Rainbow Hyena strikes again: new backdoor and shift in tactics

A new phishing campaign targeting healthcare and IT organizations in Russia has been attributed to the Rainbow Hyena cluster. The attackers used compromised email addresses to distribute malicious attachments, including polyglot files and LNK files mimicking legitimate documents. A new custom-built backdoor called PhantomRemote was identified, capable of system information gathering and command execution. The campaign demonstrates a shift in tactics, with threat actors abandoning traditional malicious documents in favor of alternative formats. The sophistication of the tools and techniques suggests a move towards more conventional illicit activities such as espionage and financial gain. Author: AlienVault

Related Tags:
PhantomRemote

LNK files

T1132.001

Russian Federation

T1059.003

T1071.001

Healthcare

T1012

T1573

Associated Indicators:
4C78D6BBA282AAFF0EAB749CFA8A28E432F7CBF9C61DEC8DE8F4800FD27E0314

47262571A87E70238BD6AFD376560E9CFDC94BFACAE72F36B6AA9FB6E769EB9C

204544FC8A8CAC64BB07825A7BD58C54CB3E605707E2D72206AC23A1657BFE1E

4D4304D7AD1A8D0DACB300739D4DCAADE299B28F8BE3F171628A7358720CA6C5

413C9E2963B8CCA256D3960285854614E2F2E78DBA023713B3DD67AF369D5D08

A9324A1FA529E5C115232CBBC60330D37CEF5C20860BAFC63B11E14D1E75697C

ED9B24A77A74CD34C96B30F8DE794FE85EB1D9F188F516BD7D6020CC81A86728

DA53C49641B05E00CDE09D47260DA927EC403F01AC388605B785EAC98306F9C2

01F12BB3F4359FAE1138A194237914F4FCDBF9E472804E428A765AD820F399BE