Fake zoom ends in blacksuit ransomware

Intel Name: Fake zoom ends in blacksuit ransomware

Date of Scan: April 1, 2025

Impact: High

Summary:
The threat actor gained initial access via a fake Zoom installer, deploying d3f@ckloader and IDAT loader to drop SectopRAT. After nine days, SectopRAT delivered Cobalt Strike and Brute Ratel, enabling lateral movement through remote services and RDP. To facilitate RDP movement, the attacker used QDoor, a malware with proxy capabilities. They archived files with WinRAR, uploaded them to the cloud SaaS app Bublup, and finally executed BlackSuit ransomware across all Windows systems using PsExec.

More Details