News from our Cybersecurity Expert Center
We bring you the latest news and alerts detected from Cybersecurity.
Connect with us by siainfo@sia.es
Outstanding cybersecurity news
Vulnerabilities
Cybercriminals are actively exploiting a 0-day vulnerability in Sonic Wall's SMA1000 product (CVE-2025-23006).
Cisco patches a critical privilege escalation vulnerability in its Meeting Management tool (CVE-2025-20156)
Malware
Malware campaign spoofs Reddit and WeTransfer to distribute Lumma Stealer
New malware called BackConnect linked to Qakbot loader
Cybersecurity
Hacktivist group Mr Hanza claims responsibility for DDoS attack on ChatGPT causing worldwide service outage
Spanish footwear, clothing and accessories firm Hoff suffers a cyberattack that could affect personal data of its customers
Latest threats detected
RansomHub affiliate uses Python backdoor to compromise networks
27/01/2025
Executive summary
A RansomHub affiliate uses a Python backdoor to spread ransomware on compromised networks.
Data
Type:
TLP:
Targets:
Affected assets:
Attack vector:
Tags:
Malware
White
Multiple
Multiple
Browser updates
RansomHub, SocGholish, backdoor, python, ransomware
Description
An attack has been detected in which a malicious actor used a Python-based backdoor to maintain persistent access to compromised systems and subsequently deploy the RansomHub ransomware across the affected network.
Technical Details
Initial access was gained via a JavaScript malware known as SocGholish, which is distributed via campaigns that trick users into installing fake web browser updates. These campaigns often involve legitimate but infected websites, to which victims are redirected from search engine results manipulated with SEO techniques.
Once executed, SocGholish communicates with a server controlled by the attacker to download additional malicious payloads. Subsequently, the Python backdoor is installed approximately 20 minutes after the initial SocGholish infection and then the backdoor propagates to other machines on the same network via RDP sessions. The Python script acts as a reverse proxy that connects to a predefined IP address.
After establishing a connection to the C2 server, it creates a tunnel based on the SOCKS5 protocol, allowing the attacker to move laterally through the compromised network using the victim's system as a proxy.
This backdoor has been active since December 2023, featuring superficial changes aimed at improving its obfuscation methods to evade detection. The script code is polished and well-structured, suggesting that the malware author is meticulous in maintaining readable and testable Python code, or uses artificial intelligence tools to assist in programming.
In addition to the Python backdoor, other tools used prior to ransomware deployment have been identified, such as EDRSilencer and Backstab to disable detection and response solutions on endpoints, LaZagne for credential theft, MailBruter for forcing email credentials, and Sirefef and Mediyes to maintain access and deliver additional payloads.
Techniques used
INITIAL ACCESS
Drive-by Compromise - T1189
Spearphishing Link - T1566.002
EXECUTION
Command and Scripting Interpreter: Python - T1059.006
User Execution: Malicious File - T1204.001
DEFENSE EVASION
Impair Defenses: Disable or Modify Tools - T1562.001
Obfuscated Files or Information - T1027
COMMAND & CONTROL
Proxy: Multi-hop Proxy - T1090.003
DISCOVERY
Remote System Discovery - T1018
System Information Discovery - T1082
IMPACT
Data Encrypted for Impact - T1486
Inhibit System Recovery - T1490
Recommendations
Protection
Detection
Mitigation
We promote the transformation of business and society through innovative solutions and services, putting people at the center.
Indra is one of the leading global technology and consulting companies: the technology partner for key operations of client businesses worldwide.
Tel.: +34 91 480 50 00
We promote the transformation of business and society through innovative solutions and services, putting people at the center.
Indra is one of the leading global technology and consulting companies: the technology partner for key operations of client businesses worldwide.