A recent cyber attack has brought attention to the misuse of legitimate software for malicious purposes. In this incident, threat actors utilized an open-source endpoint monitoring and digital forensic tool known as Velociraptor to download and execute Visual Studio Code, potentially creating a tunnel to an attacker-controlled command-and-control server. This tactic represents a strategic shift where incident response programs are leveraged to gain a foothold without deploying traditional malware.
The attackers in this case utilized the Windows msiexec utility to download an MSI installer from a Cloudflare Workers domain, which served as a staging ground for additional tools like a Cloudflare tunneling tool and a remote administration utility called Radmin. The MSI file installed Velociraptor, which then connected to another Cloudflare Workers domain to download Visual Studio Code using an encoded PowerShell command for remote access and code execution.
Furthermore, cybersecurity experts warn organizations to monitor for unauthorized use of Velociraptor as a potential precursor to ransomware attacks. Implementing endpoint detection and response systems, monitoring for suspicious behaviors, and following best practices for system security can help mitigate this threat.
Another concerning trend involves malicious campaigns exploiting Microsoft Teams for initial access. Threat actors impersonate trusted entities to install remote access software and deliver malware to victim systems. These attacks bypass traditional email defenses by leveraging the trust associated with collaboration tools.
Security researchers emphasize the importance of monitoring audit logs, enriching signals with contextual data, and training users to recognize impersonation attempts to thwart these evolving threats. Additionally, a malvertising campaign using legitimate links combined with Active Directory Federation Services has been discovered, redirecting users to phishing pages that harvest login credentials.
As attackers continue to evolve their tactics, staying vigilant, implementing robust security measures, and educating users remain crucial in defending against cyber threats.



