Fraudulent Recruiter Emails Target CFOs Worldwide Using Legitimate NetBird Tool

Published:

spot_img

New Spear-Phishing Campaign Targets Financial Executives

Overview of the Threat

Recent findings from cybersecurity experts have revealed a sophisticated spear-phishing campaign targeting Chief Financial Officers (CFOs) and other senior financial professionals. The attackers are using a legitimate remote access tool called Netbird to infiltrate organizations in sectors such as banking, energy, insurance, and investment across a wide geographical area, including Europe, Africa, Canada, the Middle East, and South Asia.

The Mechanics of the Attack

The analysis by Trellix researcher Srini Seethapathy highlights a multi-stage approach in this phishing operation. Initially detected in mid-May 2025, this attack is particularly concerning as it has not been linked to known threat actors. The entry point for these attacks typically arrives in the form of a phishing email that pretends to be from a recruiter at Rothschild & Co. This email lures recipients with the promise of a "strategic opportunity" with the company.

Upon opening a seemingly innocuous PDF attachment, victims are instead redirected to a phishing link hosted on Firebase. Notably, the actual URL is encrypted and only becomes visible after the user passes a CAPTCHA verification. This technique aims to evade existing security measures that filter out phishing sites protected by CAPTCHA technologies like Google reCAPTCHA or Cloudflare’s Turnstile.

The Payload and Its Installation

Once the CAPTCHA is solved, the victim inadvertently downloads a ZIP archive containing a Visual Basic Script (VBScript). This initial script is designed to retrieve a secondary VBScript from an external server, which is then executed using "wscript.exe." The subsequent script downloads a payload that includes two critical components: NetBird and OpenSSH.

The final stage of the process involves installing these tools on the infected computer. This not only creates a hidden local account but also enables remote desktop access and ensures the persistent launch of NetBird through scheduled tasks, effectively allowing continued access even if the system is rebooted. To cover their tracks, the malware removes any desktop shortcuts associated with NetBird, making it harder for victims to detect the compromise.

Broader Context of Phishing Campaigns

The tactics demonstrated in this campaign underline a disturbing trend where cybercriminals increasingly rely on legitimate software to maintain access to compromised systems. Other tools noted to assist in these attacks include ConnectWise ScreenConnect, Atera, and LogMeIn Resolve, all of which can provide remote access while avoiding detection.

In conjunction with this specific campaign, several other email-based social engineering attacks have been reported. These range from utilizing a trusted domain of a Japanese internet service provider to mimic invoices for credential theft, to exploiting popular platforms like Notion to host phishing pages.

The Role of Phishing-as-a-Service

The rise of Phishing-as-a-Service (PhaaS) platforms has further complicated the landscape. These services make it easier for even less technically skilled criminals to execute sophisticated phishing campaigns. A Chinese-language kit known as Haozi has notably emerged, facilitating substantial criminal transactions by requiring minimal configuration from users.

Unlike traditional phishing kits that necessitate significant technical expertise, Haozi offers a streamlined interface, allowing attackers to set up phishing campaigns effortlessly. Furthermore, it includes support channels for troubleshooting, appealing to those new to cybercrime.

Evolving Techniques in Cybersecurity Threats

As security teams bolster their defenses against intrusion attempts, attackers are shifting their focus toward social engineering and phishing tactics. These methods, which hinge on manipulating human behavior rather than breaching fortified systems, underscore the necessity for increased user awareness and training.

Microsoft has recently noted that various new techniques, including device code phishing and OAuth consent manipulation, are being deployed alongside traditional phishing methods. The evolving landscape demands constant vigilance and adaptation from both individuals and organizations to minimize vulnerabilities.

Through continued education and awareness initiatives, businesses can better defend themselves against these increasingly clever and targeted cyber threats.

spot_img

Related articles

Recent articles

Billions of Stolen Cookies Still Available Online

Purchases made through links in our articles may result in a commission for Future and its partners. Recent studies by NordVPN uncover 94 billion stolen...

SafePay and DevMan: Rising Ransomware Threats to Watch

The rise of SafePay in the ransomware arena has been rapid and alarming. Emerging in the fall of 2024, the group dominated...

Emirates and Air China Strengthen Partnership with 49 Weekly Flights to Mainland China

Strengthening Ties: Emirates and Air China Enhance Partnership New Initiatives for Frequent Flyers Emirates and Air China are set to elevate their longstanding partnership, introducing improved...

Cartier Falls Victim to Latest Wave of Cyber Attacks on Fashion Retailers

Cartier Faces Cyber Attack: Customer Data Exposed Luxury brand Cartier has announced it has fallen victim to a cyber attack, leading to the unauthorized exposure...