Qilin affiliates spear-phish MSP ScreenConnect admin, targeting customers downstream
NetmanageIT OpenCTI - opencti.netmanageit.com

SUMMARY :
In January 2025, a Managed Service Provider administrator was targeted by a sophisticated phishing attack impersonating a ScreenConnect authentication alert. The attackers, affiliated with Qilin ransomware and tracked as STAC4365, used an adversary-in-the-middle technique to bypass multi-factor authentication and gain access to the MSP's ScreenConnect environment. They deployed their own ScreenConnect instance across multiple customer networks, performed reconnaissance, collected and exfiltrated data, and ultimately deployed Qilin ransomware. This attack matches a pattern of similar incidents dating back to 2022, utilizing fake ScreenConnect domains and the evilginx framework to intercept credentials and session cookies. The attackers employed various tools for lateral movement and defense evasion, including PsExec, NetExec, and WinRM.
OPENCTI LABELS :
phishing,ransomware,screenconnect,mfa bypass,supply chain,qilin,cve-2023-27532,evilginx,stac4365,msp
Open in NetmanageIT OpenCTI Public Instance with below link!
Use public read only username and password on login page.
NOTE : Use Public READ only user credentials on login page banner.
Qilin affiliates spear-phish MSP ScreenConnect admin, targeting customers downstream