Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsVortex Werewolf Targets Organizations With Tor-Enabled RDP, SMB, SFTP, and SSH Backdoors
Vortex Werewolf Targets Organizations With Tor-Enabled RDP, SMB, SFTP, and SSH Backdoors
Cybersecurity

Vortex Werewolf Targets Organizations With Tor-Enabled RDP, SMB, SFTP, and SSH Backdoors

•February 9, 2026
0
GBHackers On Security
GBHackers On Security•Feb 9, 2026

Why It Matters

By combining credential‑phishing with Tor‑based persistence, Vortex Werewolf gives attackers stealthy, long‑term access to critical networks, raising the risk of espionage and lateral movement within high‑value government systems.

Key Takeaways

  • •Phishing links mimic Telegram login pages
  • •Malware drops Tor-enabled backdoor named photoshopexpress.exe
  • •OpenSSH configured for key‑only authentication
  • •Obfs4proxy hides Tor traffic from firewalls
  • •Targets Russian government and defense sectors

Pulse Analysis

The emergence of Telegram‑centric phishing reflects a broader shift toward exploiting popular messaging platforms for credential harvesting. Attackers craft convincing login facades that capture phone numbers, verification codes, and even cloud passwords, then trigger the silent download of a malicious ZIP archive hosted on services like Dropbox. This approach sidesteps traditional email attachment filters and leverages the trust users place in familiar communication tools, making it especially effective against well‑trained personnel in government and defense sectors.

Technically, Vortex Werewolf executes a LNK‑initiated PowerShell chain that first validates the environment, aborting on virtual machines or low‑activity sandboxes. Upon passing these checks, it establishes persistence via scheduled tasks and deploys renamed binaries—photoshopexpress.exe for Tor, finalcutpro.exe for OpenSSH, and visualstudiocode.exe for obfs4proxy. The custom OpenSSH server runs with key‑only authentication, while the Tor hidden service, cloaked by obfs4 bridges, tunnels RDP, SMB, SFTP and SSH traffic. This layered obfuscation bypasses conventional firewall rules and provides attackers with a stealthy, long‑term foothold for lateral movement.

For defenders, the blend of social engineering and advanced network tunneling poses a dual detection challenge. Monitoring for anomalous Tor traffic, especially obfs4 patterns, and enforcing strict multi‑factor authentication on Telegram and cloud services can disrupt the initial breach. Hardening RDP and SMB endpoints, disabling unused services, and regularly auditing scheduled tasks help mitigate post‑compromise persistence. Sharing IOCs such as the listed SHA‑256 hashes across threat‑intel platforms accelerates collective response and reduces the window of exposure for organizations targeted by this sophisticated campaign.

Vortex Werewolf Targets Organizations With Tor-Enabled RDP, SMB, SFTP, and SSH Backdoors

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...