Email security, Vulnerability Management

Novel Luna Moth data extortion operation detailed

Share

BleepingComputer reports that the new Luna Moth data extortion operation has launched a widespread phishing campaign aimed at stealing corporate data. Phishing attacks launched by Luna Moth, also known as TG2729 or Silent Ransom Group, since its emergence in March involved the use of fraudulent Zoho, Duolingo, or MasterClass subscription emails as lures, a report from Sygnia's Incident Response team revealed. Luna Moth's emails would warn recipients regarding the imminent end of their subscriptions, which will be eligible for automatic renewal, with a 24-hour payment processing period. Communicating with the phone number indicated in the provided invoice will connect recipients to attackers who will then lure them into installing a remote access tool. Such techniques have prompted researchers to conclude that Luna Moth was not a sophisticated attacker. Aside from leveraging numerous commercial remote desktop solutions, Luna Moth was also observed to deploy at least two RATs in compromised machines. Nearly 90 domain names are also being used by the double-extortion operation, the report noted.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms of Use and Privacy Policy.