Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector
Cybersecurity researchers have disclosed details of an active phishing campaign that's targeting a wide range of sectors in Russia with phishing emails that deliver Phantom Stealer via malicious ISO optical disc images. The activity, codenamed Operation MoneyMount-ISO by Seqrite Labs, has primarily singled out finance and accounting entities, with those in the procurement, legal, payroll
AI Analysis
Technical Summary
Operation MoneyMount-ISO is an active phishing campaign primarily targeting Russian finance, accounting, procurement, legal, and payroll sectors. It uses phishing emails that impersonate legitimate financial communications, urging recipients to confirm bank transfers. The emails contain ZIP archives with ISO files named to mimic bank transfer confirmations. When mounted, these ISO files act as virtual CD drives and execute embedded DLLs (notably CreativeAI.dll) that launch Phantom Stealer malware. Phantom Stealer is a sophisticated information stealer capable of extracting data from Chromium-based browser cryptocurrency wallet extensions, desktop wallet applications, browser passwords, cookies, credit card details, Discord authentication tokens, and clipboard content. It also logs keystrokes and performs environment checks to avoid execution in virtualized or sandboxed environments. Data exfiltration is conducted via Telegram bots, Discord webhooks, and FTP servers controlled by attackers. Parallel campaigns deploy implants like DUPERUNNER, which loads the AdaptixC2 command-and-control framework, using decoy PDFs and LNK files to download and execute payloads via PowerShell. Additional malware such as Cobalt Strike, Formbook, DarkWatchman, and PhantomRemote have been observed targeting Russian aerospace, finance, and legal sectors. These campaigns often leverage compromised Russian company email servers for spear-phishing distribution. Attribution links some attacks to Ukrainian-aligned hacktivists targeting entities cooperating with Russia’s military amidst ongoing geopolitical conflict and sanctions. The campaigns also use advanced phishing infrastructure including IPFS and Vercel-hosted credential phishing pages. Overall, the threat actors employ multi-stage infection chains, social engineering, and advanced evasion techniques to compromise high-value targets and exfiltrate sensitive financial and operational data.
Potential Impact
For European organizations, especially those with business or operational ties to Russian entities or sectors under geopolitical scrutiny, this campaign poses significant risks. The theft of cryptocurrency wallets, browser credentials, and sensitive financial data could lead to financial losses, fraud, and unauthorized access to corporate systems. The use of ISO files as infection vectors complicates detection and user awareness, increasing the likelihood of successful compromise. Exfiltrated data could facilitate further attacks, espionage, or sabotage. Organizations in finance, legal, procurement, payroll, and aerospace sectors are at heightened risk due to the campaign’s targeting profile. The use of legitimate email servers for spear-phishing increases the chance of bypassing email security filters. Additionally, the geopolitical context involving Ukrainian-aligned hacktivists targeting Russian aerospace and military-related entities suggests potential spillover or targeting of European aerospace and defense contractors engaged with Russian partners. The campaign’s multi-stage infection and use of advanced C2 frameworks enable persistent access and lateral movement, potentially impacting confidentiality, integrity, and availability of critical systems.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to combat ISO-based phishing attacks. Specifically, email gateways must be configured to detect and block ISO attachments or quarantine emails containing such files, especially those originating from external or suspicious sources. User awareness training should emphasize the risks of opening ISO files and recognizing phishing lures related to financial transactions. Endpoint detection and response (EDR) solutions should be tuned to detect mounting of virtual drives from ISO files and monitor for execution of suspicious DLLs like CreativeAI.dll. Network monitoring should include detection of unusual outbound connections to Telegram bots, Discord webhooks, and FTP servers. Implement application whitelisting to prevent unauthorized execution of PowerShell scripts and LNK files from email attachments. Employ sandboxing solutions capable of analyzing ISO contents and multi-stage payloads. Regularly audit and secure email servers to prevent their compromise and misuse in spear-phishing campaigns. For organizations in aerospace and defense sectors, enhanced threat intelligence sharing and monitoring for indicators of compromise related to DUPERUNNER, AdaptixC2, and associated malware families is critical. Finally, enforce strict access controls and multi-factor authentication to limit damage from stolen credentials and tokens.
Affected Countries
Russia, Ukraine, Germany, France, United Kingdom, Italy, Poland, Netherlands, Belgium
Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector
Description
Cybersecurity researchers have disclosed details of an active phishing campaign that's targeting a wide range of sectors in Russia with phishing emails that deliver Phantom Stealer via malicious ISO optical disc images. The activity, codenamed Operation MoneyMount-ISO by Seqrite Labs, has primarily singled out finance and accounting entities, with those in the procurement, legal, payroll
AI-Powered Analysis
Technical Analysis
Operation MoneyMount-ISO is an active phishing campaign primarily targeting Russian finance, accounting, procurement, legal, and payroll sectors. It uses phishing emails that impersonate legitimate financial communications, urging recipients to confirm bank transfers. The emails contain ZIP archives with ISO files named to mimic bank transfer confirmations. When mounted, these ISO files act as virtual CD drives and execute embedded DLLs (notably CreativeAI.dll) that launch Phantom Stealer malware. Phantom Stealer is a sophisticated information stealer capable of extracting data from Chromium-based browser cryptocurrency wallet extensions, desktop wallet applications, browser passwords, cookies, credit card details, Discord authentication tokens, and clipboard content. It also logs keystrokes and performs environment checks to avoid execution in virtualized or sandboxed environments. Data exfiltration is conducted via Telegram bots, Discord webhooks, and FTP servers controlled by attackers. Parallel campaigns deploy implants like DUPERUNNER, which loads the AdaptixC2 command-and-control framework, using decoy PDFs and LNK files to download and execute payloads via PowerShell. Additional malware such as Cobalt Strike, Formbook, DarkWatchman, and PhantomRemote have been observed targeting Russian aerospace, finance, and legal sectors. These campaigns often leverage compromised Russian company email servers for spear-phishing distribution. Attribution links some attacks to Ukrainian-aligned hacktivists targeting entities cooperating with Russia’s military amidst ongoing geopolitical conflict and sanctions. The campaigns also use advanced phishing infrastructure including IPFS and Vercel-hosted credential phishing pages. Overall, the threat actors employ multi-stage infection chains, social engineering, and advanced evasion techniques to compromise high-value targets and exfiltrate sensitive financial and operational data.
Potential Impact
For European organizations, especially those with business or operational ties to Russian entities or sectors under geopolitical scrutiny, this campaign poses significant risks. The theft of cryptocurrency wallets, browser credentials, and sensitive financial data could lead to financial losses, fraud, and unauthorized access to corporate systems. The use of ISO files as infection vectors complicates detection and user awareness, increasing the likelihood of successful compromise. Exfiltrated data could facilitate further attacks, espionage, or sabotage. Organizations in finance, legal, procurement, payroll, and aerospace sectors are at heightened risk due to the campaign’s targeting profile. The use of legitimate email servers for spear-phishing increases the chance of bypassing email security filters. Additionally, the geopolitical context involving Ukrainian-aligned hacktivists targeting Russian aerospace and military-related entities suggests potential spillover or targeting of European aerospace and defense contractors engaged with Russian partners. The campaign’s multi-stage infection and use of advanced C2 frameworks enable persistent access and lateral movement, potentially impacting confidentiality, integrity, and availability of critical systems.
Mitigation Recommendations
European organizations should implement multi-layered defenses tailored to combat ISO-based phishing attacks. Specifically, email gateways must be configured to detect and block ISO attachments or quarantine emails containing such files, especially those originating from external or suspicious sources. User awareness training should emphasize the risks of opening ISO files and recognizing phishing lures related to financial transactions. Endpoint detection and response (EDR) solutions should be tuned to detect mounting of virtual drives from ISO files and monitor for execution of suspicious DLLs like CreativeAI.dll. Network monitoring should include detection of unusual outbound connections to Telegram bots, Discord webhooks, and FTP servers. Implement application whitelisting to prevent unauthorized execution of PowerShell scripts and LNK files from email attachments. Employ sandboxing solutions capable of analyzing ISO contents and multi-stage payloads. Regularly audit and secure email servers to prevent their compromise and misuse in spear-phishing campaigns. For organizations in aerospace and defense sectors, enhanced threat intelligence sharing and monitoring for indicators of compromise related to DUPERUNNER, AdaptixC2, and associated malware families is critical. Finally, enforce strict access controls and multi-factor authentication to limit damage from stolen credentials and tokens.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2025/12/phantom-stealer-spread-by-iso-phishing.html","fetched":true,"fetchedAt":"2025-12-16T07:13:08.907Z","wordCount":1161}
Threat ID: 6941068815f8de78ec7fc220
Added to database: 12/16/2025, 7:13:12 AM
Last enriched: 12/16/2025, 7:15:12 AM
Last updated: 12/16/2025, 9:43:58 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Phishing in Telegram Mini Apps: how to avoid taking the bait | Kaspersky official blog
MediumNew Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
MediumWhere does the data stolen in a phishing attack go? | Kaspersky official blog
MediumScammers Sent 40,000 E-Signature Phishing Emails (SharePoint and DocuSign) to 6,000 Firms in Just 2 Weeks
MediumCovert red team phishing
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.