Late in January 2025, a Managed Service Supplier (MSP) administrator acquired a well-crafted phishing electronic mail containing what seemed to be an authentication alert for his or her ScreenConnect Distant Monitoring and Administration (RMM) device. That electronic mail resulted in Qilin ransomware actors having access to the administrator’s credentials—and launching ransomware assaults on the MSP’s prospects.
Sophos MDR’s menace Intelligence workforce assesses with excessive confidence that this incident might be attributed to a ransomware affiliate whose exercise is tracked by Sophos as STAC4365. The assault used related infrastructure, area naming patterns, methods, instruments, and practices to these utilized in different phishing campaigns Sophos MDR menace intelligence discovered relationship again to late 2022. These makes an attempt leveraged phishing websites constructed with the evilginx open-source adversary-in-the-middle assault framework to gather credentials and session cookies and bypass multi-factor authentication (MFA).
On this case, as in others tied to this menace cluster, the attackers used pretend ScreenConnect domains to behave as proxies to the precise ScreenConnect login course of. As soon as the administrator clicked on the login hyperlink on the e-mail to evaluate the authentication, they have been redirected to a malicious phishing website, cloud.screenconnect[.]com.ms, that masqueraded because the reputable ScreenConnect login web page. As soon as they entered their credentials into the pretend ScreenConnect website, the attackers have been in a position to intercept these inputs. Sophos believes the pretend ScreenConnect website proxied the inputs again to the reputable ScreenConnect website to confirm the credentials and seize the time-based one-time password (TOTP) despatched from ScreenConnect to the administrator by electronic mail.
After intercepting the MFA inputs, the attacker efficiently authenticated to the reputable ScreenConnect Cloud portal utilizing the administrator’s tremendous administrator account. This granted them permission to successfully do something inside this ScreenConnect occasion and led to an assault deploying Qilin.
Background: Qilin
Qilin is a Ransomware-as-a-Service program that has been in operation since 2022, beforehand working beneath the identify “Agenda.” The Qilin group recruits associates on Russian-language cybercrime boards. Based on Microsoft Menace Intelligence, these associates have grown this yr to incorporate a North Korean state actor labeled by Microsoft as “Moonstone Sleet.”
Qilin ransomware makes use of a data-leak website hosted on Tor to use stress on victims being extorted. In Could of 2024, that stress was expanded to the open web when menace actors related to Qilin ransomware launched a data-leak website named “WikiLeaksV2.” This challenge was hosted at an IP deal with supplied by a Russian Web service supplier that has been tied to command-and-control (C2) exercise, malware internet hosting, and phishing actions prior to now. The location stays lively and was linked within the ransom notes left on this incident.

Determine 2: The Qilin data-leak website hosted on Tor encompasses a QR code and hyperlink to the WikiLeaksV2 web page
Background: STAC4365
STAC4365 is related to a sample of actions and indicators held in widespread by a bunch of phishing websites relationship again to November 2022. These websites shared traits similar to URL path and website construction, and the domains related to them have centered on spoofing reputable ScreenConnect URLs.

Area | Earliest Exercise |
account.microsoftonline.com[.]ec | February 2025 |
cloud.screenconnect.com[.]ms | January 2025 |
cloud.screenconnect[.]is | November 2024 |
cloud.screenconnect.com[.]so | October 2024 |
cloud.screenconnect.com[.]bo | July 2024 |
cloud.screenconnect.com[.]cm | July 2024 |
cloud.screenconnect.com[.]am | April 2024 |
cloud.screenconnect.com[.]ly | February 2024 |
cloud.screenconect[.]com[.]mx | January 2024 |
cloud.screenconnect[.]co[.]za | January 2024 |
cloud.screenconnect[.]uk[.]com | January 2024 |
cloud.screenconnect[.]de[.]com | November 2023 |
cloud.screenconnect.com[.]se | October 2023 |
cloud.screenconnect.jpn[.]com | October 2023 |
cloud.screenconnect.com[.]ng | June 2023 |
cloud.screenconnect.com[.]ph | Could 2023 |
cloud.screenconnect.com[.]vc | Could 2023 |
cloud.screenconnect[.]cl | April 2023 |
cloud.screenconnect[.]gr[.]com | April 2023 |
cloud.screenconect[.]eu | January 2023 |
cloud.screenconnect[.]co[.]com | January 2023 |
cloud.screenconnect[.]us[.]com | January 2023 |
cloud.iscreenconnect[.]com | December 2022 |
cloud.screenconnect[.]app | November 2022 |
Determine 4: A listing of domains matching STAC4365’s sample of exercise
To provision these phishing websites, STAC4365 leverages evilginx, an open-source adversary-in-the-middle assault framework used for phishing credentials and session cookies and appearing as an MFA relay.

Evilginx2, the most recent model, features a “javascriptRedirect” function that menace actors use to selectively route site visitors. STAC4365 leverages awstrack[.]me together with JavaScript redirects to make sure that solely focused victims, accessing the phishing website through the supposed monitoring hyperlink, attain the credential-harvesting web page – whereas these visiting instantly (similar to researchers) are redirected to the reputable service portal, evading detection and evaluation. This function is widespread in different MFA phishing platforms, as demonstrated by Rockstar and FlowerStorm.
STAC4365 Qilin assault chain
Preliminary entry
The phishing lure particularly focused the MSP’s administrator account, and precisely mimicked a ConnectWise ScreenConnect login alert:

The focused administrator clicked the “Login and evaluate the safety alert” hyperlink, which took the sufferer’s browser to the phishing web page through a malicious redirect utilizing Amazon Easy Electronic mail Service (SES):
hxxps[:]//b8dymnk3.r.us-east-1.awstrack[.]me/L0/https[:]%2Fpercent2Fcloud.screenconnect[.]com.mspercent2FsuKcHZYV/1/010001948f5ca748-c4d2fc4f-aa9e-40d4-afe9-bbe0036bc608-000000/mWU0NBS5qVoIVdXUd4HdKWrsBSI=410
The redirected hyperlink resolved to the URI of a ScreenConnect-mimicking area:
hxxps[:]//cloud.screenconnect[.]com.ms/suKcHZYV/1/010001948f5ca748-c4d2fc4f-aa9e-40d4-afe9-bbe0036bc608-000000/mWU0NBS5qVoIVdXUd4HdKWrsBSI=410
This URI was used to confirm the goal; different visits to the area have been redirected to the reputable cloud.screenconnect.com. The host at cloud.screenconnect[.]com.ms (186.2.163[.]10) was seemingly configured as a reverse proxy to the reputable ScreenConnect area.
Utilizing the intercepted credentials and the MFA code, the attacker logged into the goal’s ScreenConnect subdomain via the ScreenConnect Management Panel and gained entry to the MSP’s distant administration atmosphere.
Persistence, Command and Management
Shortly after efficiently authenticating into the ScreenConnect atmosphere because the tremendous administrator account, the attacker pushed out a brand new ScreenConnect occasion utilizing a file named ‘ru.msi,’ which put in an attacker-managed ScreenConnect occasion throughout a number of of the MSP’s managed prospects.

Discovery, credential entry and lateral motion
The malicious ScreenConnect occasion was utilized in a number of buyer environments to carry out community enumeration and person discovery and reset quite a few person account credentials. The attackers additionally used the ScreenConnect occasion to variety of reputable instruments to realize entry to extra native credentials and execute distant instructions, in addition to utilized Home windows instruments, together with:
- PsExec
- exe (NetExec from GitHub)
- WinRM
- ScreenConnect occasion
Moreover, the actors downloaded a file named “veeam.exe,” an executable coded to use CVE-2023-27532, a vulnerability in the Veeam Cloud Backup service which permits an unauthenticated person to request unencrypted credentials from the native Veeam configuration database. This file’s identify, path location, and SHA256 hash are equivalent to 1 reported by Huntress in a 2023 cyberattack that additionally leveraged ScreenConnect however didn’t end in ransomware deployment.
Assortment
Following the invention and lateral motion phases, the attacker started double extortion efforts by leveraging the accounts they modified credentials for, executing WinRAR to gather information throughout a number of buyer environments.

Exfiltration
As soon as the attackers collected information using WinRAR, they exfiltrated the .rar information to easyupload.io through an Incognito tab in Google Chrome.

Protection evasion and impression
All through the incident, the attackers utilized numerous protection evasion methods to clear their tracks. When accessing EasyUpload through Google Chrome, they utilized Incognito mode to cover forensic information. In addition they eliminated instruments after execution similar to WinRAR.
Utilizing the malicious ScreenConnect occasion, the attacker made certain to establish and goal backups at a number of buyer places to forestall restoration of companies and to raised guarantee their ransom calls for have been met. Moreover, they modified numerous boot choices to make sure that the focused units would boot into Protected Mode with networking.
Lastly, they leveraged the compromised accounts to deploy Qilin ransomware throughout a number of prospects’ environments.
SophosLabs analyzed the ransomware binary retrieved by the MDR workforce. It contained the next performance:
- Cease and disable Quantity Shadow Copy Service (VSS) service
- Allow symbolic hyperlinks
- Enumerate hosts
- Delete shadow copies
- Delete Home windows Occasion Logs
- Set wallpaper to ransomware message
- Delete itself after execution
Whereas a number of buyer environments have been impacted by the identical ransomware binary, every buyer had their very own distinctive 32-character password related to the execution of the ransomware binary.
Word the completely different finish of the redacted passwords within the screenshot under:

Moreover, the readme information dropped by the ransomware had distinctive chat IDs for every buyer, indicating that the menace actor knew they have been concentrating on completely different organizations and prospects.

Suggestions for defenders
MSPs rely extensively on exterior software program and companies to satisfy their operational duties for buyer organizations. Ransomware operators goal these companies for a similar cause—they’ve turn into an more and more widespread vector for downstream assaults on MSP prospects. So it is vital for MSPs and organizations of all sizes that make the most of these companies to know the danger components related to them and take steps to mitigate them.
Attackers with legitimate administrative credentials and entry are troublesome to cease, notably in the case of the exfiltration of knowledge. However there are measures organizations can take to forestall the preliminary compromise of key credentials, and to Impede execution of ransomware..
Preliminary entry on this case was gained via focused phishing and interception of an MFA TOTP. The attackers used a lookalike area and a well-crafted electronic mail to get the goal to click on on the hyperlink. Defenders ought to incorporate assessments into organizational phishing coaching to assist customers spot lookalike and different suspicious domains. Moreover, guarantee your electronic mail resolution both flags or blocks incoming messages that fail to go a Area-based Message Authentication, Reporting and Conformance (DMARC) test.
The phishing assault on this case used an AITM phishing package to relay credentials and a TOTP to acquire a legitimate session. When attainable, organizations ought to restrict entry to company purposes and third-party companies to recognized managed units via conditional entry, and migrate to phishing-resistant authentication companies (similar to these primarily based on FIDO 2).
On this assault, the actor configured techniques to reboot in secure mode to bypass endpoint safety protections. Organizations ought to deploy safety towards secure boot restarts with out endpoint safety. Sophos prospects can do that by enabling lively assault enhancements in Sophos Central via Endpoint and Server Menace Safety insurance policies.
Indicators of compromise for STAC4365 and Qilin are supplied on the Sophos GitHub web page right here.