Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
    Cybersecurity

    Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    adminBy adminMarch 3, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack.

    The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as lures, followed by a phone call from an IT desk that activates a layered malware delivery pipeline.

    “In one organization, the adversary moved from initial access to nine additional endpoints over the course of eleven hours, deploying a mix of custom Havoc Demon payloads and legitimate RMM tools for persistence, with the speed of lateral movement strongly suggesting the end goal was data exfiltration, ransomware, or both,” researchers Michael Tigges, Anna Pham, and Bryan Masters said.

    It’s worth noting that the modus operandi is consistent with email bombing and Microsoft Teams phishing attacks orchestrated by threat actors associated with the Black Basta ransomware operation in the past. While the cybercrime group appears to have gone silent following a public leak of its internal chat logs last year, the continued presence of the group’s playbook suggests two possible scenarios.

    One possibility is that former Black Basta affiliates have moved on to other ransomware operations and are using them to mount fresh attacks, or two, rival threat actors have adopted the same strategy to conduct social engineering and obtain initial access. 

    The attack chain begins with a spam campaign aiming to overwhelm a target’s inboxes with junk emails. In the next step, the threat actors, masquerading as IT support, contact the recipients and trick them into granting remote access to their machines either via a Quick Assist session or by installing tools like AnyDesk to help remediate the problem.

    With the access in place, the adversary wastes no time launching the web browser and navigating to a fake landing page hosted on Amazon Web Services (AWS) that impersonates Microsoft and instructs the victim to enter their email address to access Outlook’s anti-spam rules update system and update the spam rules.

    Clicking a button to “Update rules configuration” on the counterfeit page triggers the execution of a script that displays an overlay asking the user to enter their password.

    “This mechanism serves two purposes: it allows the threat actor (TA) to harvest credentials, which, when combined with the required email address, provides access to the control panel; concurrently, it adds a layer of authenticity to the interaction, convincing the user the process is genuine,” Huntress said.

    The attack also hinges on downloading the supposed anti-spam patch, which, in turn, leads to the execution of a legitimate binary named “ADNotificationManager.exe” (or “DLPUserAgent.exe” and “Werfault.exe”) to sideload a malicious DLL. The DLL payload implements defense evasion and executes the Havoc shellcode payload by spawning a thread containing the Demon agent.

    At least one of the identified DLLs (“vcruntime140_1.dll”) incorporates additional tricks to sidestep detection by security software using control flow obfuscation, timing-based delay loops, and techniques like Hell’s Gate and Halo’s Gate to hook ntdll.dll functions and bypass endpoint detection and response (EDR) solutions.

    “Following the successful deployment of the Havoc Demon on the beachhead host, the threat actors began lateral movement across the victim environment,” the researchers said. “While the initial social engineering and malware delivery demonstrated some interesting techniques, the hands-on-keyboard activity that followed was comparatively straightforward.”

    This includes creating scheduled tasks to launch the Havoc Demon payload every time the infected endpoints are rebooted, providing the threat actors with persistent remote access. That said, the threat actor has been found to deploy legitimate remote monitoring and management (RMM) tools like Level RMM and XEOX on some compromised hosts instead of Havoc, thus diversifying their persistence mechanisms.

    Some important takeaways from these attacks are that threat actors are more than happy to impersonate IT staff and call personal phone numbers if it improves the success rate, techniques like defense evasion that were once limited to attacks on large firms or state-sponsored campaigns are becoming increasingly common, and commodity malware is customized to bypass pattern-based signatures.

    Also of note is the speed at which attacks progress swiftly and aggressively from initial compromise to lateral movement, as well as the numerous methods used to maintain persistence.

    “What begins as a phone call from ‘IT support’ ends with a fully instrumented network compromise – modified Havoc Demons deployed across endpoints, legitimate RMM tools repurposed as backup persistence,” Huntress concluded. “This campaign is a case study in how modern adversaries layer sophistication at every stage: social engineering to get in the door, DLL sideloading to stay invisible, and diversified persistence to survive remediation.”

    Customized Deploys Fake Havoc organizations Spam Support Tech
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleFig Security emerges from stealth with $38 million to resilience-proof enterprise security
    Next Article Gemini 3.1 Flash-Lite is the fast help you need if you’re a dev with complex data
    admin
    • Website

    Related Posts

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    Pro-Russia actors team with Iran-linked hackers in attacks

    March 3, 2026

    LexisNexis confirms data breach as hackers leak stolen files

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    4 Best Small-Business Bank Account Promotions & Bonuses of March 2026

    March 3, 2026

    Google App 17.7.63 APK Download by Google LLC

    March 3, 2026

    Google Ads API enforces daily minimum budget for Demand Gen campaigns

    March 3, 2026

    Gemini 3.1 Flash-Lite is the fast help you need if you’re a dev with complex data

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (582)
    • Privacy & Online Earning (84)
    • SEO & Digital Marketing (365)
    • Tech Tools & Mobile / Apps (719)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    4 Best Small-Business Bank Account Promotions & Bonuses of March 2026

    March 3, 2026

    Google App 17.7.63 APK Download by Google LLC

    March 3, 2026

    Google Ads API enforces daily minimum budget for Demand Gen campaigns

    March 3, 2026
    Most Popular
    • 4 Best Small-Business Bank Account Promotions & Bonuses of March 2026
    • Google App 17.7.63 APK Download by Google LLC
    • Google Ads API enforces daily minimum budget for Demand Gen campaigns
    • Gemini 3.1 Flash-Lite is the fast help you need if you’re a dev with complex data
    • Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
    • Fig Security emerges from stealth with $38 million to resilience-proof enterprise security
    • EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches
    • SEO’s 5 Stages of Grief (And How to Adapt to AI SEO)
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.