Threat Actors Exploit VPS Infrastructure for Stealthy SaaS Attacks
Summary
Hide β²
Show βΌ
Threat actors are abusing commercial virtual private server (VPS) infrastructure to quickly and stealthily launch attacks on software-as-a-service (SaaS) environments. This tactic allows attackers to evade geolocation-based defenses, bypass IP reputation checks, and blend into legitimate user behavior. In May, Darktrace observed multiple incidents involving VPS abuse, including brute-force attempts, anomalous logins, and phishing-related activities. Two notable attacks involved the misuse of Hyonix VPS to hijack active email sessions and create obfuscated email rules, aiming to remain undetected while potentially setting the stage for data exfiltration or spam distribution.
Timeline
-
21.08.2025 20:42 π° 1 articles
VPS Abuse in SaaS Attacks Observed in May
In May, Darktrace observed a spike in alerts involving VPS abuse, including brute-force attempts and phishing-related activities. Two notable attacks involved the misuse of Hyonix VPS to hijack active email sessions and create obfuscated email rules. The attacks involved deleting emails referencing 'invoice documents' and creating inbox rules to conceal malicious activity. The attackers aimed to remain undetected while potentially setting the stage for data exfiltration or spam distribution.
Show sources
- Hackers Abuse VPS Infrastructure for Stealth, Speed β www.darkreading.com β 21.08.2025 20:42
Information Snippets
-
VPSs are low-cost, quick to set up, and have minimal open source intelligence footprints, making them attractive to threat actors.
First reported: 21.08.2025 20:42π° 1 source, 1 articleShow sources
- Hackers Abuse VPS Infrastructure for Stealth, Speed β www.darkreading.com β 21.08.2025 20:42
-
VPS abuse enables attackers to bypass geolocation-based defenses and evade IP reputation checks.
First reported: 21.08.2025 20:42π° 1 source, 1 articleShow sources
- Hackers Abuse VPS Infrastructure for Stealth, Speed β www.darkreading.com β 21.08.2025 20:42
-
In May, Darktrace observed a spike in alerts involving Hyonix VPS abuse, including brute-force attempts and phishing-related activities.
First reported: 21.08.2025 20:42π° 1 source, 1 articleShow sources
- Hackers Abuse VPS Infrastructure for Stealth, Speed β www.darkreading.com β 21.08.2025 20:42
-
Two attacks involved the misuse of Hyonix VPS to hijack active email sessions and create obfuscated email rules.
First reported: 21.08.2025 20:42π° 1 source, 1 articleShow sources
- Hackers Abuse VPS Infrastructure for Stealth, Speed β www.darkreading.com β 21.08.2025 20:42
-
The attacks involved deleting emails referencing 'invoice documents' and creating inbox rules to conceal malicious activity.
First reported: 21.08.2025 20:42π° 1 source, 1 articleShow sources
- Hackers Abuse VPS Infrastructure for Stealth, Speed β www.darkreading.com β 21.08.2025 20:42
-
The attackers aimed to remain undetected while potentially setting the stage for data exfiltration or spam distribution.
First reported: 21.08.2025 20:42π° 1 source, 1 articleShow sources
- Hackers Abuse VPS Infrastructure for Stealth, Speed β www.darkreading.com β 21.08.2025 20:42
Similar Happenings
APT41 Targets U.S. Trade Officials in Cyber Espionage Campaign
The House Select Committee on China has issued a warning about ongoing cyber espionage campaigns by China-linked APT41 targeting U.S. trade officials and related organizations. The attacks involve phishing emails impersonating U.S. officials to steal sensitive information. The campaign coincides with contentious U.S.-China trade negotiations. The threat actors exploit software and cloud services to cover their tracks. The attacks aim to steal valuable data and gain unauthorized access to systems. The committee has noted similar tactics used in previous campaigns, including a January 2025 spear-phishing attempt targeting committee staffers. The FBI is investigating the ongoing cyber espionage campaign. APT41 has been known to conduct financially motivated activities in addition to state-sponsored espionage. The group has targeted various sectors, including logistics, utilities, healthcare, high-tech, and telecommunications. The committee recommends user awareness phishing training, mandatory multifactor authentication, FIDO keys, and appropriate email gateway and endpoint security tools to mitigate such attacks.
TOR-based Cryptojacking Campaign Targets Misconfigured Docker APIs
A new variant of a TOR-based cryptojacking campaign targets misconfigured Docker APIs to propagate malware. The attack chain involves exploiting exposed Docker instances to deploy XMRig miners and reconnaissance tools. The malware also scans for additional ports and attempts to propagate via Telnet and Chromium remote debugging ports. The campaign may be setting up a complex botnet. The attack leverages Base64-encoded payloads and TOR domains for anonymity. It includes a dropper written in Go that parses user login information and uses Masscan for further propagation. The malware's source code includes an emoji, suggesting it may have been crafted using a large language model (LLM). The attackers mount the host root to the fresh container, allowing them to manipulate the host system and escape the container. The attackers modify the SSH configuration of the host system to elevate privileges and provide backdoor access. The attackers create a cron job that executes every minute to block access to the Docker APIβs port 2375, denying other attackers future access to the exposed instance. The threat actors deploy tools to perform mass scans for other open 2375 ports, which are used for malware propagation through the creation of new containers using the identified exposed APIs. The malware installs curl and tor, launches a Tor daemon, and waits for confirmation of the connection by accessing Amazon's checkip.amazonaws.com service over a SOCKS5 proxy. The malware appends an attacker-controlled public key to /root/.ssh/authorized_keys on the mounted host filesystem to enable persistent SSH access. The malware writes a base64-encoded cron job on the host, which executes every minute and blocks external access to port 2375 using available firewall utilities. The malware downloads a Zstandard-compressed Go binary over Tor, decompresses it, and runs it as a dropper. The Go binary parses the hostβs utmp file to identify logged-in users. The malware attempts to infect other exposed Docker APIs and removes competitor containers after gaining access. The malware includes inactive logic for exploiting Telnet (port 23) using default router credentials and for interacting with Chromeβs remote debugging interface (port 9222). The malware's behavior suggests it is an initial version of a complex botnet with capabilities for lateral movement, persistence, and potential future expansion for credential theft and browser hijacking. The campaign highlights the importance of securing Docker APIs and segmenting networks to prevent such attacks.
Kazakhstan's KazMunayGas Phishing Test Mistaken for Noisy Bear Campaign
Kazakhstan's state-owned oil and gas company KazMunayGas conducted a phishing test in May 2025, which was initially misinterpreted as a cyber espionage campaign by a new threat group named Noisy Bear. The test involved phishing emails targeting KazMunayGas employees with fake documents related to internal communications and policy updates. The phishing emails were sent from a compromised internal email address and included a ZIP attachment with a Windows shortcut (LNK) downloader, a decoy document, and a README.txt file with instructions. The campaign was designed to mimic official internal communications and included themes such as policy updates, internal certification procedures, and salary adjustments. The phishing test was conducted to train employees on identifying and responding to phishing attempts. However, it was mistakenly reported as a cyber espionage campaign by Seqrite Labs, which attributed the activity to a new threat group tracked as Noisy Bear. The threat actor was believed to be of Russian origin and had been active since at least April 2025. The misinterpretation led to speculation about the involvement of a new threat group and the use of sophisticated malware, including a PowerShell loader dubbed DOWNSHELL and a DLL-based implant. The threat actor used a compromised email address belonging to a KazMunayGas finance department employee to send phishing emails. The phishing emails impersonated mundane company business, including reviewing work schedules, incentive systems, and wages. The phishing emails contained a ZIP file with a decoy document and a shortcut (LNK) file named "Salary Schedule.lnk." The LNK file downloaded a batch script, which retrieved the attackers' PowerShell loader named DownShell. DownShell consists of two scripts: one for anti-analysis by undermining the Windows Antimalware Scan Interface (AMSI), and another for CreateRemoteThread Injection to establish a reverse shell. Noisy Bear used a sanctioned Russian bulletproof hosting provider, Aeza Group, to maintain its infrastructure. The threat activity carries geopolitical implications, targeting Kazakhstan's largest oil and gas company, which is state-owned and a significant economic entity. Seqrite Labs found infrastructure and tooling overlaps across other Central Asian attacks, indicating a broader campaign. The incident highlights the importance of clear communication and coordination between cybersecurity researchers and organizations to avoid misinterpretations and ensure accurate reporting of cyber threats.
GhostRedirector Compromises 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module
GhostRedirector, a previously undocumented threat cluster, has compromised at least 65 Windows servers primarily in Brazil, Thailand, and Vietnam. The attacks, active since at least August 2024, deployed the Rungan backdoor and Gamshen IIS module. Rungan executes commands on compromised servers, while Gamshen manipulates search engine results for SEO fraud. The threat actor targets various sectors, including education, healthcare, technology, transportation, insurance, and retail, using SQL injection vulnerabilities for initial access. The group is assessed with medium confidence to be China-aligned. The operation involves using PowerShell to download malware tools and exploits like EfsPotato and BadPotato for privilege escalation.
Malicious link spreading via X's Grok AI
Threat actors exploit X's Grok AI to bypass link posting restrictions and spread malicious links. They embed links in the 'From:' metadata field of video ads, prompting Grok to reveal the links in replies. This technique, dubbed 'Grokking,' boosts the credibility and reach of malicious content, leading users to scams and malware. The abuse affects millions of users, with Grok's trusted status amplifying the spread of malicious ads. Potential solutions include scanning all fields, blocking hidden links, and sanitizing Grok's responses to prevent it from echoing malicious links. The malicious links are part of a Traffic Distribution System (TDS) used by malicious ad tech vendors, and the operation involves hundreds of organized accounts. The Grok 4 model's security is fundamentally weaker than its competitors, relying heavily on system prompts that can be easily bypassed.