ISO Phishing Drops Phantom Stealer on Russian Finance

ISO Phishing Drops Phantom Stealer on Russian Finance
December 15, 2025 at 12:00 AM

A new phishing wave in Russia is pushing Phantom Stealer via malicious ISO images, with finance and accounting teams most at risk. Seqrite Labs tracks the operation as "Operation MoneyMount-ISO," noting secondary targeting of procurement, legal, and payroll functions.

Key points:

  • Lure: fake payment confirmations sent via email
  • Payload delivery: ZIP attachments that mount ISO files as virtual CD drives
  • Malware: Phantom Stealer executed via an embedded DLL ("CreativeAI.dll")
  • Exfiltration: Telegram bot, Discord webhook, and FTP for file transfer

How the attack works:

  • Victims receive emails posing as legitimate bank transfer notices, urging payment confirmation.
  • The attached ZIP contains an ISO ("Подтверждение банковского перевода.iso" / "Bank transfer confirmation.iso").
  • When mounted, the ISO executes and launches Phantom Stealer through the bundled DLL "CreativeAI.dll."

What Phantom Stealer steals:

  • Data from cryptocurrency wallet browser extensions (Chromium-based) and desktop wallets
  • Files, Discord authentication tokens
  • Browser passwords, cookies, and credit card details
  • Clipboard contents and keystrokes
  • It also checks for virtualization, sandboxes, or analysis tools and halts execution if detected.

Related campaign: DupeHike (UNG0902)

  • Target: Russian HR and payroll departments
  • Lures: bonus awards and internal financial policy notices
  • Tooling: a previously undocumented implant, DUPERUNNER, that loads the AdaptixC2 open-source C2 framework
  • Delivery chain: spear-phishing ZIPs with PDF/LNK decoys (e.g., "Документ_1_О_размере_годовой_премии.pdf.lnk" / "Document_1_On_the_amount_of_the_annual_bonus.pdf.lnk")
  • Execution: the LNK uses powershell.exe to fetch DUPERUNNER, which shows a decoy PDF and injects AdaptixC2 into legitimate processes like "explorer.exe," "notepad.exe," or "msedge.exe"

Wider Russian-targeted activity:

  • Sectors hit: finance, legal, and aerospace
  • Tools observed: Cobalt Strike, Formbook, DarkWatchman, PhantomRemote
  • Tradecraft: compromised corporate email servers used to send spear-phishing messages

Aerospace intrusions and attribution:

  • Intrinsec links a cluster targeting Russia’s aerospace industry to hacktivists aligned with Ukrainian interests (June–September 2025)
  • Overlaps with Hive0117, Operation CargoTalon, and Rainbow Hyena (aka Fairy Trickster, Head Mare, PhantomCore)
  • Some campaigns redirect victims to credential-harvesting pages on IPFS and Vercel, aiming at Microsoft Outlook and Bureau 1440 accounts
  • Assessed goal: compromise entities collaborating with Russia’s military amid the ongoing conflict

Source: The Hacker News

Back…