February 2025 - THOTM - Blog Cover PhotoIn February 2025, GoSecure Threat Hunters identified Rhysida, a ransomware group actively exploiting stolen VPN credentials and search engine poisoning to infiltrate corporate networks. Rhysida’s double-extortion tactics involve encrypting files while threatening to leak stolen sensitive data. The group has been observed delivering malware disguised as legitimate software, such as Microsoft Teams or Google Chrome, via poisoned search results. Once installed, the malware establishes persistence through scheduled tasks and executes via rundll32.exe, providing long-term access to compromised systems. 

Why This Matters 

Unlike conventional ransomware that solely encrypts data, Rhysida also exfiltrates personally identifiable information (PII), including passports and driver’s licenses, increasing the risk of identity theft and regulatory fines. Their search engine poisoning tactic makes it easier for unsuspecting users to install malware without realizing it. This method bypasses traditional email phishing defenses, reinforcing the need for enhanced endpoint security and user awareness. 

Detection and Monitoring 

GoSecure’s Threat Hunters hypothesized that drive-by downloads were being leveraged for persistence in corporate environments. A high-severity detection rule was implemented to monitor for suspicious software installations executing schtasks.exe and rundll32.exe: 

  • Detection Rule: Schtasks Creating Task to Execute RunDLL32
    Description: Detects when schtasks.exe is executed with “/create” and “rundll32” in the command line, a common persistence mechanism for malware. 
  • Detection Rule: PowerShell with RunDLL32 in Command Line
    Description: Flags instances where powershell.exe launches rundll32.exe, which may indicate unauthorized execution of malware. 

Recommendations 

To mitigate the risks posed by Rhysida, GoSecure recommends the following measures: 

  • Train employees to recognize misleading search results and avoid downloading software from unverified sources. 
  • Enforce multi-factor authentication (MFA) on externally facing services such as VPN access points. 
  • Monitor scheduled tasks and system binaries for unauthorized modifications. 
  • Review endpoint logs for suspicious rundll32.exe executions originating from newly installed software. 

Conclusion 

This month’s Threat Hunt highlights the growing use of search engine poisoning as an attack vector and the importance of proactive threat hunting to uncover ransomware activity before encryption occurs. GoSecure Titan® MXDR continuously monitors, detects, and mitigates emerging ransomware threats, ensuring organizations remain protected. 

For further details on strengthening your defenses or to discuss our findings, please contact us at (888)-287-5858 or info@gosecure.ai. 

Stay secure!
Your GoSecure Threat Hunting Team 

GoSecure Titan® Managed Extended Detection & Response (MXDR)​

GoSecure Titan® Managed Extended Detection & Response (MXDR)​ Foundation

GoSecure Titan® Vulnerability Management as a Service (VMaaS)

GoSecure Titan® Managed Security Information & Event Monitoring (Managed SIEM)

GoSecure Titan® Managed Perimeter Defense​ (MPD)

GoSecure Titan® Inbox Detection and Response (IDR)

GoSecure Titan® Secure Email Gateway (SEG)

GoSecure Titan® Threat Modeler

GoSecure Titan® Identity

GoSecure Titan® Platform

GoSecure Professional Security Services

Incident Response Services

Security Maturity Assessment

Privacy Services

PCI DSS Services

Penetration Testing Services​

Security Operations

MicrosoftLogo

GoSecure MXDR for Microsoft

Comprehensive visibility and response within your Microsoft security environment

USE CASES

Cyber Risks

Risk-Based Security Measures

Sensitive Data Security

Safeguard sensitive information

Private Equity Firms

Make informed decisions

Cybersecurity Compliance

Fulfill regulatory obligations

Cyber Insurance

A valuable risk management strategy

Ransomware

Combat ransomware with innovative security

Zero-Day Attacks

Halt zero-day exploits with advanced protection

Consolidate, Evolve & Thrive

Get ahead and win the race with the GoSecure Titan® Platform

24/7 MXDR FOUNDATION

GoSecure Titan® Endpoint Detection and Response (EDR)

GoSecure Titan® Next Generation Antivirus (NGAV)

GoSecure Titan® Security Information & Event Monitoring (SIEM)

GoSecure Titan® Inbox Detection and Reponse (IDR)

GoSecure Titan® Intelligence

OUR SOC

Proactive Defense, 24/7

AICPA SOC Logo - Black

ABOUT GOSECURE

GoSecure is a recognized cybersecurity leader and innovator, pioneering the integration of endpoint, network, and email threat detection into a single Managed Extended Detection and Response (MXDR) service. For over 20 years, GoSecure has been helping customers better understand their security gaps and improve their organizational risk and security maturity through MXDR and Professional Services solutions delivered by one of the most trusted and skilled teams in the industry.

EVENT CALENDAR

LATEST PRESS RELEASE

GOSECURE BLOG

SECURITY ADVISORIES

 24/7 Emergency – (888)-287-5858