New malware operation 'Phantom Goblin' distributes info-stealers

New malware operation 'Phantom Goblin' distributes info-stealers

Cyble Research and Intelligence Labs (CRIL) has uncovered a sophisticated campaign dubbed ‘Phantom Goblin’, which uses social engineering methods to distribute information-stealing malware.

The attack begins with seemingly harmless RAR file attachments that contain malicious shortcut (LNK) files, disguised as legitimate PDF documents. Upon execution, these LNK files trigger a sequence of stealthy operations aimed at gathering confidential information from the victim’s system.

Once the LNK file is executed, it launches a PowerShell command that retrieves and runs a remote script from a GitHub repository. This script establishes persistence on the infected machine by creating registry entries and downloading multiple payload files, all designed to mimic legitimate applications, allowing the malware to remain undetected.

Cyble analysts have noted that Phantom Goblin primarily targets web browsers and developer tools. The malware is capable of forcefully terminating browser processes to extract sensitive data, such as cookies, login credentials, and browsing history. It also leverages the Visual Studio Code (VS Code) tunnels to create and maintain unauthorized remote access to compromised systems.

The Phantom Goblin attack consists of three main executable components: updater.exe, vscode.exe, and browser.exe. The updater.exe component extracts cookies from major web browsers by first checking for running instances using tasklist commands, and then forcefully terminating them with taskkill.exe. Afterward, it archives the cookies into JSON files and bundles them into a ZIP archive, which is then transmitted to a Telegram bot for exfiltration.

The Vscode.exe component downloads a legitimate copy of Visual Studio Code and establishes a covert tunnel that enables remote access to the compromised system.

Browser.exe targets at least 14 different web browsers, extracting a variety of sensitive information including stored passwords, cookies, browsing history, and wallet data. All the stolen information is archived into a ZIP file, named after the username, and exfiltrated through Telegram.

“This malware attack highlights the increasing sophistication of cyber threats that leverage social engineering and trusted tools for stealthy execution. By disguising itself within a RAR attachment, it deceives users into executing a malicious LNK file that initiates PowerShell-based attacks,” the report noted.


Back to the list

Latest Posts

UAT-5918 info-stealing campaign targets critical infrastructure entities in Taiwan

UAT-5918 info-stealing campaign targets critical infrastructure entities in Taiwan

The tactics and tools employed by UAT-5918 overlap with other state-sponsored threat groups, such as Volt Typhoon, Flex Typhoon, and Earth Estries.
20 March 2025
New supply chain attack allows to inject malicious code via AI code editors

New supply chain attack allows to inject malicious code via AI code editors

By exploiting hidden unicode characters and employing advanced evasion techniques, attackers can subtly alter the behavior of AI models.
19 March 2025
Russian disinformation actors employ new tactics to maintain influence

Russian disinformation actors employ new tactics to maintain influence

Rather than immediately deploying newly registered domains, many threat actors now secure domain names months in advance.
19 March 2025