unlike traditional tools that rely on predefined signatures, AI models identify anomalies and behavioral deviations.</p>
<p>For example, if a legitimate user account suddenly begins downloading large volumes of sensitive data at an unusual hour from an unfamiliar location, AI can flag it—even if no known malware signature exists.</p>
<p>This behavioral analysis significantly reduces detection gaps.</p>
<ol start="2">
<li>
<h4><strong> Faster Incident Response</strong></h4>
</li>
</ol>
<p>Security Operations Centers (SOCs) are overwhelmed with alerts. Many of these alerts are false positives. AI helps by:</p>
<ul>
<li>Correlating events across multiple systems</li>
<li>Prioritizing alerts based on risk context</li>
<li>Automating initial triage steps</li>
</ul>
<p>Instead of manually investigating hundreds of alerts, analysts can focus on the most critical threats. AI doesn’t replace analysts—it augments their capabilities.</p>
<ol start="3">
<li>
<h4><strong> Predictive Threat Intelligence</strong></h4>
</li>
</ol>
<p>AI systems can analyze historical attack patterns, threat feeds, and global intelligence data to predict potential vulnerabilities or attack trends.</p>
<p>By recognizing patterns across campaigns, AI can help organizations proactively strengthen defenses before being targeted.</p>
<ol start="4">
<li>
<h4><strong> Reducing Human Error</strong></h4>
</li>
</ol>
<p>Human error remains one of the biggest cybersecurity risks. <a href="https://www.seqrite.com/blog/ai-in-secops-security-shield/" data-wpel-link="internal" target="_self" rel="follow">AI-driven tools</a> reduce reliance on manual configuration and monitoring by:</p>
<ul>
<li>Automating policy enforcement</li>
<li>Detecting misconfigurations</li>
<li>Identifying risky user behavior</li>
</ul>
<p>This ensures consistent security enforcement across complex IT environments.</p>
<h3><strong>Where AI Falls Short</strong></h3>
<p>Despite its strengths, AI is not a magic solution.</p>
<ol>
<li>
<h4><strong> AI Needs Quality Data</strong></h4>
</li>
</ol>
<p>AI models are only as good as the data they are trained on. Poor-quality or biased data can lead to inaccurate detection and blind spots.</p>
<ol start="2">
<li>
<h4><strong> High False Positives in Early Stages</strong></h4>
</li>
</ol>
<p>Without proper tuning and contextual awareness, AI systems may generate excessive alerts. Over-alerting can lead to alert fatigue, the very problem AI aims to solve.</p>
<ol start="3">
<li>
<h4><strong> Adversarial AI</strong></h4>
</li>
</ol>
<p>Attackers are also using AI. Techniques such as adversarial machine learning attempt to manipulate AI systems into misclassifying malicious activity as safe.</p>
<p>The battle is no longer just human vs. human. It is AI vs. AI.</p>
<ol start="4">
<li>
<h4><strong> AI Cannot Replace Human Judgment</strong></h4>
</li>
</ol>
<p>Context matters. Business priorities matter. Risk appetite matters.</p>
<p>AI cannot understand strategic business decisions or nuanced insider threats as well as experienced security professionals can. Human expertise remains irreplaceable.</p>
<h3><strong>AI-Augmented Security: The Real Future</strong></h3>
<p>The future of cybersecurity is not AI replacing humans. It is AI augmenting human intelligence.</p>
<p>A modern security framework combines:</p>
<ul>
<li>AI-driven detection</li>
<li>Integrated threat intelligence</li>
<li>Context-aware risk analysis</li>
<li>Automated response workflows</li>
<li>Skilled human oversight</li>
</ul>
<p>This approach ensures faster detection, smarter response, and better resilience.</p>
<h3><strong>AI in Enterprise Security: A Strategic Imperative</strong></h3>
<p>As enterprises expand into cloud, remote work, IoT, and digital ecosystems, manual security monitoring becomes unsustainable. AI enables:</p>
<ul>
<li>Unified visibility across environments</li>
<li>Proactive risk mitigation</li>
<li>Reduced mean time to detect (MTTD)</li>
<li>Reduced mean time to respond (MTTR)</li>
</ul>
<p>However, organizations must adopt AI thoughtfully, ensuring transparency, continuous tuning, and integration with broader cybersecurity strategy.</p>
<h3><strong>So, Game Changer or Overhyped?</strong></h3>
<p><a href="https://www.seqrite.com/blog/generative-ai-xdr-benefits-cybersecurity/" data-wpel-link="internal" target="_self" rel="follow">AI in cybersecurity</a> is absolutely a game-changer, but only when implemented strategically.</p>
<p>It becomes overhyped when marketed as an autonomous replacement for human expertise.</p>
<p>The real transformation happens when AI is embedded into a holistic, integrated security architecture that delivers intelligence, context, and automation together.</p>
<h3><strong>How Seqrite Leverages AI to Deliver Real Security Outcomes</strong></h3>
<p>At Seqrite, AI is not treated as a buzzword; it is engineered into the core of our cybersecurity ecosystem.</p>
<p>From AI-powered threat detection and intelligent correlation in <a href="https://www.seqrite.com/extended-detection-and-response-xdr/" data-wpel-link="internal" target="_self" rel="follow"><strong>Seqrite XDR</strong></a>, to proactive endpoint protection, <a href="https://www.seqrite.com/blog/seqrite-mobile-device-management-organizations-today/" data-wpel-link="internal" target="_self" rel="follow">mobile device management,</a> and data privacy solutions, Seqrite integrates machine intelligence with contextual security intelligence and human-driven expertise.</p>
<p>Our solutions are designed to:</p>
<ul>
<li>Detect sophisticated threats beyond signatures</li>
<li>Correlate signals across endpoints and networks</li>
<li>Reduce alert fatigue with intelligent prioritization</li>
<li>Accelerate incident response</li>
<li>Strengthen enterprise-wide security posture</li>
</ul>
<p>If your organization is looking to move beyond reactive security and embrace AI-augmented protection that is practical, scalable, and enterprise-ready, Seqrite can help you build a smarter, stronger cybersecurity foundation.</p>
<p><strong>Explore Seqrite’s <a href="https://www.seqrite.com/" data-wpel-link="internal" target="_self" rel="follow">AI-powered cybersecurity solutions</a> and transform your security operations from reactive defense to proactive resilience.</strong></p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/ai-in-cybersecurity-a-game-changer-or-overhyped/" data-wpel-link="internal" target="_self">AI in Cybersecurity: A Game Changer or Overhyped?</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Inside a Multi-Stage Android Malware Campaign Leveraging RTO-Themed Social Engineering</title>
		<link>https://www.seqrite.com/blog/inside-a-multi-stage-android-malware-campaign-leveraging-rto-themed-social-engineering/</link>
		
		<dc:creator><![CDATA[Digvijay Mane]]></dc:creator>
		<pubDate>Wed, 04 Feb 2026 11:50:44 +0000</pubDate>
				<category><![CDATA[Technical]]></category>
		<guid isPermaLink="false">https://www.seqrite.com/blog/?p=9922</guid>

					<description><![CDATA[<p>In recent years, Android malware campaigns in India have increasingly abused the trust associated with government services and official digital platforms. By imitating well-known portals and leveraging social engineering through messaging applications, threat actors exploit user urgency and lack of verification, resulting in large-scale financial fraud and identity theft. At Seqrite labs, during our security [&#8230;]</p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/inside-a-multi-stage-android-malware-campaign-leveraging-rto-themed-social-engineering/" data-wpel-link="internal" target="_self">Inside a Multi-Stage Android Malware Campaign Leveraging RTO-Themed Social Engineering</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In recent years, Android malware campaigns in India have increasingly abused the trust associated with government services and official digital platforms. By imitating well-known portals and leveraging social engineering through messaging applications, threat actors exploit user urgency and lack of verification, resulting in large-scale financial fraud and identity theft.</p>
<p>At Seqrite labs, during our security research, we identified an active Android malware campaign targeting Indian users by impersonating government services, particularly RTO challan notifications and official alerts. These malicious applications are distributed outside the Google Play Store and are primarily shared through WhatsApp and similar messaging platforms.</p>
<p>This campaign represents an evolution of previously observed RTO-themed Android malware, incorporating improved anti-analysis technique, a modular multi-stage architecture, and a more structured backend ecosystem for data collection and remote operations.</p>
<h3><strong>Campaign Overview</strong></h3>
<p>We observed a three-stage Android malware campaign in the wild, primarily targeting Indian users by masquerading as RTO challan and government-related applications. The malware is distributed outside the Google Play Store and relies on cloud-based backend services for data exfiltration and command-and-control (C2) communication.</p>
<figure id="attachment_9923" aria-describedby="caption-attachment-9923" style="width: 528px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-large wp-image-9923" src="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure1-528x1024.jpg" alt="" width="528" height="1024" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure1-528x1024.jpg 528w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure1-155x300.jpg 155w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure1.jpg 719w" sizes="(max-width: 528px) 100vw, 528px" /><figcaption id="caption-attachment-9923" class="wp-caption-text">Fig.1 WhatsApp message</figcaption></figure>
<p>Each stage is delivered as a separate APK and is installed sequentially, forming a chained execution flow designed to:</p>
<ul>
<li>Maximize infection success</li>
<li>Maintain long-term persistence</li>
<li>Perform covert monetization</li>
<li>Harvest sensitive user data</li>
</ul>
<p>This modular design allows threat actors to replace or update individual stages without modifying the entire campaign, significantly improving operational flexibility and evasion.</p>
<h3><strong>Multi-Stage Infection Chain</strong></h3>
<p>The overall execution flow observed is as follows:</p>
<figure id="attachment_9924" aria-describedby="caption-attachment-9924" style="width: 683px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-large wp-image-9924" src="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure-2-683x1024.jpeg" alt="" width="683" height="1024" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure-2-683x1024.jpeg 683w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure-2-200x300.jpeg 200w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure-2-768x1152.jpeg 768w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure-2.jpeg 1024w" sizes="(max-width: 683px) 100vw, 683px" /><figcaption id="caption-attachment-9924" class="wp-caption-text">Fig. 2 Multi-Stage Infection Chain</figcaption></figure>
<p>Each stage performs a distinct function while remaining tightly integrated with the attacker-controlled backend.</p>
<h3><strong>Stage 1 – Dropper and Cryptominer</strong></h3>
<h4><strong>Primary Functions</strong></h4>
<ul>
<li>Acts as a dropper for Stage 2 and Stage 3 payloads</li>
<li>Performs cryptocurrency mining when the device is locked</li>
</ul>
<figure id="attachment_9925" aria-describedby="caption-attachment-9925" style="width: 768px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-large wp-image-9925" src="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure3-1024x431.jpg" alt="" width="768" height="323" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure3-1024x431.jpg 1024w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure3-300x126.jpg 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure3-768x324.jpg 768w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure3-1536x647.jpg 1536w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure3-2048x863.jpg 2048w" sizes="(max-width: 768px) 100vw, 768px" /><figcaption id="caption-attachment-9925" class="wp-caption-text">Fig. 3 First stage run</figcaption></figure>
<p>The first-stage application initiates the infection chain by decrypting and installing subsequent stages (refer to Figure 3). In parallel, it executes a cryptomining module that activates when the device screen is turned off, minimizing user suspicion and visual indicators of malicious activity (refer to Figure 4).</p>
<figure id="attachment_9926" aria-describedby="caption-attachment-9926" style="width: 768px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-large wp-image-9926" src="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure4-1024x237.png" alt="" width="768" height="178" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure4-1024x237.png 1024w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure4-300x70.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure4-768x178.png 768w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure4-1536x356.png 1536w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure4.png 1765w" sizes="(max-width: 768px) 100vw, 768px" /><figcaption id="caption-attachment-9926" class="wp-caption-text">Fig. 4 stage1 miner activity log</figcaption></figure>
<p>This behavior is consistent with previously documented Android cryptojacking campaigns, where mining operations are deferred until user inactivity to evade detection. Refer to our earlier research &#8211; <a href="https://www.seqrite.com/blog/android-cryptojacker-disguised-as-banking-app-exploits-device-lock-state/" data-wpel-link="internal" target="_self" rel="follow">Android Cryptojacker Masquerades as Banking App to Mine Cryptocurrency on Locked Devices</a></p>
<p>Once the second-stage application is successfully installed, the mining activity of Stage 1 is terminated, and control is transferred to the next component.</p>
<h3><strong>Stage 2 – Persistence, Backend Initialization, and Mining</strong></h3>
<h4><strong>Primary Functions</strong></h4>
<ul>
<li>Establishes persistence mechanisms</li>
<li>Initializes backend connectivity</li>
<li>Initiates its own cryptomining activity</li>
</ul>
<p>After being deployed by Stage 1, the second-stage application ensures long-term persistence by registering multiple broadcast receivers, hiding its launcher icon, and maintaining continuous background execution.</p>
<figure id="attachment_9927" aria-describedby="caption-attachment-9927" style="width: 768px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-large wp-image-9927" src="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure5-1024x66.png" alt="" width="768" height="50" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure5-1024x66.png 1024w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure5-300x19.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure5-768x50.png 768w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure5-1536x99.png 1536w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure5.png 1729w" sizes="(max-width: 768px) 100vw, 768px" /><figcaption id="caption-attachment-9927" class="wp-caption-text">Fig. 5 Firebase initialization</figcaption></figure>
<p>At this stage, the malware initializes connectivity with its cloud-based backend infrastructure here it is Google&#8217;s firebase (refer to Figure 5), which is later used for:</p>
<ul>
<li>Victim data storage</li>
<li>Remote configuration</li>
<li>Command-and-control communication</li>
</ul>
<p>Stage 2 also starts an independent cryptomining process, making it both a control layer and a monetization component. This stage effectively acts as a <strong>bridge between the initial infection logic and the final surveillance payload</strong>.</p>
<h3><strong>Stage 3 – Data Theft and Surveillance</strong></h3>
<h4><strong>Primary Functions</strong></h4>
<ul>
<li>Social engineering via fake government UI</li>
<li>Collection of PII and financial information</li>
<li>Backend-driven C2 communication</li>
<li>SMS forwarding, notification theft, and call redirection</li>
</ul>
<figure id="attachment_9928" aria-describedby="caption-attachment-9928" style="width: 768px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-large wp-image-9928" src="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure6-1024x334.jpg" alt="" width="768" height="251" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure6-1024x334.jpg 1024w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure6-300x98.jpg 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure6-768x250.jpg 768w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure6-1536x501.jpg 1536w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure6-2048x667.jpg 2048w" sizes="(max-width: 768px) 100vw, 768px" /><figcaption id="caption-attachment-9928" class="wp-caption-text">Fig. 6 Malware asking sensitive info 1</figcaption></figure>
<p>Upon installation, the third-stage application presents a fraudulent user interface mimicking official government portals, complete with RTO branding and logos. The app prompts users to verify their identity or clear a pending challan.</p>
<p>To proceed, users are instructed to grant multiple high-risk permissions, including SMS access, Call logs, Notification listener, Storage access, etc.</p>
<figure id="attachment_9929" aria-describedby="caption-attachment-9929" style="width: 768px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-large wp-image-9929" src="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure7-1024x339.jpg" alt="" width="768" height="254" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure7-1024x339.jpg 1024w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure7-300x99.jpg 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure7-768x254.jpg 768w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure7-1536x509.jpg 1536w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure7-2048x678.jpg 2048w" sizes="(max-width: 768px) 100vw, 768px" /><figcaption id="caption-attachment-9929" class="wp-caption-text">Fig. 7 Malware asking sensitive info 2</figcaption></figure>
<p>Once these permissions are granted, the malware begins harvesting:</p>
<ul>
<li>Personal identity information</li>
<li>Banking and financial notifications</li>
<li>OTP messages and transaction alerts</li>
<li>Device metadata and system information</li>
</ul>
<p>All collected data is transmitted to the attacker-controlled backend in structured JSON format and stored for further processing. This behavior is consistent with previously documented NextGen mParivahan Malware campaign. Refer to our earlier research &#8211; <a href="https://www.seqrite.com/blog/beware-fake-nextgen-mparivahan-malware-returns-with-enhanced-stealth-and-data-theft/" data-wpel-link="internal" target="_self" rel="follow">Beware! Fake &#8216;NextGen mParivahan&#8217; Malware Returns</a></p>
<h3><strong>Backend Infrastructure Access </strong></h3>
<p>After analyzing the multi-stage malware, we were able to obtain access to the backend infrastructure used by the threat actors. This provided rare visibility into the operational side of the campaign and allowed us to assess the true impact, scale, and capabilities of the malware ecosystem.</p>
<p>The backend was actively used to store stolen data as well as to control infected devices in real time.</p>
<h3><strong>Stolen Data Types</strong></h3>
<h4>The backend infrastructure contained highly sensitive and security-critical information, including:</h4>
<ul>
<li><strong>Personally Identifiable Information (PII): </strong>Full name, Phone number, Date of birth, Mother’s name, Aadhaar number, PAN number</li>
<li><strong>Financial and Credential Data: </strong>UPI PINs, Credit card details, Net banking usernames and passwords</li>
<li><strong>Surveillance Data: </strong>Intercepted SMS messages, Notification contents, Device status information</li>
</ul>
<p>This indicates that the malware was not limited to basic phishing but functioned as a full-scale identity theft and financial fraud platform.</p>
<p>Fig. 8 shows a structure in which data is stored by threat actors.</p>
<figure id="attachment_9930" aria-describedby="caption-attachment-9930" style="width: 340px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-9930" src="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure8.png" alt="" width="340" height="225" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure8.png 340w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure8-300x199.png 300w" sizes="(max-width: 340px) 100vw, 340px" /><figcaption id="caption-attachment-9930" class="wp-caption-text">Fig. 8 Structure of stored data</figcaption></figure>
<p>Data collected from user under login page stored in below format &#8211;</p>
<figure id="attachment_9931" aria-describedby="caption-attachment-9931" style="width: 490px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-9931" src="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure9.png" alt="" width="490" height="382" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure9.png 490w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure9-300x234.png 300w" sizes="(max-width: 490px) 100vw, 490px" /><figcaption id="caption-attachment-9931" class="wp-caption-text">Fig. 9 Login page stored data</figcaption></figure>
<p>To identify user and device, device information and other details collected it is stored in this format &#8211;</p>
<figure id="attachment_9932" aria-describedby="caption-attachment-9932" style="width: 415px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-9932" src="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure10.png" alt="" width="415" height="340" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure10.png 415w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure10-300x246.png 300w" sizes="(max-width: 415px) 100vw, 415px" /><figcaption id="caption-attachment-9932" class="wp-caption-text">Fig. 10 Use list stored</figcaption></figure>
<figure id="attachment_9933" aria-describedby="caption-attachment-9933" style="width: 456px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-9933" src="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure11.png" alt="" width="456" height="448" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure11.png 456w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure11-300x295.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure11-55x55.png 55w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure11-45x45.png 45w" sizes="(max-width: 456px) 100vw, 456px" /><figcaption id="caption-attachment-9933" class="wp-caption-text">Fig. 11 Stored user specific data</figcaption></figure>
<p>Collected messages stored in below format &#8211;</p>
<figure id="attachment_9934" aria-describedby="caption-attachment-9934" style="width: 397px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-9934" src="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure12.png" alt="" width="397" height="355" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure12.png 397w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure12-300x268.png 300w" sizes="(max-width: 397px) 100vw, 397px" /><figcaption id="caption-attachment-9934" class="wp-caption-text">Fig. 12 Stored SMS data</figcaption></figure>
<h3><strong>Backend as Command-and-Control (C2)</strong></h3>
<p>Beyond acting as a data repository, the backend infrastructure was actively used as a <strong>command-and-control (C2) system</strong>.</p>
<p><strong>C2 Capabilities Observed</strong></p>
<ul>
<li><strong>Remote configuration &#8211; </strong>Dynamic configuration of SMS forwarding phone numbers</li>
<li><strong>Tracking and Monitoring &#8211; </strong>SMS forwarding status, Call forwarding status, Device activity</li>
</ul>
<figure id="attachment_9935" aria-describedby="caption-attachment-9935" style="width: 903px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-9935" src="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure13.png" alt="" width="903" height="451" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure13.png 903w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure13-300x150.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure13-768x384.png 768w" sizes="(max-width: 903px) 100vw, 903px" /><figcaption id="caption-attachment-9935" class="wp-caption-text">Fig. 13 Callforwarding status</figcaption></figure>
<figure id="attachment_9936" aria-describedby="caption-attachment-9936" style="width: 366px" class="wp-caption aligncenter"><img decoding="async" loading="lazy" class="size-full wp-image-9936" src="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure14.png" alt="" width="366" height="277" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure14.png 366w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure14-300x227.png 300w" sizes="(max-width: 366px) 100vw, 366px" /><figcaption id="caption-attachment-9936" class="wp-caption-text">Fig. 14 SMS forwarding status</figcaption></figure>
<ul>
<li><strong>Centralized control &#8211; </strong>Live monitoring of infected devices, Operational status of malware deployment</li>
</ul>
<p>Effectively, the backend functioned as a central control panel for the operators, enabling them to:</p>
<ul>
<li>Manage stolen victim data</li>
<li>Monitor campaign performance</li>
<li>Remotely control malware behavior</li>
</ul>
<p>This confirms the presence of a well-organized and operationally mature threat infrastructure, rather than an amateur or one-off campaign.</p>
<h3><strong>Infection Scale and Victim Impact</strong></h3>
<p>Based on the records available in the backend infrastructure, approximately <strong>7,400 devices</strong> were infected. Not all victims provided every permission or submitted all requested data, but a significant number allowed SMS access and submitted highly sensitive personal and financial information</p>
<p>This demonstrates a large-scale, sustained, and successful compromise of real users, with long-term financial and privacy implications.</p>
<h3><strong>Evolution Over Earlier RTO Malware Campaigns</strong></h3>
<p>Compared to previously documented RTO and mParivahan malware, this campaign shows significant operational improvements:</p>
<table>
<tbody>
<tr>
<td width="286"><strong>Earlier Variants</strong></td>
<td width="345"><strong>Current Campaign</strong></td>
</tr>
<tr>
<td width="286">Single-stage APK</td>
<td width="345">Three-stage modular architecture</td>
</tr>
<tr>
<td width="286">Hardcoded logic</td>
<td width="345">Dynamic remote configuration</td>
</tr>
<tr>
<td width="286">No or less anti-analysis technique</td>
<td width="345">Extensive use of Anti-analysis technique</td>
</tr>
<tr>
<td width="286">Limited data theft</td>
<td width="345">Full surveillance toolkit</td>
</tr>
<tr>
<td width="286">No monetization</td>
<td width="345">Dual monetization (fraud + mining)</td>
</tr>
</tbody>
</table>
<p>These advancements indicate that threat actors are actively refining their tactics, reusing successful components while continuously improving backend operations and persistence mechanisms.</p>
<h3><strong>Potential Abuse Scenarios</strong></h3>
<h4>Based on observed capabilities, the malware enables several high-risk abuse scenarios, including:</h4>
<ul>
<li>Real-time OTP interception for financial fraud</li>
<li>Bank account takeover via credential harvesting</li>
<li>SIM swap facilitation using stolen identity data</li>
<li>Loan and credit fraud using Aadhaar and PAN details</li>
<li>WhatsApp and social media account hijacking</li>
</ul>
<p><strong>MITRE ATT&amp;CK Tactics and Techniques:</strong></p>
<p><img decoding="async" loading="lazy" class="aligncenter size-large wp-image-9937" src="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure15-1024x390.png" alt="" width="768" height="293" srcset="https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure15-1024x390.png 1024w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure15-300x114.png 300w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure15-768x293.png 768w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure15-1536x586.png 1536w, https://www.seqrite.com/blog/wp-content/uploads/2026/02/Figure15.png 1757w" sizes="(max-width: 768px) 100vw, 768px" /></p>
<h3><strong>Quick Heal Detection of Android Malware:</strong></h3>
<p>Quick Heal detects such malicious applications with variants of Android.Dropper.A</p>
<p>It is recommended that all mobile users should install a trusted Anti-Virus like “Quick Heal Mobile Security for Android” to mitigate such threats and stay protected. Our antivirus software restricts users from downloading malicious applications on their mobile devices. Download your Android protection <a href="https://play.google.com/store/apps/details?id=com.quickheal.platform.advance.blue.market&amp;hl=en_IN" data-wpel-link="external" target="_blank" rel="nofollow">here</a></p>
<h3><strong>Conclusion</strong></h3>
<p>This campaign represents a significant escalation in Indian Android malware operations, combining social engineering, modular architecture, cloud-based command infrastructure, and real-time financial surveillance. The three-stage design, coupled with cryptomining and centralized control, indicates a highly organized threat group focused on long-term exploitation rather than opportunistic attacks.</p>
<h3><strong>TIPS TO STAY DIGITALLY SAFE: </strong></h3>
<ul>
<li>Download applications only from trusted sources like <a href="https://play.google.com/store/apps/details?id=com.quickheal.platform&amp;hl=en_IN&amp;gl=US" data-wpel-link="external" target="_blank" rel="nofollow">Google Play Store.</a></li>
<li>Do not click on any links received through messages or any other social media platforms as they may be intentionally or inadvertently pointing to malicious sites.</li>
<li>Read the pop-up messages from the Android system before accepting or/allowing any new permissions.</li>
<li>Be extremely cautious about what applications you download on your phone, as malware authors can easily spoof the original applications’ names, icons, and developer details.</li>
<li>For enhanced phone protection, always use a good antivirus like <a href="https://play.google.com/store/apps/details?id=com.quickheal.platform.advance.blue.market" data-wpel-link="external" target="_blank" rel="nofollow">Quick Heal Mobile Security for Android.</a></li>
</ul>
<p>Don’t wait! <strong>Secure your smartphones today with Quick Heal Total Security for Mobiles &amp; Smartphones – </strong><a href="https://play.google.com/store/apps/details?id=com.quickheal.platform.advance.blue.market" data-wpel-link="external" target="_blank" rel="nofollow">Buy or Renew Today!</a></p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/inside-a-multi-stage-android-malware-campaign-leveraging-rto-themed-social-engineering/" data-wpel-link="internal" target="_self">Inside a Multi-Stage Android Malware Campaign Leveraging RTO-Themed Social Engineering</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>India’s DPDP Act:  Organizational Responsibilities and the Role of Seqrite</title>
		<link>https://www.seqrite.com/blog/indias-dpdp-act-organizational-responsibilities-and-the-role-of-seqrite/</link>
		
		<dc:creator><![CDATA[Mamatva Jethwa]]></dc:creator>
		<pubDate>Thu, 29 Jan 2026 06:17:39 +0000</pubDate>
				<category><![CDATA[DPDP Act]]></category>
		<category><![CDATA[data loss prevention]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[DLP]]></category>
		<category><![CDATA[DPDP]]></category>
		<category><![CDATA[DPDPA]]></category>
		<guid isPermaLink="false">https://www.seqrite.com/blog/?p=9872</guid>

					<description><![CDATA[<p>India’s Digital Personal Data Protection (DPDP) Act fundamentally changes how organizations collect, use, store, and protect personal data. It applies to any organization handling digital personal data of individuals in India, regardless of where the organization is located. For businesses, DPDP is not just a legal obligation. It is about risk reduction, accountability, and customer [&#8230;]</p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/indias-dpdp-act-organizational-responsibilities-and-the-role-of-seqrite/" data-wpel-link="internal" target="_self">India’s DPDP Act:  Organizational Responsibilities and the Role of Seqrite</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>India’s <a href="https://www.seqrite.com/blog/a-strategic-budget-blueprint-for-dpdp-compliance/" data-wpel-link="internal" target="_self" rel="follow">Digital Personal Data Protection (DPDP) Act</a> fundamentally changes how organizations collect, use, store, and protect personal data. It applies to any organization handling digital personal data of individuals in India, regardless of where the organization is located.</p>
<p>For businesses, DPDP is not just a legal obligation. It is about risk reduction, accountability, and customer trust. To comply effectively, organizations must move beyond policy documents and enforceable data protection controls are in place.</p>
<h3><strong>What Is the DPDP Act?</strong></h3>
<p>The DPDP Act governs the processing of personal data in digital form. Its objective is to ensure that personal data is:</p>
<ul>
<li>Collected lawfully</li>
<li>Used only for a defined purpose</li>
<li>Adequately protected</li>
<li>Shared in a controlled manner</li>
<li>Auditable and accountable</li>
</ul>
<p>Under DPDP, organizations are responsible for how personal data is collected and protected across endpoints and systems.</p>
<h3><strong>What Is Considered <a href="https://www.seqrite.com/blog/decoding-the-digital-personal-data-protection-act-2023-in-7-key-points/" data-wpel-link="internal" target="_self" rel="follow">Personal Data</a>?</strong></h3>
<p>Personal data under DPDP includes any information that can identify an individual, such as:</p>
<ul>
<li>Aadhaar, PAN, Voter ID, Passport</li>
<li>Phone numbers and email IDs</li>
<li>Financial, payroll, and employee records</li>
<li>Customer and transaction-related data</li>
</ul>
<p>In most organizations, this data primarily resides and moves through endpoints i.e, employee laptops, emails, USB drives, shared folders, and cloud applications. Making endpoint-level control critical.</p>
<h3><strong>What Organizations Must Take Care Under DPDP</strong></h3>
<ol>
<li><em><u>Lawful Processing &amp; Purpose Limitation</u></em></li>
</ol>
<p>Organizations must clearly define the purpose for collecting personal data and ensure it is not used beyond that purpose. Unrestricted access or reuse of personal data across departments increases the risk of misuse, over-collection, and unauthorized sharing, which can directly lead to regulatory violations and data breaches.</p>
<ol start="2">
<li><em><u>Prevent Unauthorized Sharing of Personal Data</u></em></li>
</ol>
<p>Personal data must not be freely shared through email, removable media, personal cloud storage, or unauthorized applications. Accidental sharing by employees or misuse by insiders remains one of the most common causes of data leaks, making preventive controls essential rather than reactive measures.</p>
<ol start="3">
<li><em><u>Implement Reasonable Security Safeguards</u></em></li>
</ol>
<p>DPDP requires organizations to implement “reasonable security safeguards” to protect personal data. This means relying on technical enforcement, not just written policies to prevent exposure, misuse, or loss of sensitive information. In the event of a breach, organizations must be able to demonstrate that protective controls were actively enforced.</p>
<ol start="4">
<li><em><u>Detect, Investigate, and Respond to Breaches</u></em></li>
</ol>
<p>Organizations must be capable of detecting personal data incidents quickly and investigating how the breach occurred. Without real-time visibility and detailed logs, incident response becomes slow and ineffective, increasing regulatory, financial, and reputational impact.</p>
<ol start="5">
<li><em><u>Enable Data Principal Rights</u></em></li>
</ol>
<p>DPDP grants individuals the right to access, correct, and erase their personal data. Without centralized discovery and tracking, fulfilling these requests across multiple endpoints becomes operationally complex and error-prone, increasing compliance risk.</p>
<h3><strong>Why <a href="https://www.seqrite.com/blog/how-seqrite-endpoint-protection-blocks-non-human-threats-like-bots-and-malware/" data-wpel-link="internal" target="_self" rel="follow">Endpoint Protection (EPP)</a> Alone Is Not Enough</strong></h3>
<p>Endpoint Protection Platforms (EPP) are designed to protect systems from malware, ransomware, exploits, and unauthorized access. While essential, EPP focuses on threat prevention, not data usage control.</p>
<p>EPP does not prevent scenarios such as:</p>
<ul>
<li>An employee emailing PAN or Aadhaar details to an external recipient</li>
<li>Copying payroll data to a USB drive</li>
<li>Uploading customer data to personal cloud storage</li>
<li>Sharing sensitive files with unauthorized users</li>
</ul>
<p>DPDP requires organizations to protect the data itself, not just the endpoint. This gap makes Data Loss Prevention (DLP) a critical requirement.</p>
<h3><strong>Why DLP Is Essential for DPDP Compliance</strong></h3>
<p>Data Loss Prevention focuses on identifying, monitoring, and controlling personal data as it is accessed, shared, or transferred. Without DLP, organizations cannot enforce purpose limitation, prevent accidental leaks, or demonstrate compliance during audits.</p>
<p>In practical terms, DPDP compliance without DLP leaves organizations exposed to insider risk, human error, and audit failures.</p>
<h3><strong>How Seqrite EPP with DLP Helps Achieve <a href="https://www.seqrite.com/dpdp-act-and-compliance-solutions/" data-wpel-link="internal" target="_self" rel="follow">DPDP Compliance</a></strong></h3>
<p>Seqrite combines Endpoint Protection Platform (EPP) with Data Loss Prevention (DLP) to deliver both security and compliance controls at the endpoint level.</p>
<ol>
<li><em><u>Discover and Classify Personal Data</u></em></li>
</ol>
<p>Seqrite DLP detects Indian personal data such as Aadhaar, PAN, Voter ID, Passport, phone numbers, and email IDs using predefined classifiers, regex, and dictionaries. Data-at-Rest scans help identify where personal data exists across endpoints. This enables organizations to gain visibility into personal data locations a foundational requirement for DPDP compliance.</p>
<ol start="2">
<li><em><u>Enforce Purpose-Based Data Usage</u></em></li>
</ol>
<p>Seqrite allows organizations to define DLP policies aligned with business functions such as HR, Finance, and Legal. Controls can be applied based on endpoint, applications, file types, and data channels to ensure personal data is used only for its intended purpose. This reduces over-collection and prevents unauthorized reuse of sensitive data.</p>
<ol start="3">
<li><em><u>Prevent Data Leakage at the Endpoint</u></em></li>
</ol>
<p>Seqrite DLP enforces controls across endpoints, email, removable media, and network shares. Unauthorized data transfers can be blocked or monitored in real time, significantly reducing the risk of accidental or intentional data leakage. This ensures personal data does not leave the organization through uncontrolled channels.</p>
<ol start="4">
<li><em><u>Strengthen Breach Detection and Audit Readiness</u></em></li>
</ol>
<p>Seqrite provides real-time alerts, detailed incident logs, and exportable reports for investigations and audits. Organizations can trace who accessed, copied, or attempted to share personal data, enabling faster response and regulatory readiness. This supports DPDP breach notification and accountability requirements.</p>
<ol start="5">
<li><em><u>Support <a href="https://www.seqrite.com/blog/why-data-principal-rights-management-is-the-heart-of-modern-privacy-compliance/" data-wpel-link="internal" target="_self" rel="follow">Data Principal Rights</a></u></em></li>
</ol>
<p>Using Data-at-Rest scans and identity-based searches, Seqrite helps organizations locate personal data linked to individuals. Deleted or restricted data can be monitored to prevent reappearance, supporting access, erasure, and grievance handling obligations.</p>
<h3><strong>Conclusion</strong></h3>
<p>DPDP compliance cannot be achieved through policies alone, it requires continuous visibility, control, and accountability over personal data.</p>
<p>While Endpoint Protection Platforms (EPP) secure systems against cyber threats, they do not control how personal data is accessed, used, or shared. Data Loss Prevention (DLP) fills this critical gap by ensuring personal data is handled lawfully and securely across endpoints and communication channels.</p>
<p>Together, <a href="https://www.seqrite.com/" data-wpel-link="internal" target="_self" rel="follow">Seqrite</a> EPP with DLP provides a strong, practical foundation for DPDP compliance, helping organizations reduce regulatory risk, prevent data leakage, and build lasting trust with customers and regulators.</p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/indias-dpdp-act-organizational-responsibilities-and-the-role-of-seqrite/" data-wpel-link="internal" target="_self">India’s DPDP Act:  Organizational Responsibilities and the Role of Seqrite</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data Privacy Day 2026: Why the &#8220;Privacy-First&#8221; Enterprise is Winning the Trust Race</title>
		<link>https://www.seqrite.com/blog/why-the-privacy-first-enterprise-is-winning-the-trust-race/</link>
		
		<dc:creator><![CDATA[Dhruvi Desai]]></dc:creator>
		<pubDate>Wed, 28 Jan 2026 05:16:08 +0000</pubDate>
				<category><![CDATA[Data privacy (DPDP)]]></category>
		<category><![CDATA[Customer Trust]]></category>
		<category><![CDATA[cybersecurity strategy]]></category>
		<category><![CDATA[Data governance]]></category>
		<category><![CDATA[Data Privacy Day 2026]]></category>
		<category><![CDATA[Data Privacy Strategy]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[Digital Trust]]></category>
		<category><![CDATA[DPDP Act]]></category>
		<category><![CDATA[Enterprise Data Privacy]]></category>
		<category><![CDATA[Global Privacy Laws]]></category>
		<category><![CDATA[Privacy by Design]]></category>
		<category><![CDATA[Privacy Compliance]]></category>
		<category><![CDATA[Privacy Leadership]]></category>
		<category><![CDATA[Privacy Risk Management]]></category>
		<category><![CDATA[Privacy-Centric Business]]></category>
		<category><![CDATA[Privacy-First Enterprise]]></category>
		<category><![CDATA[Regulatory compliance]]></category>
		<category><![CDATA[Responsible Data Use]]></category>
		<category><![CDATA[Trust-Driven Growth]]></category>
		<guid isPermaLink="false">https://www.seqrite.com/blog/?p=9864</guid>

					<description><![CDATA[<p>The Bottom Line Up Front: Privacy as a Moat: In 2026, privacy is no longer a legal &#8220;tax&#8221;; it’s a competitive advantage that accelerates sales and builds brand equity. The End of Data Hoarding: Storing &#8220;just in case&#8221; data is now a high-interest &#8220;Privacy Debt&#8221; that creates liability without value. The AI Mandate: In the [&#8230;]</p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/why-the-privacy-first-enterprise-is-winning-the-trust-race/" data-wpel-link="internal" target="_self">Data Privacy Day 2026: Why the &#8220;Privacy-First&#8221; Enterprise is Winning the Trust Race</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><strong>The Bottom Line Up Front:</strong></h3>
<ul>
<li><strong><a href="https://www.seqrite.com/blog/the-what-how-and-why-of-data-privacy/" data-wpel-link="internal" target="_self" rel="follow">Privacy</a> as a Moat:</strong> In 2026, privacy is no longer a legal &#8220;tax&#8221;; it’s a competitive advantage that accelerates sales and builds brand equity.</li>
<li><strong>The End of Data Hoarding:</strong> Storing &#8220;just in case&#8221; data is now a high-interest &#8220;Privacy Debt&#8221; that creates liability without value.</li>
<li><strong>The AI Mandate:</strong> In the age of Generative AI, data provenance (knowing where your data came from) is the new gold standard for enterprise accountability.</li>
</ul>
<p>Every January 28th, <strong><a href="https://www.seqrite.com/blog/building-trust-with-data-data-privacy-basics-for-business-leaders/" data-wpel-link="internal" target="_self" rel="follow">Data Privacy</a> Day</strong> serves as a global checkpoint. But in 2026, the conversation has moved far beyond &#8220;changing passwords.&#8221; We have entered the <strong>Operational Era of Privacy.</strong> With India’s DPDPA in full force and the EU AI Act setting new global benchmarks, the enterprise world is facing a fundamental truth: <strong>You cannot build a high-performance business on low-trust data.</strong></p>
<h3><strong>The 2026 Reality: Data is a Liability, Not Just an Asset</strong></h3>
<p>For decades, the &#8220;Big Data&#8221; mantra was: <em>Collect everything, figure it out later.</em> In 2026, that strategy is a ticking time bomb. Every kilobyte of unconsented or &#8220;dark&#8221; data you store is a liability.</p>
<ul>
<li><strong>The Trust Tax:</strong> Recent studies show that 81% of B2B buyers now list &#8220;Data Sovereignty&#8221; as a top-three requirement. If you can&#8217;t prove where your data is stored and how it’s protected, you aren&#8217;t just failing a security audit – you are losing the deal.</li>
<li><strong>The &#8220;Privacy Debt&#8221; Crisis:</strong> Enterprises are realizing that manual data mapping is impossible. When data is scattered across thousands of SaaS apps, &#8220;Privacy Debt&#8221; accumulates, making it impossible to respond to a single deletion request without pulling engineers off their core roadmap.</li>
</ul>
<h3><strong>From &#8220;Legal Checkbox&#8221; to &#8220;Core Product Experience&#8221;</strong></h3>
<p>The most successful organizations today are those that have moved privacy out of the legal department and into the product DNA.</p>
<ol>
<li><strong><a href="https://www.seqrite.com/blog/individual-rights-in-data-privacy-what-enterprises-need-to-know/" data-wpel-link="internal" target="_self" rel="follow">Privacy</a> as a UX Metric:</strong> Gone are the days of 50-page Terms of Service. In 2026, transparency is a feature. If a user can’t manage their consent or see their data footprint in a few clicks, the user experience has failed. We are moving toward &#8220;Privacy-by-Design,&#8221; where the default state is protection.</li>
<li><strong>The AI Paradox:</strong> AI is hungry for data, but regulations are hungry for accountability. Organizations are now using Privacy-Enhancing Technologies (PETs) and synthetic data to train models. The goal? Gaining the insights of AI without ever risking the exposure of a single customer’s PII (Personally Identifiable Information).</li>
<li><strong>Data Minimization is the New Optimization:</strong> The leanest companies are the safest ones. By practicing strict data minimization, deleting what you don&#8217;t need the moment you don&#8217;t need it &#8211; you aren&#8217;t just complying with laws like the <a href="https://www.seqrite.com/blog/gdpr-vs-dpdp-a-guide-for-businesses-navigating-global-data-privacy/" data-wpel-link="internal" target="_self" rel="follow">DPDPA</a>; you are reducing your attack surface and improving system performance.</li>
</ol>
<h3><strong>Beyond the Banner: A Call to Action</strong></h3>
<p>Data Privacy Day is a reminder that behind every data point is a human being.</p>
<p>As we look at the year ahead, the challenge for every leader is to stop asking, <em>&#8220;How do we stay compliant?&#8221;</em> and start asking, <em>&#8220;<strong>How do we become the most trusted name in our industry?</strong>&#8220;</em> The companies that win in 2026 will be the ones that view privacy not as a brake on innovation, but as the engine that makes innovation possible.</p>
<h3><strong>Key Takeaways for 2026</strong></h3>
<ul>
<li><strong>Audit Your &#8220;Dark Data&#8221;:</strong> Identify what you have, why you have it, and delete the rest.</li>
<li><strong>Automate the Workflow:</strong> Move away from manual spreadsheets to automated <a href="https://www.seqrite.com/blog/from-servers-to-endpoints-closing-the-compliance-gap-with-data-discovery/" data-wpel-link="internal" target="_self" rel="follow">data discovery.</a></li>
<li><strong><a href="https://www.seqrite.com/data-privacy/" data-wpel-link="internal" target="_self" rel="follow">Build for Transparency</a>:</strong> Make consent and data rights a seamless part of your user interface.</li>
<li><strong>Honor the Individual: </strong>Data belongs to the person, not the platform. Treat digital sovereignty as a core value rather than a compliance burden.</li>
</ul>
<p><strong>Happy Data Privacy Day.</strong> Let’s build a future where trust is the default.</p>
<p>The post <a rel="follow" href="https://www.seqrite.com/blog/why-the-privacy-first-enterprise-is-winning-the-trust-race/" data-wpel-link="internal" target="_self">Data Privacy Day 2026: Why the &#8220;Privacy-First&#8221; Enterprise is Winning the Trust Race</a> appeared first on <a rel="follow" href="https://www.seqrite.com/blog" data-wpel-link="internal" target="_self">Blogs on Information Technology, Network &amp; Cybersecurity | Seqrite</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
