Two ransomware campaigns tracked using 'email bombing,' Microsoft Teams 'vishing'

Jan. 21, 2025, 5:16 p.m.

Description

Sophos MDR has identified two threat clusters, STAC5143 and STAC5777, utilizing Microsoft Office 365 to gain unauthorized access to organizations. Both groups employ email bombing and fake tech support social engineering via Microsoft Teams to deliver malware. STAC5143 uses Java and Python-based tools, possibly linked to FIN7. STAC5777 employs Microsoft Quick Assist for remote access and deploys malware through a legitimate Microsoft updater. This group has connections to the Black Basta ransomware. Both clusters aim to steal data and deploy ransomware, using similar tactics but different tools and malware. The report details their attack chains, malware analysis, and attribution, highlighting the need for improved security measures and employee awareness.

Date

  • Created: Jan. 21, 2025, 12:40 p.m.
  • Published: Jan. 21, 2025, 12:40 p.m.
  • Modified: Jan. 21, 2025, 5:16 p.m.

Indicators

  • d23491dd351f43f0efad5cee2be80c4049349a7695c0e7de1de632c791356183
  • c43e506c9b964dddf6fd784bf0cc78b4a2396f47257361dc22e1070e249eae16
  • bda2503fc02b11258399cfabd0778a997654b5bd7d30e5e3f5bef54a74b914e1
  • b351e3f475681ab2e8db5b2bbd2beaf26e5b4fd082ca08eba6fffbc76370113c
  • 8891e7562eb4db253a8582376083ca99b19457680f9d36a5ba4108790740785e
  • 7bcfcc90d0bd6c85b5b1cc9f287e161020571a0418afb50f2dd67685e9d3a4fc
  • 716778bab5fb2c439a51362be5941a50d587714d58a6faa39eefa96aa79c1561
  • 564b21c293bc9d0885dc7a87dbf488a497c98d2103d91f5bbcfdb476eb8b6f4c
  • 4dce8b3beba71b8b44b6576ff2497ed68c6fafebd046822f0d60f8758238e900
  • 01082cd4733e5f3e2c3f642fa6c0afb5a9489d39ff26a35549263fc0e02ebad3
  • 89.185.80.86
  • 207.90.238.52
  • 195.123.241.24
  • 207.90.238.99
  • 195.133.1.117

Attack Patterns

  • Black Basta - S1070
  • FIN7
  • T1482
  • T1018
  • T1059.001
  • T1071.001
  • T1105
  • T1049
  • T1090