<img src="https://ws.zoominfo.com/pixel/csEHmvjEA1iScHExXGZE" width="1" height="1" style="display: none;">

The Week in Review from Stamus Labs

Welcome to the weekly threat detection update report from Stamus Networks. Each week, you will receive this email with a summary of the updates.

 

Current Stamus Threat Intelligence (STI) release version: 1462

 

This week, in addition to daily ruleset and IOC updates, we provided Stamus Security Platform customers with the following improved defense(s):

  • New threat detection(s) added [1]: 5 (TA2727, Filch Stealer, Prince Ransomware, Nimbus Manticore APT, Potentially unwanted software)
  • Major changes to detections(s) [2]: 179
  • Updated threat detection(s) [3]: 203

 

Note: a "method" as referenced below, is a discrete detection vector for a given threat.

 

New Threat(s) Detected

The following detections were added to your Clear NDR this past week:

 

TA2727 (APT)

Cybercriminal group TA2727 collaborates with others for financial gain, purchasing online traffic to disseminate malware. Proofpoint identified them in an attack campaign delivering malicious payloads via compromised websites in North America.

  • Total number of detection methods: 12
  • Kill chain phase(s): command and control

 

Filch Stealer (Data Theft)

Rapid7 has detected a rise in incidents involving domain generation algorithms, leading to the deployment of a sophisticated infostealer known as Filch Stealer that targets crypto-related applications and wallets.

  • Total number of detection methods: 4
  • Kill chain phase(s): command and control
  • MITRE ATT&CK: T1005

 

Prince Ransomware (Ransomware)

Prince ransomware is written in Go and uses ChaCha20 and ECIES cryptography to encrypt files securely, making them unrecoverable by traditional tools. Decryption can only be done with a specific decryptor.

  • Total number of detection methods: 3
  • Kill chain phase(s): installation
  • MITRE ATT&CK: T1486

 

Nimbus Manticore APT (APT)

Nimbus Manticore is a sophisticated Iran-linked APT group targeting aerospace and defense organizations with customized implants like Minibike/SugResin. Recent variants show enhanced capabilities and evasion techniques.

Nimbus Manticore APT - Malpedia |
  • Total number of detection methods: 5
  • Kill chain phase(s): command and control, actions on objectives
  • MITRE ATT&CK: T1005, T1041

 

Major Detection Changes

The following detections were updated this past week with changes to kill chain phase(s) or MITRE ATT&CK tactic(s)/technique(s):

 

ClearFake (Exploit Kit)

Malicious fake updates campaign infecting hundreds of websites with ClearFake malware, starting around July 19th, 2023. No tracking of visits by IP or cookies, leading to easier detection by analysts and site owners.

  • Added kill chain phase(s): exploitation
  • Previously supported kill chain phase(s): command and control, exploitation
  • MITRE ATT&CK added: T1105
  • Previously existing MITRE ATT&CK: T1071, T1189
  • Methods added: 1

 

Fake Browser (Trojan)

Attackers infect enterprise networks with malware by promoting fake browser updates on hacked websites, leading to the installation of banking trojans and later ransomware encryption on compromised networks.

  • Added kill chain phase(s): exploitation
  • Previously supported kill chain phase(s): delivery, exploitation, command and control
  • MITRE ATT&CK added: T1189
  • Previously existing MITRE ATT&CK: T1071, T1189
  • Methods added: 3

 

FrigidBackdoor (Data Theft)

Proofpoint researchers identified two new threat actors, TA2726 and TA2727, who are traffic sellers and malware distributors involved in various web-based attacks, including delivering a new Mac information stealer called FrigidStealer.

  • Added kill chain phase(s): command and control
  • Previously supported kill chain phase(s): delivery, command and control, actions on objectives
  • MITRE ATT&CK added: T1071
  • Previously existing MITRE ATT&CK: T1189, T1041, T1071
  • Methods added: 1

 

Generic Loader (Loader)

Loaders are evolving remote access Trojans, offering user-friendly interfaces, self-healing capabilities, and a platform for botmasters to sell bots. They are typically lightweight to evade security measures.

  • Added kill chain phase(s): delivery
  • Previously supported kill chain phase(s): command and control, delivery, actions on objectives
  • MITRE ATT&CK added: T1496, T1105
  • Previously existing MITRE ATT&CK: T1071, T1566
  • Methods added: 2

 

LandUpdate808 (Trojan)

Fake update variants like SocGholish, Clear Fake, Smart Ape, and ClickFix are being tracked by a collaboration introducing the LandUpdate808 Fake Update Variant.

  • Added kill chain phase(s): command and control
  • Previously supported kill chain phase(s): delivery, command and control, actions on objectives
  • MITRE ATT&CK added: T1189
  • Previously existing MITRE ATT&CK: T1189, T1105, T1071
  • Methods added: 8

 

Lumma (Data Theft)

Lumma is a C-based information stealer sold on Russian underground forums and Telegram by LummaC since August 2022. It targets cryptocurrency wallets and has file grabber capabilities.

  • Added kill chain phase(s): command and control, actions on objectives
  • Previously supported kill chain phase(s): actions on objectives, command and control, installation, delivery
  • MITRE ATT&CK added: T1071
  • Previously existing MITRE ATT&CK: T1005, T1071, T1573, T1105
  • Methods added: 3

 

Molerats (APT)

The politically-motivated threat group Molerats has been active since 2012 targeting victims in the Middle East, Europe, and the US according to reports by MITRE.

  • Added kill chain phase(s): command and control
  • Previously supported kill chain phase(s): command and control, delivery
  • MITRE ATT&CK added: T1041
  • Previously existing MITRE ATT&CK: T1041, T1590, T1071, T1587, T1102
  • Methods added: 7

 

Mustang Panda (APT)

Mustang Panda is a China-based cyber threat actor observed since 2017, possibly operating since 2014. It targets government and non-government organizations in multiple countries like the U.S., Germany, and Myanmar.

  • Added kill chain phase(s): command and control
  • Previously supported kill chain phase(s): command and control, delivery
  • Methods added: 33

 

NetSupport RAT (RAT)

Remote Access Trojans allow covert surveillance and unauthorized access to victim PCs, collecting keystrokes, passwords, screenshots, and more. They differ from keyloggers by providing remote access capabilities to attackers.

  • Added kill chain phase(s): command and control
  • Previously supported kill chain phase(s): actions on objectives, command and control, exploitation, installation
  • MITRE ATT&CK added: T1105
  • Previously existing MITRE ATT&CK: T1071, T1105
  • Methods added: 1

 

Oyster (Backdoor)

Oyster is a new loader and backdoor first seen in September 2023. It comprises two executables: Oyster Installer and Oyster Main, used by former WIZARD SPIDER affiliates.

  • Added kill chain phase(s): command and control
  • Previously supported kill chain phase(s): command and control
  • MITRE ATT&CK added: T1041, T1071
  • Previously existing MITRE ATT&CK: T1071, T1189, T1041
  • Methods added: 32

 

PureCrypter (Loader)

Introduction of PureCrypter loader, active this year promoting over 10 families, using hundreds of C2s. Detailed sample analysis by zscaler focuses on communication activities and operation process of PureCrypter.

  • Added kill chain phase(s): command and control
  • Previously supported kill chain phase(s): delivery, command and control
  • MITRE ATT&CK added: T1095, T1071
  • Methods added: 3

 

RAT Generic (RAT)

Remote Access Trojans allow covert surveillance and unauthorized access to victim PCs, collecting data like keystrokes and screenshots. They differ from keyloggers by enabling remote access for attackers.

  • Added kill chain phase(s): command and control
  • Previously supported kill chain phase(s): installation, command and control, actions on objectives, delivery
  • MITRE ATT&CK added: T1573
  • Previously existing MITRE ATT&CK: T1071, T1041, T1573
  • Methods added: 3

 

ReverseLoader (Loader)

Loaders are basic remote access Trojans allowing attackers to control compromised computers or bots. They are traditionally lightweight to avoid detection, but can evolve with added features for cybercriminals.

  • Added kill chain phase(s): installation
  • Previously supported kill chain phase(s): delivery, command and control
  • MITRE ATT&CK added: T1105
  • Previously existing MITRE ATT&CK: T1105
  • Methods added: 2

 

SideWinder (APT)

Actor targeting Pakistan military, linked to Indian company with unique malware implementations since 2012. Leverages CVE-2017-11882 exploits, deploys Powershell payload in final stages. Low confidence in attribution.

  • Added kill chain phase(s): command and control
  • Previously supported kill chain phase(s): command and control, delivery, actions on objectives, exploitation
  • Methods added: 2

 

TA2726 (APT)

TA2726 serves as a TDS for TA2727 and TA569, distributing SocGholish malware that pretends to be a browser update on compromised sites.

  • Added kill chain phase(s): command and control
  • Previously supported kill chain phase(s): command and control
  • Methods added: 6

 

TA4903 (APT)

Advanced persistent threats (APTs) are stealthy threat actors, often nation states or state-sponsored groups, who gain unauthorized access to networks for political or economic motivations, utilizing various tactics to remain undetected.

  • Added kill chain phase(s): delivery
  • Previously supported kill chain phase(s): delivery
  • Methods added: 3

 

Unknown APT (APT)

Sophisticated adversary with expertise and resources uses multiple attack vectors to establish presence in organizations' IT infrastructure, exfiltrate information, undermine missions, and persistently adapt to defenders.

  • Added kill chain phase(s): delivery, command and control
  • Previously supported kill chain phase(s): command and control, delivery
  • MITRE ATT&CK added: T1071
  • Previously existing MITRE ATT&CK: T1041, T1071, T1001, T1566, T1102
  • Methods added: 45

 

XWorm (RAT)

Cyble research labs found a malware developer advertising a powerful Windows RAT on the dark web during a threat-hunting exercise.

  • Added kill chain phase(s): command and control
  • Previously supported kill chain phase(s): command and control, delivery
  • MITRE ATT&CK added: T1573
  • Previously existing MITRE ATT&CK: T1071, T1573
  • Methods added: 24

 

Other Threat Detection Update(s)

The following threat detection(s) were improved this past week with new or updated threat methods.

 

Name of threat New coverage Total coverage Last updated
  New Detection methods Kill chain phases Protocols involved Detection methods Kill chain phases Protocols involved  
ClearFake 1 exploitation http 226 command and control, exploitation dns, http, tls 2025-09-30
Fake Browser 3 exploitation dns, tls, http 1742 command and control, delivery, exploitation dns, http, tls 2025-09-30
Filch Stealer 4 command and control tcp-pkt, dns, tls, http 4 command and control tcp-pkt, dns, tls, http 2025-09-30
FrigidBackdoor 1 command and control http 7 actions on objectives, command and control, delivery http 2025-09-30
Generic Loader 2 delivery http 145 actions on objectives, command and control, delivery dns, http, tcp, tcp-pkt, tls 2025-09-30
LandUpdate808 8 command and control dns, tls, http 595 actions on objectives, command and control, delivery dns, http, tls 2025-10-04
Lumma 3 command and control, actions on objectives dns, tls, http 6883 actions on objectives, command and control, delivery, installation dns, http, tls 2025-09-30
Molerats 7 command and control http, dns, tls 331 command and control, delivery dns, http, tcp, tls 2025-10-01
Mustang Panda 33 command and control dns, tls, http 222 command and control, delivery dns, http, tcp, tls 2025-10-01
NetSupport RAT 1 command and control http 157 actions on objectives, command and control, exploitation, installation dns, http, tls 2025-10-01
Nimbus Manticore APT 5 command and control, actions on objectives http, dns, tls 5 command and control, actions on objectives http, dns, tls 2025-09-30
Oyster 32 command and control dns, tls, http 108 command and control dns, http, tls 2025-10-04
Prince Ransomware 3 installation http 3 installation http 2025-09-30
PureCrypter 3 command and control tcp 12 command and control, delivery http, tcp 2025-10-02
RAT Generic 3 command and control tcp 309 actions on objectives, command and control, delivery, installation dns, http, tcp, tcp-pkt, tls, udp 2025-10-04
ReverseLoader 2 installation http 14 command and control, delivery, installation dns, http, tls 2025-09-30
SideWinder 2 command and control dns, http 526 actions on objectives, command and control, delivery, exploitation dns, http, tls 2025-09-30
TA2726 6 command and control dns, tls, http 159 command and control dns, http, tls 2025-10-03
TA2727 12 command and control dns, tls, http 12 command and control dns, tls, http 2025-09-30
TA4903 3 delivery dns, tls, http 2426 delivery dns, http, tls 2025-10-01
Unknown APT 45 delivery, command and control dns, tls, http 1217 command and control, delivery dns, http, tcp, tls 2025-09-30
XWorm 24 command and control tcp-pkt 4053 command and control, delivery dns, http, tcp, tcp-pkt, tls 2025-10-04

 

Additional Resources

Technical support
Join the conversation on Discord
Follow us Twitter
Follow us on LinkedIn
Subscribe to our YouTube channel
Stamus Networks website

Schedule a Demo of Clear NDR

Request a Demo