As a part of a new spear-phishing campaign that started on October 21, 2022, an unknown threat actor behind the RomCom Remote Access Trojan (RAT) has been observed targeting Ukrainian military institutions as well as American, Brazilian, and Pilipino IT companies, food brokers, and food manufacturing entities. In this campaign, the actor used a phishing email with an embedded link as the initial infection vector. This link then led to a fake website with the next stage downloader that was signed using a valid digital certificate from “Blythe Consulting sp. Z o. o.”. This downloader then extracted and ran the RomCom RAT, which can harvest information, capture screenshots, and exfiltrate data to a remote server.
Prior to this campaign, the actor was seen spoofing legitimate applications such as “Advanced IP Scanner” and “pdfFiller” and hosting them on malicious websites. These spoofed applications would then also go on to deploy the RomCom RAT. This marks a change in the actor’s tactics, switching from less targeted spoofed applications to a more targeted spear-phishing campaign. While there were not many similarities between the campaigns other than the use of the RomCom RAT, both campaigns were able to be attributed to the group as the “pdfFiller” application used the same signer as was seen in the most recent campaign.