Recent OTX pulses indicate a surge in multi-vector credential theft campaigns targeting developers, cloud infrastructure, and perimeter network devices. The threat landscape is dominated by the evolution of the Lumma Stealer family (now as the 64-bit "Remus" variant), a new cloud-native worm dubbed PCPJack, and a critical PAN-OS zero-day exploitation (CVE-2023-33538) allowing unauthenticated RCE. Concurrently, the Operation GriefLure APT campaign continues to target military and healthcare sectors in Southeast Asia using living-off-the-land techniques.
Collectively, these campaigns highlight a shift towards "credential harvesting at scale"—attacking build pipelines (NuGet), cloud control planes (K8s/Docker), and edge firewalls to harvest identities and establish persistence.
Threat Actor / Malware Profile
Lumma Stealer (Remus Variant)
- Distribution: Typosquatting malicious NuGet packages (e.g., impersonating Chinese UI libraries) and phishing campaigns.
- Behavior: A 64-bit infostealer targeting browser credentials, cryptocurrency wallets (MetaMask, Exodus), SSH keys, and local files.
- C2 Communication: Utilizes "EtherHiding" (blockchain-based C2) to evade takedowns; standard HTTPS C2 to domains like
forestoaker.comandkrondez.com. - Anti-Analysis: Employs application-bound encryption bypasses and specific checks for virtual environments.
PCPJack
- Distribution: Exploits vulnerabilities in exposed cloud infrastructure (CVE-2025-29927, CVE-2026-1357).
- Behavior: A sophisticated worm that propagates across Kubernetes and Docker environments, specifically hunting for and evicting the "TeamPCP" threat actor while stealing cloud provider credentials, AWS/GCP keys, and application passwords.
- Payload: Uses the Sliver C2 framework for post-exploitation.
CL-STA-1132 (PAN-OS Exploit)
- Distribution: Direct exploitation of PAN-OS User-ID Authentication Portal (buffer overflow).
- Behavior: Unauthenticated Remote Code Execution (RCE) with root privileges.
- Tools: Deploys EarthWorm and ReverseSocks5 for tunneling and lateral movement.
Operation GriefLure
- Targeting: Viettel (Vietnam Military Telecom) and St. Luke's Medical Center (Philippines).
- Behavior: Spear-phishing using weaponized legal documents. Uses DLL sideloading (
sfsvc.exe,360.dll) to execute payloads.
IOC Analysis
The provided indicators span multiple infrastructure types:
- Domains/URLs: Typosquatted NuGet repositories, Infostealer C2s (
dns-providersa2.com,vinte.online), and fake credential portals (lastpass-login-help.com). - File Hashes: SHA256/MD5 hashes for .NET payloads (protected with .NET Reactor), Sliver binaries, and APT loaders.
- CVEs: Critical vulnerabilities in PAN-OS and Cloud platforms (CVE-2023-33538, CVE-2025-48703).
Operational Guidance: SOC teams should ingest these hashes into EDR alerting and block the listed domains at the proxy/DNS level. The CVEs should be prioritized for immediate patching or mitigation.
Detection Engineering
---
title: Potential Malicious NuGet Package Execution
id: 6e1e9c12-b3d4-4b2e-9e5a-1f2a3b4c5d6e
description: Detects execution of processes originating from NuGet package directories or suspicious dotnet restore commands matching typosquatting patterns observed in OTX pulses.
status: experimental
date: 2026/05/08
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/6e1e9c12-b3d4-4b2e-9e5a-1f2a3b4c5d6e
tags:
- attack.supply_chain
- attack.execution
logsource:
product: windows
category: process_creation
detection:
selection:
ParentImage|endswith:
- '\nuget.exe'
- '\dotnet.exe'
Image|endswith:
- '\msbuild.exe'
- '\csc.exe'
- '\cmd.exe'
filter_legit:
CommandLine|contains:
- 'microsoft'
- 'nuget.org'
condition: selection and not filter_legit
falsepositives:
- Legitimate developer build environments
level: high
---
title: Lumma Stealer Remus Variant Browser Data Access
id: 7f2f0d23-c4e5-5c3f-0f6b-2g3b4c5d6e7f
description: Detects suspicious access to browser credential files (SQLite/Local Storage) by processes not part of the browser, indicative of infostealer activity like Lumma/Remus.
status: experimental
date: 2026/05/08
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/7f2f0d23-c4e5-5c3f-0f6b-2g3b4c5d6e7f
tags:
- attack.credential_access
logsource:
product: windows
category: file_access
detection:
selection:
TargetFilename|contains:
- '\AppData\Local\Google\Chrome\User Data\Default\Login Data'
- '\AppData\Local\Google\Chrome\User Data\Default\Cookies'
- '\AppData\Roaming\Mozilla\Firefox\Profiles'
- '\AppData\Local\BraveSoftware\Brave-Browser\User Data\Default\Login Data'
filter_main_browsers:
Image|endswith:
- '\chrome.exe'
- '\firefox.exe'
- '\brave.exe'
- '\msedge.exe'
condition: selection and not filter_main_browsers
falsepositives:
- Legitimate password managers
- Backup software
level: high
---
title: PCPJack Cloud Worm Sliver C2 Implant
id: 8g3g1e34-d5f6-6d4g-1g7c-3h4c5d6e7f8g
description: Detects execution of Sliver C2 implants or tools often associated with PCPJack cloud worm activity in Linux environments.
status: experimental
date: 2026/05/08
author: Security Arsenal
references:
- https://otx.alienvault.com/pulse/8g3g1e34-d5f6-6d4g-1g7c-3h4c5d6e7f8g
tags:
- attack.execution
- attack.command_and_control
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith:
- '/sliver'
- '/sliver-client'
- '/tmp/sliver'
selection_network:
CommandLine|contains:
- 'http://'
- 'mtls://'
condition: selection or selection_network
falsepositives:
- Authorized red team exercises
level: critical
KQL (Microsoft Sentinel)
// Hunt for malicious domains and IPs identified in OTX pulses
let IoC_Domains = dynamic(["dns-providersa2.com", "forestoaker.com", "krondez.com", "baxe.pics", "vinte.online", "coox.live", "lastpass-login-help.com"]);
let IoC_IPs = dynamic(["149.104.66.84"]);
DeviceNetworkEvents
| where RemoteUrl in (IoC_Domains) or RemoteIP in (IoC_IPs)
| extend Timestamp = TimeGenerated, DeviceName = DeviceName, InitiatingProcessAccountName = InitiatingProcessAccountName
| project Timestamp, DeviceName, InitiatingProcessFileName, RemoteUrl, RemoteIP, RemotePort, ActionType
| order by Timestamp desc
kql
// Hunt for specific file hashes associated with Lumma and PCPJack
let IoC_Hashes = dynamic([
"efb675de4b3af3dac3c9cae91075fd7cc2f4f98e",
"019e6c2cf58386039133981f3377b085fbd70c98ae8613c7c6a4f10a9f2d9824",
"b037fa1dd769891b538d9ca26131890c93e3458eec96c5354bdebe50d04a5b3d",
"e41c635e4c3514e266d143d544ad1abde5db3dcfe6cccdf9bb7a218003f8ab6a",
"197f11a7b0003aa7da58a330c2fa2a96a670de91d39ddebc7a51ac1d9404a7e6"
]);
DeviceProcessEvents
| where SHA256 in (IoC_Hashes) or MD5 in (IoC_Hashes) or SHA1 in (IoC_Hashes)
| project Timestamp, DeviceName, FileName,FolderPath, SHA256, AccountName, InitiatingProcessFileName
| order by Timestamp desc
PowerShell Hunt Script
# IOC Hunt for Operation GriefLure and Persistence Mechanisms
$MaliciousFiles = @(
"sfsvc.exe",
"360.dll"
)
$SuspiciousRegPaths = @(
"HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run",
"HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"
)
Write-Host "[*] Checking for malicious file persistence..." -ForegroundColor Cyan
foreach ($path in $SuspiciousRegPaths) {
if (Test-Path $path) {
Get-ItemProperty $path -ErrorAction SilentlyContinue |
ForEach-Object {
$regValues = $_.PSObject.Properties | Where-Object {$_.Value -is [string] -and $_.Name -notlike "PS*"}
foreach ($val in $regValues) {
foreach ($malFile in $MaliciousFiles) {
if ($val.Value -like "*$malFile*") {
Write-Host "[!] ALERT: Found IOC in Registry: $($path)\$($val.Name) -> $($val.Value)" -ForegroundColor Red
}
}
}
}
}
}
Write-Host "[*] Checking hosts file for malicious domains..." -ForegroundColor Cyan
$HostsPath = "$env:windir\System32\drivers\etc\hosts"
if (Test-Path $HostsPath) {
$content = Get-Content $HostsPath
$SuspiciousDomains = @("www.whatsappcenter.com", "dns-providersa2.com")
foreach ($line in $content) {
if ($line -notmatch "^#" -and $line -match "\d+") {
foreach ($dom in $SuspiciousDomains) {
if ($line -like "*$dom*") {
Write-Host "[!] ALERT: Found malicious domain in hosts file: $line" -ForegroundColor Red
}
}
}
}
}
Response Priorities
- Immediate: Block all listed domains and IPs at the perimeter. Patch PAN-OS devices immediately to address CVE-2023-33538. Scan developer workstations for the listed malicious NuGet package hashes.
- 24 Hours: Initiate credential rotation for cloud accounts (AWS/Azure/GCP) if PCPJack indicators are found, and enforce MFA for all VPN/SSH access. Hunt for
sfsvc.exeand360.dllas part of the GriefLure response. - 1 Week: Conduct a supply chain audit of internal NuGet feeds. Review Kubernetes/Docker logs for signs of PCPJack propagation (unusual pod creation or eviction events).
Related Resources
Security Arsenal Incident Response Managed SOC & MDR Services AlertMonitor Threat Detection From The Dark Side Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.