Acreed emerged in early 2025 as a lean, stealthy infostealer that quickly gained favor among Russian-speaking cybercriminal forums.
First spotted on February 14, 2025, bundled with log packages sold by the threat actor “Nuez,” Acreed distinguishes itself from bulkier rivals by producing minimalistic logs that avoid revealing infection vectors.
In several incidents analyzed by Intrinsec researchers, Acreed logs comprised only browser passwords, cookies, and autofill data, omitting history and downloads to thwart forensic tracing.
First Acreed log offered on Russian Market (Source – Intrinsec)
This low-profile approach enhances operational security and complicates attribution. Initial infection chains often began with trojanized installers hosted on compromised websites such as download.it and unlocktool.net.
ShadowLoader, dropped during these incidents, unpacked two nearly identical PE32 modules that injected malicious code into legitimate signed DLLs such as WebView2Loader.dll.
Static analysis of these samples revealed unique mutex names like “WilStaging02” and an XOR-based C2 domain retrieval mechanism that leverages both BNB Smartchain and Steam dead-drop resolvers.
Intrinsec analysts noted that most samples perform an HTTP POST to a testnet smart contract at data-seed-prebsc-1-s1.binance.org:8545 using the payload:
The base64 result decodes to a hex string which is XOR-decoded with the key Kduhw8rtgt43t4565fewqioh28268e289ey2860H283dho yielding the domain windowsupdateorg.live.
The same approach with a hardcoded key qNBD8qgbd8gh28232032932DGH283dhi applied to comments on a Steam profile dead-drop (https://steamcommunity.com/profiles/76561199780129524) reveals additional C2 hosts such as trustdomainnet.live (Figure 14).
These C2 channels serve simple PHP-based APIs (api.php?action=register, api.php?action=update, api.php?action=screenshot), allowing the malware to exfiltrate screenshots and harvested credentials over TLS 1.1/1.2 only.
Dynamic HTTP configuration uses WinHttpSetOption to enforce secure protocols and bypass legacy SSL versions.
Infection Mechanism
Acreed’s infection begins with a ShadowLoader dropper that unpacks two infostealer payloads differentiated by file size (1.43 MB vs. 1.40 MB).
On execution, the stealer spawns mutexes named with process IDs to prevent double-instantiation. It then retrieves the current C2 domain via the dead-drop resolver and establishes an encrypted session.
Once C2 is resolved, the stealer parses key directories in AppData\Local for Chrome, Edge, and Brave, extracting Login Data, Cookies, and autofill records.
To evade sandbox detection, Acreed queries installed browser extensions by ID, searching for wallet extensions such as MetaMask and Coinbase Wallet by matching GUIDs in extension directories.
JavaScript clipper modules (cryptomus.js) fetched from C2 domains replace cryptocurrency addresses in clipboard or page elements.
For example, after retrieving wallet mappings via:-
The script uses regex patterns to substitute victim addresses with attacker-owned wallets before transaction execution.
By combining compact exfiltration logs, blockchain-based dead drops, and established clipper modules, Acreed exemplifies modern modular stealth in infostealer design, posing a significant risk to users who store credentials and cryptocurrency wallets in browsers.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.
Olymp Loader, a newly emerged Malware-as-a-Service (MaaS) offering, has rapidly gained traction across underground forums and Telegram since its debut on June 5, 2025. Developed by a trio of seasoned Assembly coders under the alias “OLYMPO,” the loader boasts fully Assembly-based modules, advanced evasion techniques, and built-in stealer functionality—features that appeal to low- and mid-tier […]
The cybersecurity landscape experienced a significant escalation in September 2025, when Cisco disclosed multiple critical zero-day vulnerabilities affecting its Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) platforms.
At the center of this security crisis lies CVE-2025-20333, a devastating remote code execution vulnerability with a CVSS score of 9.9, which sophisticated state-sponsored threat actors have actively exploited in a campaign that represents a major evolution of the ArcaneDoor attack methodology.
CVE-2025-20333 represents a buffer overflow vulnerability in the VPN web server component of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software.
This critical flaw allows authenticated remote attackers with valid VPN user credentials to execute arbitrary code with root privileges on affected devices by sending crafted HTTP requests.
The vulnerability stems from improper validation of user-supplied input in HTTP(S) requests, a fundamental weakness that has devastating consequences when exploited successfully.
The technical nature of this vulnerability makes it particularly dangerous for several reasons.
First, it provides attackers with root-level access to the compromised device, effectively granting complete control over the security appliance that serves as the perimeter defense for an organization’s network.
Second, the buffer overflow mechanism allows for reliable exploitation, as demonstrated by the active campaigns observed in the wild.
Third, when chained with CVE-2025-20362, the authentication requirement can be bypassed, transforming this into an unauthenticated remote code execution vulnerability.
The exploitation of CVE-2025-20333 requires attackers to have valid VPN user credentials initially.
However, security researchers and government agencies have confirmed that this vulnerability is being chained with CVE-2025-20362, which allows unauthenticated access to restricted URL endpoints.
This chaining technique effectively removes the authentication barrier, enabling attackers to achieve unauthenticated remote code execution on vulnerable systems.
The combination of these two vulnerabilities creates a perfect storm for attackers seeking to compromise network perimeter devices.
ArcaneDoor Exploiting Vulnerability
The exploitation of CVE-2025-20333 is attributed to UAT4356, also known as Storm-1849, a sophisticated state-sponsored threat actor that has been active since at least 2024.
This group is believed to be China-aligned and specializes in targeting government networks and critical infrastructure worldwide through campaigns focused on perimeter network device exploitation.
The current campaign represents a significant evolution from their previous ArcaneDoor activities, demonstrating enhanced capabilities and more sophisticated attack methodologies.
The ArcaneDoor campaign initially came to public attention in early 2024 when Cisco Talos identified attacks targeting Cisco ASA devices using two different zero-day vulnerabilities: CVE-2024-20353 and CVE-2024-20359.
These earlier attacks deployed malware families known as Line Runner and Line Dancer, which provided the threat actors with persistent access and the ability to execute arbitrary commands on compromised devices.
The success of these initial campaigns appears to have encouraged the threat actors to develop new capabilities and target additional vulnerabilities.
In May 2025, multiple government agencies engaged Cisco to investigate a new wave of attacks targeting Cisco ASA 5500-X Series devices.
The investigation revealed that the same threat actor behind the original ArcaneDoor campaign had evolved their tactics, techniques, and procedures, now deploying more sophisticated malware families called RayInitiator and LINE VIPER.
These new malware families represent a significant advancement in capability, featuring enhanced persistence mechanisms and improved evasion techniques compared to their predecessors.
Cisco ASA 0-Day RCE Attack Chain
The current ArcaneDoor campaign showcases a sophisticated multi-stage attack chain that commences with the exploitation of CVE-2025-20362 to circumvent authentication mechanisms.
Attackers first leverage this missing authorization vulnerability to gain access to restricted URL endpoints that would normally require authentication.
This initial foothold provides the necessary access to exploit CVE-2025-20333, which then allows for authenticated remote code execution with root privileges.
Once initial access is achieved through the vulnerability chain, attackers deploy RayInitiator, a persistent multi-stage bootkit that is flashed directly to the victim device’s firmware.
RayInitiator represents a significant advancement over previous malware families, as it operates at the bootloader level and can survive device reboots and firmware upgrades.
This bootkit modifies the Grand Unified Bootloader (GRUB) to ensure persistence even through system maintenance activities that would normally remove malicious software.
The second component of the attack chain involves the deployment of LINE VIPER. This sophisticated user-mode shellcode loader receives commands through WebVPN client authentication sessions or via specially crafted ICMP packets.
LINE VIPER utilizes victim-specific tokens and RSA encryption keys to secure command and control communications.
The malware’s capabilities include executing CLI commands, performing packet captures, bypassing Authentication, Authorization, and Accounting (AAA) controls, suppressing syslog messages, harvesting user CLI commands, and forcing delayed reboots to evade forensic analysis.
Affected Infrastructure And Impact Assessment
The scope of devices affected by CVE-2025-20333 and the associated campaign is significant, particularly for organizations relying on legacy Cisco ASA hardware.
The threat actors specifically targeted Cisco ASA 5500-X Series devices running ASA software versions 9.12 or 9.14 with VPN web services enabled.
These targeted models include the 5512-X, 5515-X, 5525-X, 5545-X, 5555-X, and 5585-X, many of which are approaching or have already passed their end-of-support dates.
The strategic selection of these particular models is not coincidental. All successfully compromised devices lack Secure Boot and Trust Anchor technologies, making them vulnerable to the firmware-level persistence mechanisms employed by RayInitiator.
This technological limitation means that traditional remediation approaches, such as device reboots or software updates, are insufficient to completely remove the threat actor’s presence from compromised systems.
The absence of secure boot capabilities allows attackers to modify the device’s ROM Monitor (ROMMON) to maintain persistence across reboots and software upgrades.
The impact of successful exploitation extends far beyond the compromise of individual devices. Cisco ASA appliances typically serve as critical network perimeter defenses, often functioning as firewalls, VPN concentrators, and intrusion prevention systems.
When these devices are compromised, attackers gain a strategic position within the network architecture that enables traffic interception, configuration modification, and potentially lateral movement into internal network segments.
The compromise of these devices effectively turns the organization’s primary security control into an attack platform.
Government Response And Emergency Measures
The severity and scope of the CVE-2025-20333 exploitation campaign prompted an unprecedented response from government cybersecurity agencies worldwide.
On September 25, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive ED 25-03, mandating immediate action from federal agencies to identify and mitigate potential compromises of Cisco devices.
This emergency directive represents one of the most urgent cybersecurity mandates issued by CISA, reflecting the critical nature of the threat.
The emergency directive requires federal agencies to complete several time-sensitive actions, including identifying all instances of Cisco ASA and Cisco Firepower devices in operation and collecting memory files for forensic analysis by CISA within 24 hours of the directive’s issuance.
Additionally, agencies must apply the latest Cisco-provided software updates by September 26, 2025, and continue to apply all subsequent updates within 48 hours of release.
For devices that cannot be immediately patched, agencies must disconnect them from the network to prevent further compromise. The international response to this campaign has been equally swift and coordinated.
The UK’s National Cyber Security Centre (NCSC) released detailed malware analysis reports documenting the technical capabilities of RayInitiator and LINE VIPER.
The Canadian Centre for Cyber Security and the Australian Signals Directorate’s Australian Cyber Security Centre also provided support during the investigation and issued their own advisories urging immediate action.
This coordinated international response underscores the global significance of the threat and the need for unified defensive measures.
Advanced Evasion And Anti-Forensic Techniques
One of the most concerning aspects of the CVE-2025-20333 exploitation campaign is the sophisticated anti-forensic and evasion techniques employed by the threat actors.
UAT4356 has demonstrated a deep understanding of Cisco ASA architecture and forensic analysis procedures, implementing multiple layers of defensive measures to prevent detection and analysis.
These techniques represent a significant evolution from traditional attack methodologies and pose substantial challenges for incident response teams.
The threat actors have been observed systematically disabling logging functions on compromised devices to prevent the creation of audit trails that could reveal their activities.
This logging suppression is not limited to general system logs but extends to specific syslog message types that would typically indicate unauthorized access or configuration changes.
The selective nature of this log suppression suggests detailed knowledge of Cisco ASA logging mechanisms and the specific indicators that security teams typically monitor for signs of compromise.
Perhaps most concerning is the threat actors’ practice of intentionally crashing devices to prevent forensic analysis.
When security teams attempt to collect diagnostic information through crash dumps or core dumps, the malware triggers system crashes that corrupt or prevent the collection of forensic evidence.
This technique effectively blinds investigators and makes it extremely difficult to assess the full scope of compromise or collect indicators of compromise for threat hunting activities.
The LINE VIPER malware includes specific anti-forensic capabilities designed to evade detection and analysis. The malware can intercept and modify CLI commands entered by administrators, potentially hiding malicious activities or preventing the execution of diagnostic commands.
Additionally, the malware can force delayed reboots during forensic collection attempts, ensuring that memory-resident components are cleared before investigators can analyze them.
Lessons Learned For Network Defense
The CVE-2025-20333 exploitation campaign provides several critical lessons for organizations seeking to strengthen their network defense postures.
First and foremost, the incident highlights the critical importance of maintaining current patch levels for internet-facing devices, particularly those serving as network perimeter defenses.
The exploitation of zero-day vulnerabilities demonstrates that even previously unknown threats can have devastating impacts when they target critical infrastructure components.
The campaign also underscores the evolving nature of state-sponsored threat actors and their increasing focus on perimeter network devices.
Traditional security models that rely heavily on perimeter defenses may be insufficient against adversaries capable of compromising the perimeter devices themselves.
Organizations must implement defense-in-depth strategies that assume perimeter compromise and include additional layers of security controls within their network architectures.
The advanced persistence mechanisms employed by RayInitiator demonstrate the limitations of traditional incident response approaches when dealing with firmware-level compromises.
Standard remediation procedures, such as device reboots, software reinstallation, or configuration resets, are insufficient to remove threats that have achieved bootloader-level persistence.
Organizations must develop new incident response procedures that account for firmware-level compromises and include complete device replacement or firmware reflashing as potential remediation steps.
The anti-forensic capabilities demonstrated by the threat actors highlight the need for enhanced monitoring and logging strategies.
Organizations cannot rely solely on device-generated logs for security monitoring, as sophisticated attackers can manipulate or suppress these logging mechanisms.
External monitoring solutions that capture network traffic, configuration changes, and behavioral anomalies may be necessary to detect advanced persistent threats that have compromised the primary security devices.
The exploitation of CVE-2025-20333 and the broader ArcaneDoor campaign represent a significant escalation in the capabilities and targeting of state-sponsored threat actors.
The focus on network perimeter devices reflects a strategic shift toward targeting the fundamental infrastructure components that organizations rely upon for security.
This targeting approach is particularly effective because successful compromise of perimeter devices provides attackers with both visibility into network traffic and the ability to modify security policies and configurations.
The campaign also demonstrates the increasing sophistication of state-sponsored threat actors in developing custom malware and exploitation techniques specifically tailored to target network infrastructure.
The development of RayInitiator and LINE VIPER required significant investment in research and development, suggesting that nation-state actors are dedicating substantial resources to developing capabilities against network infrastructure targets.
This level of investment indicates that infrastructure targeting will likely continue to be a priority for advanced threat actors.
The international coordination required to investigate and respond to this campaign highlights both the global nature of modern cyber threats and the importance of international cooperation in cybersecurity defense.
The collaboration between U.S., UK, Canadian, and Australian agencies in analyzing the threat and developing countermeasures demonstrates the value of information sharing and coordinated response efforts.
This level of cooperation may become increasingly necessary as threat actors continue to develop more sophisticated capabilities.
The timeline of the campaign, from initial compromise in May 2025 to public disclosure in September 2025, also raises important questions about the detection and disclosure of advanced persistent threats.
The extended duration of the campaign before detection suggests that traditional security monitoring approaches may be insufficient for detecting sophisticated state-sponsored activities.
Organizations may need to implement more advanced threat hunting capabilities and anomaly detection systems to identify subtle indicators of compromise that evade traditional security controls.
Diagram illustrating the stages of the cyberattack lifecycle from reconnaissance to monetization
The immediate remediation of CVE-2025-20333 and associated vulnerabilities requires a comprehensive approach that goes beyond simple patch application.
Cisco has released software updates addressing all three vulnerabilities discovered during the investigation, but organizations must also address the potential for persistent compromise that may survive standard patching procedures.
For devices suspected of compromise, Cisco recommends complete device replacement or factory reset followed by complete reconfiguration with new passwords, certificates, and cryptographic keys.
The remediation process must also account for the advanced persistence mechanisms employed by the threat actors.
Organizations with potentially compromised devices should assume that standard remediation procedures are insufficient and implement complete device replacement where possible.
For devices that cannot be immediately replaced, organizations should implement additional monitoring and network segmentation to limit the potential impact of ongoing compromise.
This may include isolating affected devices from critical network segments and implementing enhanced logging and monitoring for all communications to and from these devices.
Long-term prevention strategies must address both the technical vulnerabilities that enabled the initial compromise and the broader security architecture weaknesses that allowed the threat actors to maintain persistent access.
Organizations should prioritize the replacement of end-of-life network infrastructure devices with modern alternatives that include secure boot capabilities and other advanced security features.
The lack of secure boot capabilities in the targeted ASA 5500-X models was a critical factor that enabled the persistent compromise achieved by RayInitiator.
Organizations should also implement comprehensive network monitoring and anomaly detection capabilities that can identify suspicious activities even when device-generated logs are compromised or suppressed.
This includes network traffic analysis, configuration change monitoring, and behavioral analysis that can detect indicators of compromise independently of the potentially compromised devices themselves.
Advanced threat hunting capabilities may also be necessary to identify subtle indicators of persistent threats that evade traditional detection mechanisms.
The exploitation of CVE-2025-20333 in the ArcaneDoor campaign represents a watershed moment in cybersecurity, demonstrating the evolving capabilities of state-sponsored threat actors and the critical vulnerabilities present in network infrastructure devices.
The campaign’s sophisticated techniques, from zero-day exploitation to firmware-level persistence, highlight the need for fundamental changes in how organizations approach network security and incident response.
The international response to this threat, including emergency directives and coordinated intelligence sharing, underscores both the severity of the threat and the importance of collaborative defense efforts.
The lessons learned from this campaign extend far beyond the specific technical vulnerabilities that enabled the initial compromise.
Organizations must recognize that traditional perimeter-focused security models are insufficient against adversaries capable of compromising the perimeter devices themselves.
The advanced anti-forensic techniques and persistence mechanisms employed by the threat actors require new approaches to incident response and threat detection that account for the possibility of compromised security infrastructure.
Moving forward, the cybersecurity community must continue to adapt and evolve in response to increasingly sophisticated threat actors.
This includes developing new detection capabilities, implementing more robust security architectures, and maintaining the international cooperation necessary to defend against global cyber threats.
Microsoft is calling attention to a new phishing campaign primarily aimed at U.S.-based organizations that has likely utilized code generated using large language models (LLMs) to obfuscate payloads and evade security defenses.
“Appearing to be aided by a large language model (LLM), the activity obfuscated its behavior within an SVG file, leveraging business terminology and a synthetic structure
Cybersecurity researchers have discovered what has been described as the first-ever instance of a Model Context Protocol (MCP) server spotted in the wild, raising software supply chain risks.
According to Koi Security, a legitimate-looking developer managed to slip in rogue code within an npm package called “postmark-mcp” that copied an official Postmark Labs library of the same name. The
A critical vulnerability in the open source Formbricks experience management toolbox allows attackers to reset any user’s password without authorization. Published three days ago as advisory GHSA-7229-q9pv-j6p4 by maintainer mattinannt, the flaw stems from missing JWT signature verification in Formbricks versions before 4.0.1. If an attacker learns a valid user’s internal identifier, they can forge a token […]
Cybercriminals expand malvertising campaigns from Facebook to Google Ads and YouTube, hijacking accounts to distribute crypto-stealing malware targeting financial platform users worldwide. A sophisticated malvertising campaign that initially targeted Facebook users with fake TradingView Premium offers has significantly expanded its reach, now infiltrating Google Ads and YouTube to distribute advanced cryptocurrency-stealing malware. Bitdefender researchers, who […]
A critical security flaw discovered in Formbricks, an open-source experience management platform, demonstrates how missing JWT signature verification can lead to complete account takeovers.
The vulnerability tracked as CVE-2025-59934 affects all versions prior to 4.0.1 and stems from improper token validation that uses jwt.decode() instead of jwt.verify(), allowing attackers to bypass authentication controls entirely.
The vulnerability was disclosed by security researcher mattinannt and has been classified as critical due to its potential for unauthorized access to user accounts.
Formbricks has since released version 4.0.1 to address this security issue, but organizations running older versions remain at significant risk.
JWT Validation Vulnerability
The core vulnerability exists in the token validation routine located in /formbricks/apps/web/lib/jwt.ts.
The problematic code implements a verifyToken function that only decodes JWT tokens without performing essential security checks:
This implementation fails to verify critical JWT components, including digital signatures, token expiration, issuer validation, and audience verification.
The function uses jwt.decode() which simply parses the JWT structure without cryptographic validation, treating any properly formatted JWT as authentic regardless of its legitimacy.
Both the email verification token login path and password reset functionality rely on this flawed validator.
When processing password reset requests, the system extracts the user ID from the unverified JWT payload and directly queries the database to update the corresponding user’s password.
This bypass mechanism allows attackers who possess a victim’s user.id to craft malicious JWTs using the “alg”: “none” algorithm header, effectively creating unsigned tokens that pass validation.
The exploit requires minimal prerequisites – attackers need only to discover the target user’s unique identifier, which follows Formbricks’ standard format (e.g., cmfuc8pk60000vxfjud7bcl2w).
The attack leverages the “none” algorithm specification in JWT headers, which indicates no signature verification should be performed.
The proof-of-concept demonstrates token forgery using a Python script that constructs a malicious JWT:
The attack sequence follows these steps: the attacker crafts a JWT with header {“alg”: “none”, “typ”: “JWT”} and payload containing the victim’s user ID, constructs a password reset URL containing the forged token, and submits the form with a new password.
The server’s verifyToken function accepts the unsigned token, extracts the user ID, and proceeds with the password update without performing signature verification.
Risk Factors
Details
Affected Products
Formbricks < 4.0.1
Impact
Elevate privileges and take over a victim’s account
Exploit Prerequisites
Know the victim’s actual user.id.Craft a malicious JWT with an alg: “none” header. Submit the crafted JWT to the email verification token login path or the password reset server action. No privileges and no user interaction from the victim.
CVSS 3.1 Score
9.4 (Critical)
This attack vector demonstrates a fundamental authentication bypass vulnerability where the absence of cryptographic validation renders the entire JWT-based security model ineffective.
The vulnerability affects password reset functionality and email verification processes, potentially enabling widespread account compromise across Formbricks installations.
Organizations using affected Formbricks versions should immediately upgrade to version 4.0.1 or later and review their authentication logs for suspicious password reset activities.
The fix implements proper JWT signature verification using jwt.verify() instead of the vulnerable jwt.decode() method, ensuring that only cryptographically valid tokens can authenticate users and authorize sensitive operations like password resets.
A critical vulnerability in Windows heap management demonstrates how improper handling of record-size fields enables arbitrary memory read and write operations.
Suraj Malhotra shared a detailed exploitation technique leveraging the Low Fragmentation Heap (LFH) mechanism to achieve code execution on Windows systems.
Windows Heap Exploitation Vulnerability
The Windows NT Heap operates through FrontEnd and BackEnd allocators. The FrontEnd allocator manages small allocations under 16KB using LFH, while BackEnd handles larger requests.
LFH activation requires 18 subsequent allocations of similar sizes, creating predictable memory layouts exploitable by attackers. The vulnerability manifests in applications using private heaps created through HeapCreate() functions.
These environments offer reduced security mitigations compared to default process heaps accessed via GetProcessHeap(). The core vulnerability exists in record update functionality, where applications reuse previous record sizes when reading new data:
Exploitation begins by activating LFH through repeated allocations, then creating controlled memory layouts.
Attackers manipulate the target->size field, which remains unchanged during updates, enabling heap overflow conditions when new data exceeds allocated boundaries.
Suraj Malhotra demonstrates arbitrary read capabilities by filling UserBlocks through LFH activation, creating memory holes via record removal, and reusing chunks with crafted data structures.
Arbitrary read capabilities
This approach enables reading sensitive memory regions, including heap base addresses, ntdll base locations, and Process Environment Block (PEB) structures.
For arbitrary write primitives, attackers exploit Windows chunk structures containing FLink and BLink pointers in free chunks.
By forging fake chunks and manipulating freelist pointers, researchers achieved FILE structure exploitation involving crafted FILE objects with controlled _base, _file, _flag, and _bufsiz fields.
Arbitrary write primitives
The FILE structure exploitation requires specific flag combinations including _IOBUFFER_USER (0x0080) and _IOALLOCATED (0x2000) to bypass validation checks.
Setting _base to target memory addresses and _file to stdin enables writing arbitrary data to controlled locations.
Final exploitation involves constructing Return-Oriented Programming (ROP) chains utilizing Windows APIs, including ReadFile, VirtualProtect, and WriteFile, to load and execute shellcode.
The technique leverages Microsoft x64 calling convention, passing arguments through RCX, RDX, R8, and R9 registers using ROP gadgets in ntdll.
This vulnerability analysis, demonstrated through the “dadadb” challenge from Hitcon 2019, highlights the continued importance of proper heap management and size validation.
Organizations should implement robust input validation, utilize modern heap implementations, and employ comprehensive memory protection mechanisms to mitigate sophisticated exploitation techniques targeting Windows heap internals.
In recent weeks, a sophisticated phishing campaign has emerged, targeting organizations in Ukraine with malicious Scalable Vector Graphics (SVG) files designed to propagate the PureMiner cryptominer and a data-stealing payload dubbed Amatera Stealer.
Attackers masquerade as the Ukrainian police, sending emails that claim recipients have pending appeals.
When victims open the attached SVG, it triggers a fileless attack chain that ultimately compromises system confidentiality and hijacks computing resources.
This novel use of SVG attachments as initial infection vectors demonstrates attackers’ increasing creativity in bypassing traditional email filters and endpoint protections.
Upon opening the SVG attachment, an embedded HTML iframe element silently loads a second SVG from an attacker-controlled domain.
That SVG presents a spoofed Adobe Reader interface with a “Please wait, your document is loading…” message in Ukrainian, while simultaneously downloading a password-protected archive.
Victims are shown the archive password and urged to extract a Compiled HTML Help (CHM) file. Fortinet analysts noted the malware’s reliance on this deceptive user interaction to evade detection and lure victims into executing malicious content.
Inside the archive, a CHM file contains an HTML shortcut object that invokes an HTML Application (HTA) in hidden mode.
Malicious HTM file extracted from the CHM (Source – Fortinet)
The HTA script, obfuscated through string encoding and array shuffling, serves as a loader—establishing a persistent connection to the attacker’s server, exfiltrating system information via XorBase64-encoded HTTP POST requests, and awaiting further commands.
Infection Mechanism of PureMiner via an SVG-Based Fileless Chain
A snippet from the malicious HTM extracted from the CHM illustrates how the Click method spawns mshta.exe to fetch and execute the next-stage payload:-
The infection mechanism continues with two distinct fileless payload deliveries. In the first, a ZIP archive named ergosystem.zip contains a legitimate .NET tool that sideloads a malicious DLL using process hollowing.
Attack chain (Source – Fortinet)
The injected payload, identified as PureMiner, decrypts its configuration from a Protobuf-serialized blob, gathers hardware details using AMD and NVIDIA libraries, and initiates CPU- or GPU-based mining modules.
In the second archive, smtpB.zip, a Python interpreter and the PythonMemoryModule are leveraged to load Amatera Stealer directly into memory.
This stealer requests an RC4-encrypted configuration via HTTP GET, decodes it in memory, and parses directives to harvest credentials, browser artifacts, and cryptocurrency wallet files.
From initial SVG deployment to dual payload execution, this campaign exemplifies a seamless progression of fileless tactics and legitimate application misuse.
By weaponizing SVG files as HTML wrappers and chaining through CHM and HTA stages, attackers evade signature-based defenses and exploit users’ trust in common document formats.
Cybersecurity teams should inspect SVG attachments for embedded iframes and monitor mshta.exe invocations, while ensuring that CHM and HTA executions are restricted.
Proper URL filtering and archive password prompts coupled with endpoint behavioral analytics can disrupt this infection mechanism before it compromises data or hijacks system resources.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.