Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • Microsoft Says One Million Devices Impacted by Infostealer Campaign 
  • Security Week

Microsoft Says One Million Devices Impacted by Infostealer Campaign 

Ionut Arghire March 7, 2025
0

Newly one million devices have been impacted by a malvertising campaign redirecting users to information stealer malware hosted on GitHub, Microsoft reports.

The campaign, attributed to a threat actor tracked as Storm-0408, targeted the visitors of illegal streaming websites, where malvertising redirectors led to an intermediate site and then to the Microsoft-owned code hosting platform.

The opportunistic attacks, which mainly relied on GitHub to host malware, but also on Discord and Dropbox, impacted “a wide range of organizations and industries, including both consumer and enterprise devices”, Microsoft says.

The multi-layers infection chain observed in these attacks included the GitHub-hosted first-stage payload acting as a dropper, second-stage files for system discovery and system information theft, and third-stage payloads for additional malicious activities.

Once installed on a victim’s device, the malware stored in GitHub repositories would fetch and deploy additional files and scripts, to harvest additional system information, achieve persistence, execute commands, and exfiltrate data from the compromised systems.

Specifically, Microsoft identified information stealers such as Lumma stealer and an updated version of Doenerium being deployed on victims’ systems, along with the NetSupport remote monitoring and management (RMM) software, and various PowerShell, JavaScript, VBScript, and AutoIT scripts.

For command-and-control (C&C) operations and data and browser credential exfiltration, the threat actors employed living-off-the-land binaries and scripts such as PowerShell, MSBuild, and RegAsm. For persistence, the attackers modified registry run keys and added a shortcut file to the Startup folder.

According to Microsoft, the first-stage payloads used in the campaign were digitally signed. Microsoft identified and revoked 12 different certificates used as part of the attacks.

Advertisement. Scroll to continue reading.

The tech giant has provided technical details on the observed malicious files and scripts, along with indicators of compromise (IoCs), urging organizations and users to ensure their systems are properly protected against such attacks.

Related: Network of 3,000 GitHub Accounts Used for Malware Distribution

Related: Threat Actors Abuse GitHub to Distribute Multiple Information Stealers

Related: US Transportation and Logistics Firms Targeted With Infostealers, Backdoors

Related: Threat Actor Uses Multiple Infostealers in Global Campaign

About The Author

Ionut Arghire

See author's posts

Original post here

Continue Reading

Previous: Cyberattack Disrupts National Presto Industries Operations
Next: FBI: Fake Ransomware Attack Claims Sent to US Executives via Snail Mail 

Trending Now

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices mm.jpg 1

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

May 23, 2025
300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide ransomware.jpg 2

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

May 23, 2025
SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection safeline.jpg 3

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

May 23, 2025
U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation botnet.jpg 4

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

May 23, 2025
CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs saas.jpg 5

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

May 23, 2025
GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts prompt.jpg 6

GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts

May 23, 2025

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices mm.jpg 1
  • The Hacker News

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

May 23, 2025
300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide ransomware.jpg 2
  • The Hacker News

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

May 23, 2025
SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection safeline.jpg 3
  • The Hacker News

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

May 23, 2025
U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation botnet.jpg 4
  • The Hacker News

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

May 23, 2025
CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs saas.jpg 5
  • The Hacker News

CISA Warns of Suspected Broader SaaS Attacks Exploiting App Secrets and Cloud Misconfigs

May 23, 2025
GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts prompt.jpg 6
  • The Hacker News

GitLab Duo Vulnerability Enabled Attackers to Hijack AI Responses with Hidden Prompts

May 23, 2025
Oops: DanaBot Malware Devs Infected Their Own PCs Oops: DanaBot Malware Devs Infected Their Own PCs 7
  • Uncategorized

Oops: DanaBot Malware Devs Infected Their Own PCs

May 22, 2025

You may have missed

mm.jpg
  • The Hacker News

ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices

[email protected] The Hacker News May 23, 2025 0
ransomware.jpg
  • The Hacker News

300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide

[email protected] The Hacker News May 23, 2025 0
safeline.jpg
  • The Hacker News

SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

[email protected] The Hacker News May 23, 2025 0
botnet.jpg
  • The Hacker News

U.S. Dismantles DanaBot Malware Network, Charges 16 in $50M Global Cybercrime Operation

[email protected] The Hacker News May 23, 2025 0
Copyright © 2025 All rights reserved. | MoreNews by AF themes.