ForensicsS | Private Detective & Digital Forensics Investigation Experts
  • info@forensicss.com

    Send Email

  • 11400 West Olympic Blvd, Los Angeles, CA 90064

  • Home
  • About Us
  • Services
    • Domestic Investigation
      • Los Angeles Private Eye
      • Infidelity Investigations
      • Asset Investigations
      • Private Detective Orange County
      • Child Custody Investigations
      • Missing Person Locates
      • Wire Fraud
      • Corporate Security Investigations
      • Surveillance Operations
      • Financial Fraud Investigations
      • Asset and Hidden Finances Investigations
      • Bug Sweep TSCM Investigation
    • Cyber Security
      • Cyber Bullying Online Investigation
      • Penetration Testing Service
      • Social Media Monitoring
      • Romance Scam Investigator
      • Cyber Stalking Investigation
      • Crypto Scam Investigation
      • Cyber Security Assessment
      • Cyber Harassment Online Investigator
      • Ransomware Attack Investigation
      • Social Media Investigator
      • Extortion Investigation services
      • Background Screening
      • Insurance Fraud Detective
      • Forensic Accounting
      • Online Identity Theft
      • Online Blackmail
      • Cell Phone Forensics
      • Automotive Forensics
      • Audio Video Forensics
      • E-Discovery
      • Computer and Cell Phone Forensics
  • Closed Cases
    • Closed Cases
    • Case Details
  • News
  • Contact
310-270-0598

Confidentiality Guaranteed

310-270-0598

Confidentiality Guaranteed

Logo

Contact Info

  • 11400 West Olympic Blvd, Los Angeles, CA 90064
  • 310-270-0598
  • info@forensicss.com

    Blog Details

      ForensicsS | Private Detective & Digital Forensics Investigation Experts > News > Uncategorized > Luna Moth extortion hackers pose as IT aid desks to breach US companies
    Luna Moth extortion hackers pose as IT aid desks to breach US companies
    05
    May
    • ForensicsS
    • 0 Comments

    Luna Moth extortion hackers pose as IT aid desks to breach US companies

    Digital forensics

    digital forensics Mothman

    The records-theft extortion team identified as Luna Moth, aka Quiet Ransom Neighborhood, has ramped up callback phishing campaigns in assaults on moral and financial institutions in the US.

    In line with EclecticIQ researcher Arda Büyükkaya, the final design of these assaults is records theft and extortion.

    Luna Moth, identified internally as Quiet Ransom Neighborhood, are threat actors who beforehand performed BazarCall campaigns in an effort to construct initial ranking entry to to company networks for Ryuk, and later, Conti ransomware assaults.

    In March 2022, as Conti started to shut down, the BazarCall threat actors separated from the Conti syndicate and fashioned a fresh operation called Quiet Ransom Neighborhood (SRG).

    Luna Moths’s most modern assaults cling impersonating IT give a enhance to by email, faux websites, and contact calls, and depend fully on social engineering and deception, and not utilizing a ransomware deployment viewed in any of the cases.

    “As of March 2025, EclecticIQ assesses with high confidence that Luna Moth has likely registered at least 37 domains through GoDaddy to support its callback-phishing campaigns,” reads the EclecticIQ document.

    “Most of these domains impersonate IT helpdesk or support portals for major U.S. law firms and financial services firms, using typosquatted patterns.”

    digital forensics Luna Moth targets in the past 12 months
    Luna Moth targets in the previous Three hundred and sixty five days
    Offer: EclecticIQ

    The most modern process spotted by EclecticIQ begins in March 2025, focused on U.S.-based organizations with malicious emails that cling faux helpdesk numbers recipients are urged to name to ranking to the bottom of non-existent concerns.

    A Luna Moth operator solutions the name, impersonating IT workers, and convinces the victim to set up some distance off monitoring & administration (RMM) gadget  from faux IT aid desk websites that presents the attackers some distance off ranking entry to to their machine.

    The faux aid desk websites set apart the most of domains that follow naming patterns esteem [company_name]-helpdesk.com and [company_name]helpdesk.com.

    digital forensics Fake IT support site
    Pretend IT give a enhance to home
    Offer: EclecticIQ

    Some instruments abused in these assaults are Syncro, SuperOps, Zoho Abet, Atera, AnyDesk, and Splashtop. These are respectable, digitally signed instruments, so they’re now not going to trigger any warnings for the victim.

    As soon as the RMM tool is set apart in, the attacker has fingers-on keyboard ranking entry to, allowing them to spread to heaps of units and search local recordsdata and shared drives for soft records. 

    Having positioned precious recordsdata, they exfiltrate them to attacker-controlled infrastructure the utilization of WinSCP (by SFTP) or Rclone (cloud syncing).

    After the records is stolen, Luna Moth contacts the victimized organization and threatens to leak it publicly on its clearweb domain unless they pay a ransom. The ransom quantity varies per victim, starting from one to eight million USD.

    digital forensics Luna Moth's victim extortion site
    Luna Moth’s extortion home
    Offer: BleepingComputer

    Büyükkaya feedback on the stealth of these assaults, noting that they cling no malware, malicious attachments, or links to malware-ridden websites. The victims merely set up an RMM tool themselves, pondering they are receiving aid desk give a enhance to. 

    As the enterprise normally makes disclose of these RMM instruments, they construct now not seem like flagged by safety gadget as malicious and are allowed to maneuver.

    Indicators of compromise (IoCs), including IP addresses and phishing domains that need to peaceable be added to a blocklist, are on hand at the bottom of EclecticIQ’s document.

    As an alternative of the domains, additionally it is often recommended to center of attention on about restricting the execution of RMM instruments that need to now not vulnerable in an organization’s environment.


    digital forensics Red Report 2025

    Learn More

    • Tags

    • cybercrime email-fraud Extortion forensics|digital-forensics hackers Investigation malware online-scam phishing-attack private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker

    Leave a Comment Cancel Reply

    Your email address will not be published.*

    Recent Posts

    • Principal aspects on DOJ investigation into Andrew Cuomo, dropped proceedings in opposition to police departments
    • UnitedHealth takes one other hit after a file that it paid off nursing homes
    • Trump administration dismisses police investigations in plenty of cities, at the side of Minneapolis
    • MARK IVANYO: Pete Hegeth’s investigation into Biden’s botched Abbey Gate withdrawal ought to dig into origins of Afghan battle
    • Bombshell Interview: Sherri Papini Now Denies Hoax, Names Her Abductor

    Recent Comments

    No comments to show.

    Categories

    • cybersecurity
    • Investigations
    • Uncategorized

    Recent Posts

    Principal aspects on DOJ investigation into Andrew Cuomo, dropped proceedings in opposition to police departments
    May 21, 2025
    Principal aspects on DOJ investigation into Andrew Cuomo, dropped proceedings in opposition to police departments
    UnitedHealth takes one other hit after a file that it paid off nursing homes
    May 21, 2025
    UnitedHealth takes one other hit after a file that it paid off nursing homes
    Trump administration dismisses police investigations in plenty of cities, at the side of Minneapolis
    May 21, 2025
    Trump administration dismisses police investigations in plenty of cities, at the side of Minneapolis

    Popular Tags

    administration Attack calls charged children Commission companies Crypto Cyber cybercrime cybercrimefraud cybercrimehacker cybersecurity digital-forensics email-fraud Extortion forensics|digital-forensics Former fraud Global government hacker hackers Investigation Korean Launches Lazarus malware malwarefraud malwarephishing-attack Million North online-scam online-scamphishing-attack Pakistani Parents Patel phishing-attack private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker regulator Trump

    Forensics – Trusted Experts in Surveillance, Cyber Security, Background Checks, and Digital Forensics across California.

    • 310-270-0598
    • info@forensicss.com
    • 11400 West Olympic Blvd, Los Angeles, CA 90064

    Explore

    • News
    • About
    • Our Services
    • Find A Person
    • Child Custody
    • Contact Us
    • Los Angeles
    • Orange County
    • San Diego

    Services

    • Cyber Security
    • Online Blackmail
    • Cell Phone Forensics
    • Domestic Investigation
    • Social Media Investigator
    • Crypto Scam Investigation

    Newsletter

    Sign up email to get our daily latest news & updates from us

    © Copyright 2021 by KRIGO