← All briefs
low September 14, 2025

A Flyby on the CFO's Inbox: Spear-Phishing Campaign Targeting Financial Executives with NetBird Deployment

Source report →

The spear-phishing campaign detailed by Trellix targets CFOs and financial executives across various regions. Attackers impersonate Rothschild & Co recruiters, sending emails that entice recipients with a "leadership opportunity." These emails contain links to Firebase-hosted pages featuring custom CAPTCHA challenges. Upon completion, victims are redirected to download a ZIP file containing a VBS script. Executing this script leads to the silent installation of legitimate tools like NetBird and OpenSSH, establishment of a hidden local admin account, and activation of Remote Desktop Protocol (RDP), granting attackers persistent remote access. Notably, NetBird, an open-source WireGuard-based remote access tool, was misused in this campaign without exploiting any inherent vulnerabilities. While some infrastructure overlaps with known nation-state operations, Trellix has not attributed this activity to any specific threat group. Organizations should monitor for similar phishing tactics, especially those leveraging legitimate tools for unauthorized access, and educate stakeholders on recognizing such sophisticated social engineering attempts

URL 7
https://googl-6c11f.firebaseapp.com/job/file-846873865383.html
https://googl-6c11f.web.app/job/9867648797586_Scan_15052025-736574.html
http://192.3.95.152/cloudshare/atr/pull.pdf
http://192.3.95.152/cloudshare/atr/trm
http://onlineview-5e3cf.web.app/sharepoint/commande/rid=65476386546.html
https://web-16fe.app
https://cloud-ed980.firebaseapp.com
MD5 FILE HASH 3
53192b6ba65a6abd44f167b3a8d0e52d
4cd73946b68b2153dbff7dee004012c3
B91162a019934b9cb3c084770ac03efe
IP ADDRESS 1
192.3.95.152

Detections

Additional detection ideas (5)
  • Monitor for installation or execution of remote access tools not approved in your environment
  • Alert on unauthorized financial transactions or changes to payment configurations
  • Detect Python scripts executing from non-standard locations or with network activity
  • Monitor for C2 communication over HTTP/HTTPS to uncommon or newly registered domains
  • Detect logins from valid accounts originating from unusual locations, devices, or at abnormal times