Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
Threat actors impersonated IT support to deploy Havoc C2 framework, potentially leading to data exfiltration or ransomware attacks across multiple organizations.
Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support to deliver the Havoc command-and-control (C2) framework as a precursor to data exfiltration or ransomware attack. The intrusions, identified by Huntress last month across five partner organizations, involved the threat actors using email spam as lures, followed by a phone call from