Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Russian Phishing Campaign Delivers Phantom Stealer Via ISO Files
News

Russian Phishing Campaign Delivers Phantom Stealer Via ISO Files

Team-CWDBy Team-CWDDecember 15, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new phishing campaign delivering the Phantom information-stealing malware through a multi-stage attachment chain has been identified by cybersecurity researchers.

The activity, observed by Seqrite Labs, reportedly originates from Russia and relies on a fake payment confirmation email to entice recipients to open a malicious archive.

The campaign is tracked as Operation MoneyMount-ISO and marks a continued shift toward ISO-based initial access techniques designed to bypass email security controls.

Instead of a direct executable, the attackers use a ZIP archive containing an ISO file that mounts as a virtual drive when opened. Inside is a disguised executable that ultimately deploys Phantom Stealer in memory.

Seqrite Labs researchers observed the operation actively targeting Russian-speaking organizations, with a clear focus on roles that routinely handle financial documents. The lure imitates routine business correspondence to increase the likelihood of interaction in busy finance environments.

How the Attack Works

The observed phishing email was written in formal Russian business language and carried the subject line “Подтверждение банковского перевода” or “Confirmation of Bank Transfer.”

It urged the recipient to review an attached document for transaction details. Although the message referenced a currency broker, the sender domains were unrelated.

Once the ZIP archive of roughly 1 MB was opened, the embedded ISO file auto-mounted and displayed an executable masquerading as a payment confirmation.

Executing this file triggered a staged payload chain. An initial loader decrypted a malicious DLL, which then injected Phantom Stealer into the system while employing extensive anti-analysis checks to evade sandboxes and virtual machines.

Read more on phishing campaigns: 752,000 Browser Phishing Attacks Mark 140% Increase YoY

The final payload was capable of harvesting a wide range of sensitive information. It extracted browser-stored passwords, cookies and credit-card data, stole cryptocurrency wallets from browsers and desktop applications, logged keystrokes and clipboard contents, and collected Discord authentication tokens.

Stolen data was packaged into archives and exfiltrated through multiple channels, including Telegram bots, Discord webhooks and FTP servers.

Targeted sectors included:

  • Finance, accounting, treasury and payments teams in Russia

  • Procurement, legal and HR or payroll functions

  • Executive assistants and small or medium-sized enterprises using Russian-language workflows

“The operation reflects the increasing sophistication of commodity stealers and the strategic shift toward ISO-based initial access to evade perimeter controls,” Seqrite Labs explained.

“Continuous filtering of containerized attachments, memory-behaviour monitoring and hardening of finance-facing mail workflows remain essential mitigation measures.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleCritical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
Next Article Researcher Uncovers 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What’s at stake if your employees post too much online

December 1, 2025

How the always-on generation can level up their cybersecurity game

September 11, 2025

How cybercriminals are targeting content creators

November 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.