Current Cyber Threats

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

Summary:
In September 2025, Arctic Wolf Labs uncovered a rare pairing between TA569’s SocGholish infrastructure and the RomCom threat group, marking the first time RomCom malware has been distributed through SocGholish’s fake-update ecosystem. The intrusion began with TA569 compromising a legitimate U.S. engineering firm’s website to deliver a FAKEUPDATE JavaScript payload, which launched a reverse shell and initiated reconnaissance. Within minutes, the operators deployed the VIPERTUNNEL Python backdoor, tested Mythic C2 connectivity, and attempted to deliver RomCom’s hardened Mythic Agent loader, a DLL that only executes on systems matching a pre-selected Active Directory domain. The targeting aligns with RomCom’s long-standing focus on organizations connected—directly or indirectly—to Ukraine. Evidence from infrastructure overlap, toolset similarity, and the victim’s profile supports Arctic Wolf’s assessment that Russia’s GRU Unit 29155 is leveraging SocGholish as an access channel. The attack was ultimately unsuccessful due to Arctic Wolf’s automated detection and quarantine of the loader. This case highlights SocGholish’s evolution from a nuisance JavaScript downloader to a high-value delivery mechanism used by nation-state operators, reinforcing the need for organizations to treat any SocGholish detection as a likely precursor to ransomware or targeted intrusion activity.


Security Officer Comments:
This incident illustrates how criminal malware-as-a-service ecosystems like SocGholish are increasingly being co-opted by state-aligned actors to achieve rapid, targeted access. TA569’s ability to mass-compromise websites and deliver finely tuned payloads gives groups like RomCom an efficient mechanism to reach victims far beyond traditional geopolitical boundaries. The use of Mythic C2, domain-validated loaders, and staged reconnaissance shows clear intent to establish durable footholds rather than opportunistic infections. The extremely short time between initial access and secondary payload delivery highlights why SocGholish should be viewed as a high-urgency threat: containment in the first minutes is often the difference between a blocked intrusion and a full compromise. This case also reinforces RomCom’s unwavering focus on Ukraine-related entities worldwide, even when the geographic link is indirect.


Suggested Corrections:

Network Security Controls:

  • Implement DNS filtering to block known bulletproof hosting ASNs.
  • Monitor for unusual PowerShell network connections.

Endpoint Security Controls:
  • Enable PowerShell logging (Script Block Logging, Module Logging, Transcription).
  • Monitor for PowerShell with encoded commands and/or detection avoidance.
  • Implement application whitelisting to prevent execution from user-writable directories.
  • Deploy memory scanning capabilities to detect in-memory payloads.
  • Enable LSA protection to reduce credential theft impact.

Detection and Monitoring:
  • Hunt for scheduled tasks created in user directories with Python.
  • Hunt for PowerShell unpacking in suspicious folders, like c:\programdata\.

Security Awareness Training
  • Organizations should issue clear, consistent direction on software update best practices.
  • Consider implementing regular user awareness training to make users aware of the typical phishing red flags.

Link(s):
https://thehackernews.com/2025/11/romcom-uses-socgholish-fake-update.html