Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

FlowerStorm unleashes the KrakVM: PhaaS operators turn to VM-based obfuscation

0
Medium
Published: Mon May 18 2026 (05/18/2026, 18:45:09 UTC)
Source: AlienVault OTX General

Description

FlowerStorm is a widely known Phishing-As-A-Service (PhaaS) attack kit that has been active since at least mid-2024, increasingly in large scale campaigns. FlowerStorm performs targeted, complex collection of a victim’s credentials, including the management of multi-factor authentication (MFA).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/18/2026, 19:06:33 UTC

Technical Analysis

FlowerStorm is a phishing malware platform that facilitates large-scale credential harvesting, including bypassing MFA protections. It uses KrakVM, a virtual machine-based obfuscation method, to complicate analysis and detection. The attack vector involves phishing emails with HTML attachments, consistent with T1566 (phishing). This PhaaS kit has been active since mid-2024 and continues to evolve its evasion techniques.

Potential Impact

The primary impact is unauthorized credential theft, including credentials protected by MFA, which can lead to account compromise and subsequent unauthorized access to victim systems or services. The use of VM-based obfuscation increases the difficulty of detection and analysis, potentially prolonging the window of exposure for victims.

Mitigation Recommendations

As this is a phishing malware campaign rather than a software vulnerability, no patches or official fixes exist. Organizations should focus on user awareness training to recognize phishing attempts, implement strong email filtering, and employ additional detection mechanisms for obfuscated malware. Monitoring for phishing indicators and promptly responding to suspected phishing emails is recommended.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://sublime.security/blog/flowerstorm-unleashes-the-krakvm-phaas-operators-turn-to-vm-based-obfuscation/"]
Adversary
null
Pulse Id
6a0b5e378b3635e94b3b7656
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domain6182120286.my.id
domainalexperu.courtfilecloud.com
domain7250102277.cfd
domain5832068083.cyou
domain7840190445.cyou
domainbafybeiclfnumyd3aztwl2xjz5o6cfw4fqepqz6a6uow3dig57pf5najq2u.ipfs.w3s.link
domain5348785839.cfd
domainrdaol.dreamsintheframe.de
domaindfjxt.patienceintherain.de
domainpkxza.ruminatingbrook.de
domainvvbea.builtinlayers.de
domainuvehh.digitalsuccessframeworks.de
domainpozao.clearconceptsdesign.de
domainvunbp.scalableplatforms.de
domaindpqcm.solidreputation.de
domainottm.secureuserguard.de
domainsjask.reliablevisibility.de
domain1391604445.cfd
domain1419993777.cyou
domain1518076290.cyou
domain1569742347.cfd
domain1969421924.cyou
domain2008377162.cfd
domain2067612207.cfd
domain2143835084.cfd
domain5237741854.cfd
domain5334635671.cfd
domain5531648314.cfd
domain5624221719.cfd
domain6018258857.cfd
domain6185945827.sbs
domain6264277690.cfd
domain6326889358ghf.cyou
domain6438259665.cfd
domain6837577840.cfd
domain6970793981ad.cyou
domain7588085895.cyou
domain7622350912.cfd
domain7766360391.cfd
domain7983520156.cyou
domain8103841751.cyou
domain8191769809.cfd
domainamaxelectronics.co.za
domainasphalt9nitroo.my.id
domainmkreply2024.my.id
domainoutrageousorganisation.com.au
domain04qq.digitalcompetitiveedge.de
domain2059746795x.diflucan50.store
domainableg.docufiled.com
domainalbert.uscourtfilestorage.com
domainbafybeias2uivmggzl2gqjipqgcarbgyvakvk6yljxbcv4a3qroxcujzqaq.ipfs.w3s.link
domainbafybeid6ec6mwvrywozlhpblgzl76qtrcqqx26ryk2cptwtykroufqn4y4.ipfs.w3s.link
domainbill.cloudbusinessfiles.com
domainbombom.courtdocumentshub.com
domainbrenda.5hawb1t.site
domaincfur.invoclegal.com
domainchina.bureauofcourts.com
domainchr.authgsyuuite.com
domainchr.v0k3.space
domainchris.ggsuitauth.site
domainchris1.k5l1m.cfd
domaindon.feiracultural.de
domaindr.k5l1m.cfd
domainempire.appdocstorage.com
domainevszs.efficiencyworks.de
domainhbfnq.strongsystems.de
domainirigc.precisionontheweb.de
domainjeny.ggsuitauth.site
domainlifeofa.k5l1m.cfd
domainm.chantstraditionnels.de
domainmsg.uscourtfiles.com
domainmuchino.database-server.com
domainnnqsy.secureenvirotrust.de
domainnoanme.courtfilecloud.com
domainoffice.bureaucloudservices.com
domainoztff.valueguardians.de
domainqmduj.smoothhost.de
domainrexjf.digitaltrustbase.de
domaintlmsh.germanidentityhub.de
domaintowbb.digitalproficiency.de
domainunix.wearableartbags.de
domainvalid.seashellshoetreasures.de
domainwoovw.maximizevisibility.de
domainy.k5l1m.cfd
domainzpma.uscourtdocuments.com
domainzrqdi.dynamicgrowthsystems.de

Hash

ValueDescriptionCopy
hashb0ed4da928344ac2972a05ded086e4da

Threat ID: 6a0b5fb9ec166c07b0e30b01

Added to database: 5/18/2026, 6:51:37 PM

Last enriched: 5/18/2026, 7:06:33 PM

Last updated: 5/20/2026, 4:25:28 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses