Operation MoneyMount, ISO Deploying Phantom Stealer
Dec. 21, 2025, 7:01 p.m.
Description
A Russian phishing campaign targeting finance and accounting sectors uses fake payment confirmation emails to deliver Phantom stealer malware. The attack chain involves a ZIP file containing an ISO, which when mounted reveals an executable that loads the stealer. The malware employs anti-analysis techniques, extracts crypto wallets, browser data, and Discord tokens. It also includes keylogging and clipboard monitoring capabilities. The stolen data is exfiltrated via Telegram, Discord webhooks, or FTP. The operation showcases the increasing sophistication of commodity stealers and the strategic use of ISO files for initial access to evade security controls.
Tags
Date
- Created: Dec. 12, 2025, 8:45 a.m.
- Published: Dec. 12, 2025, 8:45 a.m.
- Modified: Dec. 21, 2025, 7:01 p.m.
Indicators
- 4b16604768565571f692d3fa84bda41ad8e244f95fbe6ab37b62291c5f9b3599
- 60994115258335b1e380002c7efcbb47682f644cb6a41585a1737b136e7544f9
- 27bc3c4eed4e70ff5a438815b1694f83150c36d351ae1095c2811c962591e1bf
- 78826700c53185405a0a3897848ca8474920804a01172f987a18bd3ef9a4fc77
Attack Patterns
- Phantom Stealer
Additional Informations
- Finance
- Russian Federation