Hackers Mimic as Social Security to Spread ConnectWise RAT

The Social Security Administration-spoofing campaign distributing ConnectWise RAT has evolved, where attackers employ advanced email spoofing, evasion tactics, and credential phishing to compromise victims. 

The campaign, which intensified before the 2024 US election, continues to pose a significant threat, exploiting the political climate for malicious purposes. The email contains a deceptive hyperlink, often disguised as a “View Statement” button, that downloads a ConnectWise Remote Access Trojan (RAT) installer. 

The attack utilizes various infrastructure methods, including ConnectWise servers, dynamic DNS, and threat actor-controlled domains, to establish command-and-control channels.

A sample embedded link to a ConnectWise RAT installer when accessing the URL for the first time.

Researchers detected a Social Security Administration phishing campaign in September 2024. Initially sporadic, it escalated significantly in mid-November, peaking a week after the US election, suggesting potential exploitation of heightened public interest or anxiety surrounding the election.

Early email campaigns employed rudimentary and unsophisticated techniques. However, continuous refinement has led to the development of increasingly deceptive tactics, enhancing their ability to evade detection and manipulate recipients.

Threat actors leverage brand spoofing techniques by employing legitimate-looking brand assets, such as the Social Security Administration logo, within emails, which often contain mismatched links are designed to mimic official government websites, thereby deceiving recipients into clicking on malicious links and potentially compromising their systems.

When accessing the link on subsequent attempts, the site redirects to an official Social Security site.

According to Cofense, it makes use of browser cookies in order to keep track of previous visits, which is why the embedded link payload initially redirects to a ConnectWise RAT payload. 

Subsequent attempts by the same user lead to a legitimate Social Security Administration website, potentially evading detection and increasing the likelihood of successful exploitation.

 A sample embedded link to a ConnectWise RAT installer

Credential phishing forms maliciously solicit sensitive personal information such as full names, contact details, social security numbers, dates of birth, financial account details, and security codes from unsuspecting individuals via deceptive means, aiming to compromise their online identities and financial security.

Threat actors request sensitive personal information like the mother’s maiden name and phone carrier PINs to facilitate account takeovers, which are often used as security questions or for MFA bypass, enabling attackers to gain unauthorized access to online accounts and potentially commit identity fraud.

Also Read:

Kaaviya
Kaaviyahttps://cyberpress.org/
Kaaviya is a Security Editor and fellow reporter with Cyber Press. She is covering various cyber security incidents happening in the Cyber Space.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here