Attacks commenced with an IT department-impersonating phone call coinciding with a wave of two dozen unwanted emails luring the targeted organizations' employee to open Microosft Quick Assist and permit remote access before proceeding with the download and extraction of a nefarious archive with the QEMU emulator, a VBS script, and a QDoor backdoor-loaded Windows 7 image, according to an analysis from Sophos. Exploitation of QEMU allowed covert compromise and reconnaissance efforts resulting in XEOXRemote remote monitoring and management tool installation and domain admin account infiltration, which then led to the theft of 868 GB of data, noted Sophos, which was able to limit the attack's impact on the breached host. Sophos said that such an intrusion should prompt improved admin account audits and XDR tool implementation.
Ransomware
Email bombing, other techniques leveraged by 3AM ransomware gang

(Adobe Stock)
BleepingComputer reports that highly targeted intrusions involving email bombing and fake IT support calls have been launched by threat actors linked to the 3AM ransomware operation during the first quarter of this year.
Attacks commenced with an IT department-impersonating phone call coinciding with a wave of two dozen unwanted emails luring the targeted organizations' employee to open Microosft Quick Assist and permit remote access before proceeding with the download and extraction of a nefarious archive with the QEMU emulator, a VBS script, and a QDoor backdoor-loaded Windows 7 image, according to an analysis from Sophos. Exploitation of QEMU allowed covert compromise and reconnaissance efforts resulting in XEOXRemote remote monitoring and management tool installation and domain admin account infiltration, which then led to the theft of 868 GB of data, noted Sophos, which was able to limit the attack's impact on the breached host. Sophos said that such an intrusion should prompt improved admin account audits and XDR tool implementation.
Attacks commenced with an IT department-impersonating phone call coinciding with a wave of two dozen unwanted emails luring the targeted organizations' employee to open Microosft Quick Assist and permit remote access before proceeding with the download and extraction of a nefarious archive with the QEMU emulator, a VBS script, and a QDoor backdoor-loaded Windows 7 image, according to an analysis from Sophos. Exploitation of QEMU allowed covert compromise and reconnaissance efforts resulting in XEOXRemote remote monitoring and management tool installation and domain admin account infiltration, which then led to the theft of 868 GB of data, noted Sophos, which was able to limit the attack's impact on the breached host. Sophos said that such an intrusion should prompt improved admin account audits and XDR tool implementation.
An In-Depth Guide to Ransomware
Get essential knowledge and practical strategies to protect your organization from ransomware attacks.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds