Two ransomware campaigns tracked using 'email bombing' and Microsoft Teams 'vishing'

Jan. 22, 2025, 9:17 a.m.

Description

Sophos MDR has identified two threat clusters, STAC5143 and STAC5777, targeting organizations using Microsoft Office 365. Both employ similar tactics: email bombing to create urgency, followed by social engineering via Microsoft Teams calls posing as tech support. The attackers use remote access tools to deploy malware and conduct reconnaissance. STAC5143 uses Java and Python-based malware, possibly linked to FIN7. STAC5777 utilizes a malicious DLL side-loaded by a legitimate Microsoft updater, and in one case attempted to deploy Black Basta ransomware. Both groups aim to steal data and deploy ransomware, exploiting Office 365 vulnerabilities and users' trust in IT support.

Date

  • Created: Jan. 22, 2025, 9:09 a.m.
  • Published: Jan. 22, 2025, 9:09 a.m.
  • Modified: Jan. 22, 2025, 9:17 a.m.

Indicators

  • f009ec775b2daa5a0f38dc2593a3c231611bea7cb579363915d9be1135b00455
  • ea2b3bf32cc27e959e19c365fa2f6e5310ef2e76d3d0ed2df3fb5945f9afc9e7
  • 801525d7239e46f9c22d7e7bcd163abcfb29fc0770ff417f5fc62bfb005ec7ac
  • a23560a3b9a9578dcd70bcd01434b2053940d6be36e543df8e4d36931ca9ea63
  • 8abc8c92ebfe78f54e7488a467d1b6e90d28382067b49a954e31133691112eba
  • 697d5213d69cdfbd943c6d395f907b8fe210bbfc9d78a9d41a046ba55bebb5ff
  • 4b6a008c8b85803dc19a8286f33cad963425d37c4ca0b1a9454a854db3273dad
  • 42d09288a78363cac90759ddce814a420f22d174768c1e406bf2d8fed2c38ade
  • 3d0e55bd3c84e6cb35559ef1d0f2ef72a21e0f3793a9158d514f12f46b0aff85
  • 78.46.67.201
  • 207.90.238.46
  • 206.206.123.75
  • 109.107.170.2
  • 194.87.39.183
  • 195.123.241.24
  • 207.90.238.99
  • 195.133.1.117

Attack Patterns

  • Black Basta - S1070
  • STAC5143, STAC5777
  • T1482
  • T1018
  • T1059.001
  • T1071.001
  • T1105
  • T1049
  • T1090