A malicious campaign named Phantom Enigma targets Brazilian users primarily through phishing emails distributing malicious browser extensions and Mesh Agent malware. The attackers use compromised company servers to send phishing emails and deploy sophisticated scripts to capture banking credentials, focusing on Banco do Brasil customers. #PhantomEnigma #MeshAgent #BancoDoBrasil
Keypoints
- The Phantom Enigma campaign has been active since early 2025, mainly targeting users in Brazil but also affecting companies in Colombia, Czech Republic, Mexico, Russia, Vietnam, and others.
- Attackers distribute malware via phishing emails that either contain malicious attachments or links directing victims to download files from attacker-controlled open directories.
- The campaign uses a malicious browser extension for Google Chrome, Microsoft Edge, and Brave browsers to intercept and steal sensitive banking information, specifically targeting Banco do Brasil customers.
- Two main attack chains are used: one deploying malicious browser extensions and the other involving remote administration malware like Mesh Agent and PDQ Connect Agent for wider network compromise.
- The malicious PowerShell and BAT scripts perform virtualization checks, disable User Account Control (UAC), maintain persistence via registry modifications and shortcut alterations, and communicate with C2 servers to receive instructions.
- Attack infrastructure includes multiple malicious domains and IP addresses, some sharing TLS certificates, facilitating stealthy command and control and data exfiltration.
- Approximately 70 unique victim companies were identified, and the malicious extension was downloaded over 700 times from the Chrome Web Store before removal.
- Attackers abuse compromised companiesâ servers to send phishing emails, increasing the success rate of infections while focusing on Brazilian bank authentication credential theft.
MITRE Techniques
- [T1583.001] Acquire Infrastructure: Domains â Attackers used domains such as .clientepj.com to host open directories for malware distribution (âdomains .clientepj.com for the open directoryâ).
- [T1583.004] Acquire Infrastructure: Server â Attackers acquired hosting services and set up web servers to distribute malware (âacquired a hosting service and set up a web serverâ).
- [T1588.001] Obtain Capabilities: Malware â Development of PowerShell and BAT scripts to install malicious browser extensions (âattackers developed PowerShell and BAT scriptsâ).
- [T1608.001] Stage Capabilities: Upload Malware â Malicious files including PowerShell scripts were placed in open directories during the attack (âplaced malicious files in the open directoryâ).
- [T1585.002] Establish Accounts: Email Accounts â Use of pre-created Gmail accounts to distribute phishing emails (âattackers used pre-created Gmail accountsâ).
- [T1566.001] Phishing: Spearphishing Attachment â Phishing emails contained malicious archives prompting victims to execute them (âphishing emails containing a malicious archiveâ).
- [T1566.002] Phishing: Spearphishing Link â Phishing emails with links to download malicious files from attacker-controlled sites (âphishing emails with a link to download a malicious fileâ).
- [T1059.001] Command and Scripting Interpreter: PowerShell â PowerShell scripts executed to install malicious extensions (âexecuted a PowerShell script to load a malicious extensionâ).
- [T1059.003] Command and Scripting Interpreter: Windows Command Shell â BAT scripts used to check system services and download PowerShell scripts (âBAT scripts checking Warsaw Technology presenceâ).
- [T1059.007] Command and Scripting Interpreter: JavaScript â JavaScript code modified browser shortcuts to load malicious extensions (âused JavaScript code to modify LNK filesâ).
- [T1204.002] User Execution: Malicious File â Victims required to execute one of several file types to trigger the attack (âvictim run a file in one of three formatsâ).
- [T1547.001] Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder â Persistence gained via registry key PWSecurity added to startup (âadds itself to the startup by modifying registryâ).
- [T1547.009] Boot or Logon Autostart Execution: Shortcut Modification â Modified LNK files to launch browsers with malicious extensions (âused LNK files to launch browsers and deploy extensionâ).
- [T1176] Browser Extensions â Malicious browser extension used to collect and exfiltrate victim data (âused a malicious browser extensionâ).
- [T1546.016] Event Triggered Execution: Installer Packages â Malicious MSI files signed to masquerade as legitimate applications (âsigned malicious files as government ministry appâ).
- [T1497.001] Virtualization/Sandbox Evasion: System Checks â Scripts check for virtualization environments to evade analysis (âused PowerShell to check for virtualizationâ).
- [T1548.002] Abuse Elevation Control Mechanism: Bypass User Account Control â Script disables UAC for stealthy execution (âdisable UAC by changing EnableLUA registry valueâ).
- [T1036.001] Masquerading: Invalid Code Signature â Use of fake digital signatures to disguise malware (âsigned malicious files to disguiseâ).
- [T1070.004] Indicator Removal: File Deletion â REMOVEKL command removes script files and terminates processes (âattackers used REMOVEKL to delete scriptsâ).
- [T1070.009] Indicator Removal: Clear Persistence â Removal of autostart registry values to clear persistence (âattackers used REMOVEKL commandâ).
- [T1007] System Service Discovery â BAT script checks for presence of Warsaw Technology service to identify Brazilian targets (âcheck for Warsaw Technologyâ).
- [T1083] File and Directory Discovery â JavaScript scans user directories to find and modify browser shortcut files (âused JavaScript to scan user directories for .lnk filesâ).
- [T1056.003] Input Capture: Web Portal Capture â Malicious extension captures user input from banking web portals (âused extension to collect data from banking systemsâ).
- [T1071.001] Application Layer Protocol: Web Protocols â HTTP protocol used for command and control communication (âused HTTP protocol to transmit stolen dataâ).
- [T1105] Ingress Tool Transfer â PowerShell downloads additional scripts from attacker servers (âInvoke-WebRequest used to download PowerShell scriptâ).
Indicators of Compromise
- [IP Address] Command and control and malware hosting â 142.54.185.178, 107.174.231.26
- [Domain] Malicious infrastructure domains used for hosting and control â computadorpj.com, clientepj.com, financial-executive.com, atual2025.com, ranchocentral.com, servidor2025.com
- [File Hashes] Malicious installer and script samples â examples include MD5: 0353a0dbc9f016da09303ee1a3b75d2f57, SHA-256: 5354498bae3cce0cbe6a0227ed33fe566f0e8fe4780f2a57743acc98f6859740d
- [File Names] Malicious script and extension files â cliente.ps1 (PowerShell script), cliente.bat (BAT script), nplfchpahihleeejpjmodggckakhglee (malicious Chrome extension ID)
- [URLs] Malicious phishing and C2 URLs â https://enota.clientepj.com/cliente.ps1, https://financial-executive.com/comando_temporario.php
- [Extension IDs] Malicious Chrome Web Store extension identifiers â nplfchpahihleeejpjmodggckakhglee, cckjdiimhlanonhceggkfjlmjnenpmfm, lkpiodmpjdhhhkdhdbnncigggodgdfli
Read more: https://global.ptsecurity.com/analytics/pt-esc-threat-intelligence/operation-phantom-enigma