Like PuTTY in Admin's Hands
The LevelBlue Managed Detection and Response team handled incidents related to a malvertising campaign distributing trojanized versions of the PuTTY terminal emulator. The malicious software, masquerading as legitimate PuTTY, was downloaded by privileged users and exhibited behaviors such as Kerberoasting, suspicious PowerShell execution, and persistence via scheduled tasks. The threat actors used sponsored ads on search engines to deliver the malware, which was signed by various entities and utilized multiple domains for distribution. The campaign highlights the importance of following security best practices across all organizational levels and emphasizes the need for robust verification mechanisms in advertising networks to prevent abuse.
AI Analysis
Technical Summary
This threat involves a malvertising campaign distributing trojanized versions of the PuTTY terminal emulator, a widely used SSH and telnet client favored by system administrators and IT professionals. The malicious PuTTY binaries are delivered via sponsored ads on search engines, tricking privileged users into downloading and executing compromised software. Once installed, the malware exhibits advanced behaviors including Kerberoasting—an attack technique targeting Kerberos tickets to escalate privileges or move laterally within Active Directory environments. It also performs suspicious PowerShell executions, which are often used to execute scripts or commands stealthily, and establishes persistence through scheduled tasks, ensuring the malware remains active after system reboots. The malware is signed by various entities to appear legitimate and uses multiple domains for distribution, complicating detection and takedown efforts. This campaign underscores the risks posed by supply chain attacks and the exploitation of advertising networks to deliver malware to high-value targets. The use of trojanized administrative tools like PuTTY is particularly dangerous because it leverages the trust and privileges associated with these tools, enabling attackers to gain deep access to enterprise networks. The campaign highlights the necessity for organizations to implement strict software verification processes, monitor for anomalous PowerShell activity, and scrutinize advertising sources to prevent similar infections.
Potential Impact
For European organizations, the impact of this threat can be significant. The compromise of privileged users through trojanized PuTTY can lead to unauthorized access to critical systems, data exfiltration, and lateral movement within networks. Kerberoasting attacks can allow adversaries to escalate privileges and compromise Active Directory environments, which are foundational to many European enterprises' IT infrastructure. The persistence mechanisms ensure long-term presence, increasing the risk of data breaches and operational disruption. Additionally, the use of malvertising to distribute malware can affect organizations regardless of perimeter defenses, as users may inadvertently download malicious software from seemingly legitimate sources. This threat can disrupt business continuity, damage reputation, and lead to regulatory penalties under frameworks like GDPR if personal data is compromised. The medium severity rating reflects the complexity of the attack chain and the need for user interaction, but the high-value targets involved and potential for privilege escalation elevate the risk profile for European organizations.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to this threat: 1) Enforce strict application whitelisting and digital signature verification to ensure only legitimate PuTTY binaries are executed. 2) Educate privileged users about the risks of downloading software from search engine ads and encourage use of official vendor sites or verified repositories. 3) Monitor and analyze PowerShell logs and scheduled task creations for suspicious activity indicative of malware persistence or lateral movement. 4) Deploy network detection tools capable of identifying Kerberoasting attempts and anomalous authentication patterns within Active Directory. 5) Collaborate with advertising networks to report and block malicious sponsored ads, reducing exposure to malvertising campaigns. 6) Regularly audit and update endpoint protection solutions to detect trojanized binaries and related malware behaviors. 7) Implement strict access controls and segmentation to limit the impact of compromised credentials. 8) Utilize threat intelligence feeds to stay informed about emerging indicators related to this campaign and adjust defenses accordingly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- hash: 02b3a5f0121fab02f22173c9e738fee6
- hash: 0e041de4bca18fdfa54c525ae524e018
- hash: 4e61cfa7d791788ae557319e83c63fb4
- hash: 8eb873ad112121cdfd0cc72688aa229f
- hash: 8ed690f6438133f4661465253daba3bc
- hash: bb50383eac05377d7feae5b9c3024550
- hash: e48431ba5aa7a42ae0a32eb7d859d7a4
- hash: 1cbaf127a893dbfee4db55fb0c854bbb25066af2
- hash: 2509ce05b7a4c5b27c105b363ba2feb6c7d18b56
- hash: 6b136e32f9afcb6c8d6c7d808df0ca268d47e5b5
- hash: 834910945ee39c185366b60fc4161937f468fd80
- hash: 8a14d44743af6a702c7425f80f38d21e4ae8e05a
- hash: dccb81b59b22bd45f0ea2987ca5397983a4294d0
- hash: f3056b85e3024c31647810720d7f58adc3cccc16
- hash: 03012e22602837132c4611cac749de39fb1057a8dead227594d4d4f6fb961552
- hash: 0b85ad058aa224d0b66ac7fdc4f3b71145aede462068cc9708ec2cee7c5717d4
- hash: 1112b72f47b7d09835c276c412c83d89b072b2f0fb25a0c9e2fed7cf08b55a41
- hash: 3d22a974677164d6bd7166e521e96d07cd00c884b0aeacb5555505c6a62a1c26
- hash: 80c8a6ecd5619d137aa57ddf252ab5dc9044266fca87f3e90c5b7f3664c5142f
- hash: a653b4f7f76ee8e6bd9ffa816c0a14dca2d591a84ee570d4b6245079064b5794
- hash: d73bcb2b67aebb19ff26a840d3380797463133c2c8f61754020794d31a9197d1
- hash: dd995934bdab89ca6941633dea1ef6e6d9c3982af5b454ecb0a6c440032b30fb
- hash: e02d21a83c41c15270a854c005c4b5dfb94c2ddc03bb4266aa67fc0486e5dd35
- hash: e8e9f0da26a3d6729e744a6ea566c4fd4e372ceb4b2e7fc01d08844bfc5c3abb
- hash: e9f05410293f97f20d528f1a4deddc5e95049ff1b0ec9de4bf3fd7f5b8687569
- hash: eef6d4b6bdf48a605cade0b517d5a51fc4f4570e505f3d8b9b66158902dcd4af
- ip: 185.208.158.119
- ip: 185.208.159.119
- domain: danielaurel.tv
- domain: heartlandenergy.ai
- domain: putty.lat
- domain: putty.network
- domain: putty.run
- domain: puttysystems.com
- domain: puttyy.com
- domain: puttyy.org
- domain: ekeitoro.siteinwp.com
- domain: ruben.findinit.com
Like PuTTY in Admin's Hands
Description
The LevelBlue Managed Detection and Response team handled incidents related to a malvertising campaign distributing trojanized versions of the PuTTY terminal emulator. The malicious software, masquerading as legitimate PuTTY, was downloaded by privileged users and exhibited behaviors such as Kerberoasting, suspicious PowerShell execution, and persistence via scheduled tasks. The threat actors used sponsored ads on search engines to deliver the malware, which was signed by various entities and utilized multiple domains for distribution. The campaign highlights the importance of following security best practices across all organizational levels and emphasizes the need for robust verification mechanisms in advertising networks to prevent abuse.
AI-Powered Analysis
Technical Analysis
This threat involves a malvertising campaign distributing trojanized versions of the PuTTY terminal emulator, a widely used SSH and telnet client favored by system administrators and IT professionals. The malicious PuTTY binaries are delivered via sponsored ads on search engines, tricking privileged users into downloading and executing compromised software. Once installed, the malware exhibits advanced behaviors including Kerberoasting—an attack technique targeting Kerberos tickets to escalate privileges or move laterally within Active Directory environments. It also performs suspicious PowerShell executions, which are often used to execute scripts or commands stealthily, and establishes persistence through scheduled tasks, ensuring the malware remains active after system reboots. The malware is signed by various entities to appear legitimate and uses multiple domains for distribution, complicating detection and takedown efforts. This campaign underscores the risks posed by supply chain attacks and the exploitation of advertising networks to deliver malware to high-value targets. The use of trojanized administrative tools like PuTTY is particularly dangerous because it leverages the trust and privileges associated with these tools, enabling attackers to gain deep access to enterprise networks. The campaign highlights the necessity for organizations to implement strict software verification processes, monitor for anomalous PowerShell activity, and scrutinize advertising sources to prevent similar infections.
Potential Impact
For European organizations, the impact of this threat can be significant. The compromise of privileged users through trojanized PuTTY can lead to unauthorized access to critical systems, data exfiltration, and lateral movement within networks. Kerberoasting attacks can allow adversaries to escalate privileges and compromise Active Directory environments, which are foundational to many European enterprises' IT infrastructure. The persistence mechanisms ensure long-term presence, increasing the risk of data breaches and operational disruption. Additionally, the use of malvertising to distribute malware can affect organizations regardless of perimeter defenses, as users may inadvertently download malicious software from seemingly legitimate sources. This threat can disrupt business continuity, damage reputation, and lead to regulatory penalties under frameworks like GDPR if personal data is compromised. The medium severity rating reflects the complexity of the attack chain and the need for user interaction, but the high-value targets involved and potential for privilege escalation elevate the risk profile for European organizations.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to this threat: 1) Enforce strict application whitelisting and digital signature verification to ensure only legitimate PuTTY binaries are executed. 2) Educate privileged users about the risks of downloading software from search engine ads and encourage use of official vendor sites or verified repositories. 3) Monitor and analyze PowerShell logs and scheduled task creations for suspicious activity indicative of malware persistence or lateral movement. 4) Deploy network detection tools capable of identifying Kerberoasting attempts and anomalous authentication patterns within Active Directory. 5) Collaborate with advertising networks to report and block malicious sponsored ads, reducing exposure to malvertising campaigns. 6) Regularly audit and update endpoint protection solutions to detect trojanized binaries and related malware behaviors. 7) Implement strict access controls and segmentation to limit the impact of compromised credentials. 8) Utilize threat intelligence feeds to stay informed about emerging indicators related to this campaign and adjust defenses accordingly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://levelblue.com/blogs/security-essentials/like-putty-in-admins-hands"]
- Adversary
- null
- Pulse Id
- 68af30b5c4033492fe0be98f
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash02b3a5f0121fab02f22173c9e738fee6 | — | |
hash0e041de4bca18fdfa54c525ae524e018 | — | |
hash4e61cfa7d791788ae557319e83c63fb4 | — | |
hash8eb873ad112121cdfd0cc72688aa229f | — | |
hash8ed690f6438133f4661465253daba3bc | — | |
hashbb50383eac05377d7feae5b9c3024550 | — | |
hashe48431ba5aa7a42ae0a32eb7d859d7a4 | — | |
hash1cbaf127a893dbfee4db55fb0c854bbb25066af2 | — | |
hash2509ce05b7a4c5b27c105b363ba2feb6c7d18b56 | — | |
hash6b136e32f9afcb6c8d6c7d808df0ca268d47e5b5 | — | |
hash834910945ee39c185366b60fc4161937f468fd80 | — | |
hash8a14d44743af6a702c7425f80f38d21e4ae8e05a | — | |
hashdccb81b59b22bd45f0ea2987ca5397983a4294d0 | — | |
hashf3056b85e3024c31647810720d7f58adc3cccc16 | — | |
hash03012e22602837132c4611cac749de39fb1057a8dead227594d4d4f6fb961552 | — | |
hash0b85ad058aa224d0b66ac7fdc4f3b71145aede462068cc9708ec2cee7c5717d4 | — | |
hash1112b72f47b7d09835c276c412c83d89b072b2f0fb25a0c9e2fed7cf08b55a41 | — | |
hash3d22a974677164d6bd7166e521e96d07cd00c884b0aeacb5555505c6a62a1c26 | — | |
hash80c8a6ecd5619d137aa57ddf252ab5dc9044266fca87f3e90c5b7f3664c5142f | — | |
hasha653b4f7f76ee8e6bd9ffa816c0a14dca2d591a84ee570d4b6245079064b5794 | — | |
hashd73bcb2b67aebb19ff26a840d3380797463133c2c8f61754020794d31a9197d1 | — | |
hashdd995934bdab89ca6941633dea1ef6e6d9c3982af5b454ecb0a6c440032b30fb | — | |
hashe02d21a83c41c15270a854c005c4b5dfb94c2ddc03bb4266aa67fc0486e5dd35 | — | |
hashe8e9f0da26a3d6729e744a6ea566c4fd4e372ceb4b2e7fc01d08844bfc5c3abb | — | |
hashe9f05410293f97f20d528f1a4deddc5e95049ff1b0ec9de4bf3fd7f5b8687569 | — | |
hasheef6d4b6bdf48a605cade0b517d5a51fc4f4570e505f3d8b9b66158902dcd4af | — |
Ip
Value | Description | Copy |
---|---|---|
ip185.208.158.119 | — | |
ip185.208.159.119 | — |
Domain
Value | Description | Copy |
---|---|---|
domaindanielaurel.tv | — | |
domainheartlandenergy.ai | — | |
domainputty.lat | — | |
domainputty.network | — | |
domainputty.run | — | |
domainputtysystems.com | — | |
domainputtyy.com | — | |
domainputtyy.org | — | |
domainekeitoro.siteinwp.com | — | |
domainruben.findinit.com | — |
Threat ID: 68af5d62ad5a09ad0065abb1
Added to database: 8/27/2025, 7:32:50 PM
Last enriched: 8/27/2025, 7:47:48 PM
Last updated: 8/31/2025, 6:22:54 PM
Views: 17
Related Threats
ThreatFox IOCs for 2025-08-30
MediumThreatFox IOCs for 2025-08-29
MediumOperation HanKook Phantom: Spear-Phishing Campaign
MediumThe First AI-Powered Ransomware & How It Works
MediumAI Waifu RAT: A Ring3 malware-like RAT based on LLM manipulation is circulating in the wild.
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.