Aman Mishra
2025-03-07 06:10:00
gbhackers.com
A sophisticated malware operation, dubbed “Phantom Goblin,” has been identified by cybersecurity researchers, highlighting the increasing use of social engineering tactics to deploy information-stealing malware.
This operation leverages deceptive techniques to trick users into executing malicious files, leading to unauthorized access and data theft.


Malware Distribution and Execution
The Phantom Goblin malware is distributed via RAR attachments, often delivered through spam emails.
These attachments contain a malicious shortcut (LNK) file disguised as a PDF document, named “document.lnk,” which is part of a RAR archive labeled “Proofs.rar.”
Once executed, the LNK file initiates a PowerShell command that silently downloads and executes additional payloads from a GitHub repository.
This ensures persistence by adding a registry entry, allowing the malware to run at system startup.
The payloads, including “updater.exe,” “vscode.exe,” and “browser.exe,” are designed to mimic legitimate applications, making them difficult to detect.
The malware primarily targets web browsers and developer tools for data theft and unauthorized system access.
It forcefully terminates browser processes to extract sensitive information such as cookies, login credentials, and browsing history.
The “updater.exe” payload steals cookies from browsers like Chrome, Brave, and Edge by enabling remote debugging, bypassing Chrome’s App Bound Encryption (ABE) for stealthy data exfiltration.
The stolen data is archived and transmitted to a Telegram channel using the Telegram Bot API.


Unauthorized Remote Access via VSCode Tunnels
Another critical aspect of the Phantom Goblin operation is its use of Visual Studio Code (VSCode) tunnels to establish unauthorized remote access.
The “vscode.exe” payload creates a VSCode tunnel, allowing threat actors to maintain control over compromised systems without triggering traditional security alerts.
According to CRIL Report, this is achieved by downloading a legitimate copy of VSCode, extracting it, and then using PowerShell scripts to create a tunnel.
The connection details are exfiltrated to a Telegram bot, enabling real-time remote access.
To mitigate these threats, users are advised to avoid opening unexpected attachments and to enable advanced email filtering.
Deploying robust endpoint protection with real-time threat detection can help identify malicious processes.
Restricting PowerShell execution and enforcing strict access controls for VSCode tunnels are also recommended.
Monitoring outbound network traffic for suspicious connections, including unusual Telegram API activity, can help detect and prevent such attacks.
By understanding these tactics, organizations can enhance their cybersecurity posture against sophisticated threats like Phantom Goblin.
Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free
Keep your files stored safely and securely with the SanDisk 2TB Extreme Portable SSD. With over 69,505 ratings and an impressive 4.6 out of 5 stars, this product has been purchased over 8K+ times in the past month. At only $129.99, this Amazon’s Choice product is a must-have for secure file storage.
Help keep private content private with the included password protection featuring 256-bit AES hardware encryption. Order now for just $129.99 on Amazon!
Help Power Techcratic’s Future – Scan To Support
If Techcratic’s content and insights have helped you, consider giving back by supporting the platform with crypto. Every contribution makes a difference, whether it’s for high-quality content, server maintenance, or future updates. Techcratic is constantly evolving, and your support helps drive that progress.
As a solo operator who wears all the hats, creating content, managing the tech, and running the site, your support allows me to stay focused on delivering valuable resources. Your support keeps everything running smoothly and enables me to continue creating the content you love. I’m deeply grateful for your support, it truly means the world to me! Thank you!
BITCOIN bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge Scan the QR code with your crypto wallet app |
DOGECOIN D64GwvvYQxFXYyan3oQCrmWfidf6T3JpBA Scan the QR code with your crypto wallet app |
ETHEREUM 0xe9BC980DF3d985730dA827996B43E4A62CCBAA7a Scan the QR code with your crypto wallet app |
Please read the Privacy and Security Disclaimer on how Techcratic handles your support.
Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.