TIGR Threat Watch

Threat Watch Feed

🚩 – IOCs Added

The red flag indicates that Indicators of Compromise (IOCs) have been added to SRA’s Threat Feed used by CyberSOC clients. Articles may not be flagged if IOCs are not available at the time or are not applicable to the article.

Global Coalition Disrupts Tycoon2FA, a Massive Phishing-as-a-Service Platform Utilizing AiTM MFA Bypass

Microsoft, Europol, and industry partners announced a coordinated action to disrupt the service responsible for tens of millions of fraudulent emails reaching over 500,000 organizations each month worldwide. In addition, Microsoft published new analysis on the Tycoon2FA phishing-as-a-service (PhaaS) platform, which emerged in August 2023 and quickly became one of the most widely used adversary-in-the-middle (AiTM) phishing kits. The service was operated by a threat actor tracked as Storm-1747 and supported phishing campaigns that delivered tens of millions of messages monthly to more than 500,000 organizations across multiple sectors including government, healthcare, finance, education, and non-profits. The platform allowed attackers to impersonate authentication portals for services such as Microsoft 365, Outlook, SharePoint, OneDrive, and Gmail while providing operators with a centralized dashboard for configuring campaigns, managing infrastructure, and tracking compromised accounts. Tycoon2FA worked by acting as a proxy between the victim and the legitimate authentication service. When a target entered credentials on the phishing page, the kit relayed those credentials to the legitimate service in real time, triggered the MFA challenge, and captured the resulting authenticated session cookie once MFA was completed. This allowed attackers to access accounts without needing the password again and sometimes even after password resets if active sessions were not revoked. To evade detection, the platform used techniques such as dynamic CAPTCHA challenges, heavy code obfuscation, browser fingerprinting, geolocation filtering, redirect chains through legitimate services, and rapid domain rotation with short-lived phishing subdomains often lasting only 24–72 hours.

Impact: Tycoon2FA lowered the barrier to large-scale MFA bypass attacks by providing ready-to-use infrastructure and tooling for phishing operators. By capturing session cookies rather than just credentials, attackers could maintain authenticated access to targeted accounts and perform follow-on actions such as mailbox rule manipulation, data theft, additional phishing campaigns, or financial fraud. Because these campaigns mimic legitimate authentication flows and rely on real MFA interactions, organizations that rely solely on traditional MFA methods such as SMS or one-time passcodes remain vulnerable to account compromise through AiTM phishing.

Recommendation: Organizations should prioritize phishing-resistant authentication methods such as FIDO2 security keys, passkeys, Windows Hello for Business, or other passwordless MFA technologies to reduce the risk of session-cookie interception attacks. Enforce strict governance of authentication and identity systems by revoking active sessions when credentials are reset, auditing MFA device registrations, removing unauthorized inbox rules, and monitoring for suspicious sign-ins or token reuse. Email security controls such as link rewriting, time-of-click URL analysis, and automated phishing remediation should be enabled to reduce user exposure to malicious links and attachments. In addition, organizations should monitor for abnormal authentication behavior, suspicious redirect chains, and connections to known AiTM infrastructure while training users to recognize phishing attempts that impersonate common business workflows such as document sharing or account notifications.

🚩 Palo Alto Unit 42 Discovers Years of Undetected Cyberespionage by Chinese Threat Group CL-UNK-1068

Unit 42 disclosed an ongoing activity cluster it tracks as CL-UNK-1068, which it has observed since at least 2020 targeting organizations across South, Southeast, and East Asia. The activity has affected high-value sectors including aviation, energy, government, law enforcement, pharmaceutical, technology, and telecommunications. Unit 42 assesses with high confidence that the operators are a Chinese threat actor and with moderate-to-high confidence that the primary objective is cyberespionage, though it said cybercriminal motivation cannot be fully ruled out. The activity relies on a broad toolset spanning Windows and Linux environments. Unit 42 observed the attackers using web shells such as GodZilla and a variation of AntSword for initial access, then stealing configuration files and other sensitive data from compromised servers. The group used legitimate Python executables for DLL side-loading, custom and community-sourced tools such as ScanPortPlus, FRP, Xnote, Mimikatz, LsaRecorder, DumpIt, Volatility, and SQL Server Management Studio Password Export Tool, along with multiple batch scripts for reconnaissance, credential theft, privilege escalation, log clearing, and file archiving. Unit 42 also described use of techniques such as Base64-encoding archived data with certutil and printing it through the web shell for exfiltration, rather than directly uploading files. This is confirmed operational activity observed over multiple campaigns, not proof-of-concept behavior.

Impact: The reported activity presents a significant risk to organizations in targeted sectors because it combines stealthy persistence, credential theft, reconnaissance, tunneling, and cross-platform tooling that can support long-term access and sensitive data theft. Unit 42 specifically observed theft of website configuration files, SQL-related data, browser artifacts, sensitive spreadsheet files, and database backups. The combination of open-source tools, custom malware, DLL side-loading, and living-off-the-land techniques makes the activity harder to distinguish from legitimate administrative behavior and may allow the threat actor to maintain covert access for extended periods.

Recommendation: Organizations should prioritize detection of behavioral patterns highlighted by Unit 42 rather than relying only on static indicators. Investigate misuse of legitimate Python binaries for DLL side-loading, deployment of unauthorized tunneling tools such as FRP, execution of custom reconnaissance batch scripts such as hp.bat, hpp.bat, rar.bat, or rr.bat, and suspicious use of WinRAR, certutil, type, DumpIt, Volatility, Mimikatz, and SQL credential extraction utilities on servers. Review both Windows and Linux environments for evidence of credential theft, tunneling, archived data staged for exfiltration, unexpected web shell activity, and unauthorized access to web server or SQL configuration files.

Microsoft Disclosed a ClickFix Campaign that Uses Windows Terminal to Launch Lumma Stealer and Evade Detections Focused on Run Dialog Abuse.

Microsoft Threat Intelligence discloseda widespread ClickFix social engineering campaign observed in February 2026 that uses Windows Terminal as the primary execution mechanism to deploy Lumma Stealer. Instead of the more familiar Win + R workflow, the campaign instructs targets to use the Windows + X → I shortcut to launch Windows Terminal directly. Microsoft said the lures were delivered through fake CAPTCHA pages, troubleshooting prompts, and similar verification-style themes designed to convince users to paste attacker-supplied commands. The attack begins when a user pastes a hex-encoded, XOR-compressed command into Windows Terminal. In one path, the command spawns additional Terminal and PowerShell instances, decodes the script, downloads a ZIP payload and a legitimate but renamed 7-Zip binary, and then extracts additional components. Microsoft said the follow-on activity includes retrieving more payloads, creating scheduled-task persistence, configuring Microsoft Defender exclusions, collecting machine and network data, and injecting Lumma Stealer into chrome.exe and msedge.exe using QueueUserAPC(). In a second path, the command downloads a randomly named batch script into AppData\Local, writes a VBScript into %TEMP%, re-executes through cmd.exe and MSBuild.exe, and connects to crypto blockchain RPC endpoints, which Microsoft said indicates etherhiding. Exploitation is confirmed by Microsoft’s observed campaign activity.

Impact: This campaign increases risk because it shifts ClickFix execution into Windows Terminal, which can appear more legitimate to users and may bypass detections built around Run dialog abuse. The resulting Lumma Stealer activity targets browser credential stores such as Web Data and Login Data, enabling theft of stored credentials and other browser artifacts. The observed follow-on behaviors also show potential for broader host compromise through persistence, defense evasion, system reconnaissance, and LOLBin abuse.

Recommendation: Hunt for suspicious wt.exe, PowerShell, cmd.exe, VBScript, MSBuild.exe, and renamed 7-Zip execution chains, especially where they originate from user-driven copy-and-paste activity or lead to files dropped in AppData\Local or %TEMP%. Review systems for unexpected scheduled tasks, unauthorized Microsoft Defender exclusions, outbound connections associated with crypto blockchain RPC endpoints, and signs of QueueUserAPC()-based injection into chrome.exe or msedge.exe.

Cognizant TriZetto Healthcare Portal Breach Exposes Health Data of 3.4 Million Patients

A report from March 6, 2026 states TriZetto Provider Solutions, a healthcare IT company operating under Cognizant since 2014, suffered a data breach affecting over 3.4 million individuals. The company detected suspicious activity on a web portal on October 2, 2025, but the investigation revealed unauthorized access had begun nearly a year earlier, on November 19, 2024. The breach targeted insurance eligibility verification transaction records used by health insurers and providers. Exposed data varies by individual and may include full names, physical addresses, dates of birth, Social Security numbers, health insurance member numbers, Medicare beneficiary identifiers, provider names, health insurer names, and broader demographic and health information. Financial data such as payment card or bank account details were not compromised. Affected providers were notified December 9, 2025, with consumer notifications beginning in early February 2026. No ransomware group has claimed responsibility, and no data has surfaced on underground forums.

Impact: The exposure of Social Security numbers, Medicare identifiers, and health insurance details for 3.4 million individuals could lead to identity theft, insurance fraud, and medical identity fraud. Affected patients may face unauthorized use of their insurance benefits. The nearly 10-month delay between initial unauthorized access and detection raises concerns about the volume of data potentially harvested. The extended notification gap may also expose TriZetto to regulatory scrutiny under HIPAA.

Recommendation: Individuals who receive notification letters should enroll promptly in the free 12-month Kroll credit monitoring and identity protection services offered by TriZetto. Place a credit freeze with all three major credit bureaus (Equifax, Experian, TransUnion) to prevent new accounts from being opened fraudulently. Monitor Explanation of Benefits statements from your insurer for unfamiliar claims or treatments. Be alert to phishing attempts that may exploit the exposed personal and health data. Healthcare organizations using TriZetto services should review access controls and audit logs on connected portals. Implement continuous anomaly detection on web-facing portals to reduce dwell time for unauthorized access. Ensure vendor contracts include breach notification timelines aligned with HIPAA requirements.

VOID#GEIST Multi-Stage Malware Campaign Delivers Three RATs via Phishing Emails

Securonix Threat Research disclosed on March 6, 2026 a multi-stage malware campaign dubbed VOID#GEIST that delivers three remote access trojans — XWorm, AsyncRAT, and Xeno RAT — through phishing emails carrying obfuscated batch scripts hosted on TryCloudflare domains. The campaign targets Windows endpoints and operates using a fileless execution approach, injecting encrypted shellcode directly into memory via Early Bird Asynchronous Procedure Call (APC) injection into explorer.exe instances, minimizing disk-based detection opportunities. The attack chain begins when a victim executes a phishing-delivered batch script, which displays a decoy financial document or invoice in full-screen Chrome as a distraction. Behind the scenes, it establishes user-level persistence by dropping an auxiliary batch script into the Windows Startup directory — requiring no privilege escalation and generating minimal security alerts. A legitimate Python runtime is then downloaded directly from python.org, creating a self-contained execution environment to decrypt and deploy all three RAT payloads. The infection concludes with an HTTP beacon to attacker-controlled C2 infrastructure hosted on TryCloudflare. Targets and confirmed compromises are not yet known.

Impact: Successful infection grants attackers remote access and control over compromised Windows systems through three concurrent RATs, which could lead to data exfiltration, credential theft, lateral movement, and persistent surveillance. The fileless, modular delivery method makes detection with traditional endpoint tools difficult. The use of legitimate infrastructure (TryCloudflare, python.org, Microsoft binaries) may allow the campaign to bypass network-level controls and firewall policies.

Recommendation: Block or alert on outbound connections to TryCloudflare tunnel domains at the network perimeter unless explicitly required for business operations. Configure endpoint detection rules to flag repeated process injection into explorer.exe within short time windows, as Securonix identifies this as a key behavioral indicator. Restrict execution of batch scripts and PowerShell with hidden window parameters via application control policies (e.g., AppLocker, Windows Defender Application Control). Disable or monitor the Windows Startup directory for unauthorized script placements. Train users to recognize phishing emails containing financial document lures. Enable script-block logging for PowerShell and audit AppInstallerPythonRedirector.exe usage. Deploy email filtering rules to quarantine messages containing .bat or .zip attachments from external senders.

🚩 Iranian APT Seedworm Deploys New Backdoors on U.S. Bank, Airport, and Software Company Networks

Symantec researchers identified Iranian APT group Seedworm conducting intrusion operations against multiple U.S. organizations beginning in early February 2026 and continuing through early March following U.S. and Israeli military strikes on Iran. Targeted entities include a U.S. bank, software company, airport, and non-governmental organizations in the U.S. and Canada. Seedworm, also tracked as MuddyWater, Temp Zagros, and Static Kitten, is assessed by CISA as a subordinate element within Iran’s Ministry of Intelligence and Security (MOIS). The group deployed a previously unknown backdoor named Dindoor leveraging Deno runtime for JavaScript and TypeScript execution, signed with certificates issued to “Amy Cherne” and found on networks of the Israeli software outpost, U.S. bank, and Canadian non-profit. A separate Python backdoor called Fakeset was discovered on U.S. airport and non-profit networks, signed with certificates issued to “Amy Cherne” and “Donald Gay,” with the Donald Gay certificate previously used to sign Seedworm-linked malware families Stagecomp and Darkcomp. Attackers attempted data exfiltration from the software company using Rclone to transfer backups to Wasabi cloud storage buckets, though success of the operation remains unclear.

Impact: Seedworm’s presence on U.S. and Israeli networks prior to current regional hostilities positions the group for potential destructive operations beyond traditional espionage activities. The targeting of a defense and aerospace industry software supplier with Israeli operations provides potential access to supply chain relationships and sensitive project data across multiple sectors. The bank intrusion creates risks for financial data exfiltration and potential payment system disruption, while airport network access enables surveillance of transportation infrastructure. Iran has demonstrated capability for destructive cyberattacks including wiper malware deployment, with historical operations like Shamoon against Saudi Arabia’s oil industry and BibiWiper attacks against Israeli targets.

Recommendation: Organizations, particularly those in critical infrastructure and defense sectors, should heighten their security posture against Iranian state-sponsored threats. Search environments for the presence of Deno runtimes or unauthorized Python scripts, which may indicate Dindoor or Fakeset infections. Monitor for the unauthorized use of data exfiltration tools like Rclone, especially large outbound transfers to external cloud storage platforms like Wasabi or Backblaze. Organizations should maintain immutable backups. Block network connections to identified IOCs. Deploy monitoring for password spraying attempts across multiple user accounts from unusual geographic locations, particularly authentication failures outside normal working hours or from VPN infrastructure including Nord VPN endpoints. Enable multi-factor authentication across all remote access, disable legacy authentication protocols, and implement conditional access policies based on location and device risk. Organizations should deploy web application firewalls with updated rule sets, enable DDoS protection via CDN or upstream filtering services, and monitor for spikes in HTTP requests from distributed IP ranges. Given Broadcom’s warning that Iranian actors may escalate to disruptive or destructive operations, organizations should also validate network segmentation, protect and isolate backups, test recovery procedures, and ensure monitoring is in place for shadow copy deletion, mass task creation, suspicious administrative command execution, and attempts to disable security tooling.

Sign up here!

To receive the TIGR Threat Watch email bulletin and critical vulnerability notifications, simply complete the form below.

 

Follow on Twitter

@SRA_ThreatWatch will keep you up to date with the most recent posts on your social media feed.

Subscribe to the RSS

Just copy and add this link to your RSS app and be notified immediately when new intel is posted.

How to use RSS

Following the RSS feed is easy. RSS can be added in your Outlook desktop app, and there are many free RSS readers available for your mobile device.

To follow using Outlook:

  • In Outlook, right-click the RSS Feeds folder and choose Add a New RSS Feed.
  • In the New RSS Feed dialog box, enter the URL of the RSS Feed: https://sra.io/category/tigr/feed

(click here for detailed instructions and additional options for Outlook)

Popular mobile RSS reader apps include:

  • Feedly
  • NewsBlur
  • RSS Reader
  • Inoreader

After installing your preferred RSS reader, you will be able to add this feed by entering the URL: https://sra.io/category/tigr/feed

Threat Bulletin Archive

About TIGR Threat Watch

Our Threat Intelligence Gathering & Research (TIGR) team is focused on threat intelligence and curates a daily intelligence report, TIGR Threat Watch, with information collected from several industry intel sources. We also create and publish ad-hoc critical vulnerability notifications in case of critical and time-sensitive vulnerabilities or threats. These notifications include details and recommendations for mitigation/remediation.