Skip to main content

Rainbow Hyena strikes again: new backdoor and shift in tactics

Medium
Published: Tue Jul 15 2025 (07/15/2025, 20:39:47 UTC)
Source: AlienVault OTX General

Description

A new phishing campaign targeting healthcare and IT organizations in Russia has been attributed to the Rainbow Hyena cluster. The attackers used compromised email addresses to distribute malicious attachments, including polyglot files and LNK files mimicking legitimate documents. A new custom-built backdoor called PhantomRemote was identified, capable of system information gathering and command execution. The campaign demonstrates a shift in tactics, with threat actors abandoning traditional malicious documents in favor of alternative formats. The sophistication of the tools and techniques suggests a move towards more conventional illicit activities such as espionage and financial gain.

AI-Powered Analysis

AILast updated: 07/16/2025, 08:16:39 UTC

Technical Analysis

The Rainbow Hyena threat actor cluster has launched a new phishing campaign targeting healthcare and IT organizations in Russia, employing a shift in tactics and novel malware tools. Unlike previous campaigns that relied on traditional malicious document attachments, this campaign uses compromised email addresses to distribute polyglot files and LNK shortcut files that masquerade as legitimate documents. These alternative file formats help evade detection by conventional security solutions that focus on common document exploits. The campaign delivers a newly identified custom backdoor named PhantomRemote, which provides capabilities for system information gathering and remote command execution. This backdoor enables the attackers to maintain persistence, conduct reconnaissance, and execute arbitrary commands on compromised systems. The use of polyglot and LNK files indicates a sophisticated approach to social engineering and evasion, leveraging Windows shortcut files that can execute commands when clicked, and polyglot files that can be interpreted in multiple ways to bypass security filters. The campaign’s tactics align with MITRE ATT&CK techniques such as T1566 (phishing), T1204 (user execution), T1082 (system information discovery), T1059.003 (command and scripting interpreter: Windows Command Shell), and T1105 (ingress tool transfer). The shift away from traditional malicious documents towards alternative file formats and the deployment of a custom backdoor suggest an evolution in Rainbow Hyena’s operational methods, possibly reflecting a move towards more conventional cyber espionage and financially motivated intrusions. While currently observed in Russia, the sophistication and targeting of healthcare and IT sectors highlight the potential for broader impact if the campaign expands geographically or sector-wise.

Potential Impact

For European organizations, especially those in healthcare and IT sectors, the emergence of Rainbow Hyena’s new tactics and PhantomRemote backdoor poses a significant risk. Healthcare organizations are critical infrastructure with sensitive personal data and operational continuity requirements, making them attractive targets for espionage, data theft, or disruption. IT organizations often serve as supply chain nodes, so compromise here could lead to secondary infections or broader supply chain attacks. The use of phishing with sophisticated file formats increases the likelihood of successful initial compromise, potentially leading to unauthorized access, data exfiltration, and operational disruption. The backdoor’s capabilities for system reconnaissance and command execution could facilitate lateral movement, privilege escalation, and long-term persistence within networks. Although the campaign is currently focused on Russia, the techniques and tools could be adapted or redeployed against European targets, especially given the interconnectedness of IT and healthcare sectors across Europe. The campaign’s medium severity rating reflects the moderate but tangible risk of espionage and financial crime, which could have reputational, regulatory, and operational consequences for affected organizations.

Mitigation Recommendations

European organizations should implement targeted defenses against phishing campaigns that use unconventional file formats. This includes enhancing email security gateways to detect and block polyglot files and suspicious LNK files, employing advanced sandboxing solutions capable of analyzing such file types. User awareness training should be updated to highlight the risks of clicking on shortcut files and unfamiliar attachments, emphasizing verification of sender authenticity even when emails appear to come from known contacts. Endpoint detection and response (EDR) tools should be tuned to detect behaviors associated with PhantomRemote, such as unusual command execution, system information gathering, and network communications consistent with backdoor activity. Network segmentation and strict access controls can limit lateral movement if a system is compromised. Regular threat hunting exercises focusing on indicators of compromise related to Rainbow Hyena’s tactics should be conducted. Additionally, organizations should monitor threat intelligence feeds for updates on this campaign and related indicators. Incident response plans should be reviewed and tested to ensure rapid containment and remediation of infections involving custom backdoors. Finally, multi-factor authentication (MFA) and least privilege principles should be enforced to reduce the impact of credential compromise.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://bi-zone.medium.com/rainbow-hyena-strikes-again-new-backdoor-and-shift-in-tactics-2dd99a10aea9?source=rss-3882bedad280------2"]
Adversary
Rainbow Hyena
Pulse Id
6876bc94560fb5bc92a8936f
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip91.239.148.21
ip185.225.17.104
ip188.127.254.44

Hash

ValueDescriptionCopy
hash08a92ba1d1d9e5c498dcaf53af7cd071
hash1dff0bcf719f3509c597a8955e49af38
hash65967d019076e700deb20dcbc989c99c
hash698337a1be374f3ebb9556ccdc794389
hash75a26a138783032ee18dcfc713b1b34c
hash7e52be17fd33a281c70fec14805113a8
hash88453eb954669b5c7ac712ecf1e0179c
hash9f8e2e09e37142a21c16b37ba310e009
hashb49a7ef89cfb317a540996c3425fcdc2
hashb586cf958334415777719bf512304fbd
hashbe990a49fa1e3789ebc5c55961038029
hash04d364d7cc98379352e89757d62521271cb410cb
hash2a14a9dd1032479ab5bf8ed945ef9a22ebd4999d
hash49a18dc1d8f84394d3373481dbac89d11e373dbd
hash4ce5e6e0b21323409db8cd8ed2a7ed251656d18a
hash6942e07e7d08781cba571211a08e779838e72e9a
hash775b7e726ba6cf6d9a6463a62797c97612018066
hash851157c01da6e85ffa94ded7f42cab19aa8528d6
hashc52d70b92e41db70d4ca342c8dc32eff7883c861
hashd9a4fd39a55cd20d55e00d3cace3f637b8888213
hashdc149c042747ddf4f58c7ac6bf23e6a02ce1fc77
hashefe10ad0b49e6889597b5c3254139b92ed72064c
hash01f12bb3f4359fae1138a194237914f4fcdbf9e472804e428a765ad820f399be
hash204544fc8a8cac64bb07825a7bd58c54cb3e605707e2d72206ac23a1657bfe1e
hash413c9e2963b8cca256d3960285854614e2f2e78dba023713b3dd67af369d5d08
hash47262571a87e70238bd6afd376560e9cfdc94bfacae72f36b6aa9fb6e769eb9c
hash4c78d6bba282aaff0eab749cfa8a28e432f7cbf9c61dec8de8f4800fd27e0314
hash4d4304d7ad1a8d0dacb300739d4dcaade299b28f8be3f171628a7358720ca6c5
hasha9324a1fa529e5c115232cbbc60330d37cef5c20860bafc63b11e14d1e75697c
hashb683235791e3106971269259026e05fdc2a4008f703ff2a4d32642877e57429a
hashda53c49641b05e00cde09d47260da927ec403f01ac388605b785eac98306f9c2
hashe3e3f7d9abb9696904684d8e32f36818e1939c8122dcc73299a1b7f6b6b700b2
hashed9b24a77a74cd34c96b30f8de794fe85eb1d9f188f516bd7d6020cc81a86728

Threat ID: 68775c90a83201eaacd4c651

Added to database: 7/16/2025, 8:02:24 AM

Last enriched: 7/16/2025, 8:16:39 AM

Last updated: 8/28/2025, 3:18:12 PM

Views: 56

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats