A Flyby on the CFO's Inbox: Spear-Phishing Campaign Targeting Financial Executives with NetBird Deployment
Source report →The spear-phishing campaign detailed by Trellix targets CFOs and financial executives across various regions. Attackers impersonate Rothschild & Co recruiters, sending emails that entice recipients with a "leadership opportunity." These emails contain links to Firebase-hosted pages featuring custom CAPTCHA challenges. Upon completion, victims are redirected to download a ZIP file containing a VBS script. Executing this script leads to the silent installation of legitimate tools like NetBird and OpenSSH, establishment of a hidden local admin account, and activation of Remote Desktop Protocol (RDP), granting attackers persistent remote access. Notably, NetBird, an open-source WireGuard-based remote access tool, was misused in this campaign without exploiting any inherent vulnerabilities. While some infrastructure overlaps with known nation-state operations, Trellix has not attributed this activity to any specific threat group. Organizations should monitor for similar phishing tactics, especially those leveraging legitimate tools for unauthorized access, and educate stakeholders on recognizing such sophisticated social engineering attempts
IOCs (11)
Scan your environment for IOCs →URL 7
https://googl-6c11f.firebaseapp.com/job/file-846873865383.htmlhttps://googl-6c11f.web.app/job/9867648797586_Scan_15052025-736574.htmlhttp://192.3.95.152/cloudshare/atr/pull.pdfhttp://192.3.95.152/cloudshare/atr/trmhttp://onlineview-5e3cf.web.app/sharepoint/commande/rid=65476386546.htmlhttps://web-16fe.apphttps://cloud-ed980.firebaseapp.comMD5 FILE HASH 3
53192b6ba65a6abd44f167b3a8d0e52d4cd73946b68b2153dbff7dee004012c3B91162a019934b9cb3c084770ac03efeIP ADDRESS 1
192.3.95.152Detections
- Monitor for installation or execution of remote access tools not approved in your environment
- Alert on unauthorized financial transactions or changes to payment configurations
- Detect Python scripts executing from non-standard locations or with network activity
- Monitor for C2 communication over HTTP/HTTPS to uncommon or newly registered domains
- Detect logins from valid accounts originating from unusual locations, devices, or at abnormal times