Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Threat Spotlight: Storm-0249 Moves from Mass Phishing to Precision EDR Exploitation

0
Medium
Published: Wed Dec 10 2025 (12/10/2025, 09:17:43 UTC)
Source: AlienVault OTX General

Description

Storm-0249, a seasoned initial access broker, has evolved from mass phishing to sophisticated post-exploitation tactics. The group now abuses legitimate Endpoint Detection and Response processes, particularly SentinelOne's SentinelAgentWorker.exe, through DLL sideloading. This allows them to conceal malicious activity as routine operations, bypass defenses, and maintain persistence. Their new tactics include Microsoft domain spoofing, curl-to-PowerShell piping, and fileless execution. Storm-0249's ability to weaponize trusted processes and conduct stealthy reconnaissance poses significant challenges for security teams. The group's evolution represents a broader trend in the ransomware-as-a-service ecosystem, lowering the technical barrier for attackers and accelerating the spread of ransomware across sectors.

Technical Details

Author
AlienVault
Tlp
white
References
["https://reliaquest.com/blog/threat-spotlight-storm-0249-precision-endpoint-exploitation"]
Adversary
Storm-0249
Pulse Id
69393ab7f0d78ccb11a14d9a
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashaa157129a9df47ede836516dd4c7ec2d
hashd2237059bb738015b0878f99029be3a6
hash07c5599b9bb00feb70c2d5e43b4b76f228866930
hash423f2fcf7ed347ee57c1a3cffa14099ec16ad09c
hash10910179af37ba38786f5a1b59d4dd1c43b6aa512850bbd47fb0feb965b2eb5c
hash8113fc3b4f82fb49f8dd853ca8e1275e0dfb06e48f39830708e4437fe8afbdfb

Ip

ValueDescriptionCopy
ip178.16.52.145

Domain

ValueDescriptionCopy
domainhristomasitomasdf.com
domainkrivomadogolyhp.com
domainsgcipl.com

Threat ID: 69393d10fd479f45ea600b7f

Added to database: 12/10/2025, 9:27:44 AM

Last updated: 12/10/2025, 9:27:48 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats