Today, the researchers at Forcepoint X-Labs released findings on a high-volume phishing campaign leveraging the Phorpiex botnet to deliver Global Group ransomware, demonstrating how familiar file types and low-friction attack chains continue to enable high-impact compromises.
Authored by Lydia McElligott, Senior Security Researcher, Forcepoint X-Labs researchers observed the following:
- Weaponized Windows shortcut (.lnk) attachments: Attackers disguise the file as a normal document using double extensions, allowing a single click to trigger code execution.
- Stealthy multi-stage execution: The shortcut launches command-line tools that download and execute the payload with no visible installer.
- Offline “mute” ransomware: Global Group operates locally without contacting command-and-control infrastructure and generates encryption keys on the host, enabling execution even in air-gapped environments.
- No data exfiltration required: The ransomware conducts all activity locally, increasing the likelihood of evading detection strategies that rely on suspicious network traffic.
- Aggressive anti-forensics: Artifact removal and self-deletion techniques make detection and recovery particularly challenging.
Bigger Picture
This campaign highlights how long-standing malware families remain effective when paired with reliable phishing techniques, reinforcing the need for organizations to prioritize endpoint behavior monitoring rather than relying solely on network signals.
Here’s a link to the full findings: https://www.forcepoint.com/blog/x-labs/phorpiex-global-group-ransomware-lnk-phishing.
Forcepoint X-Labs Uncovers SmartScreen Evasion Campaign Abusing ScreenConnect for Persistent Remote Access
Posted in Commentary with tags Forcepoint X-Labs on February 11, 2026 by itnerdAuthored by Mayur Sewani, Senior Security Researcher, Forcepoint X-Labs researchers observed:
A campaign in which a spoofed email impersonating the U.S. Social Security Administration delivers a malicious attachment designed for silent execution and privilege escalation.
The script disables Windows SmartScreen, removes the Mark-of-the-Web, and installs a legitimate ScreenConnect client that is then abused as a Remote Access Trojan (RAT) to maintain command-and-control access.
Notably, the ScreenConnect client analyzed was signed with a certificate that had been explicitly revoked, underscoring how attackers are leveraging trusted tooling to evade detection.
The compromised host ultimately establishes encrypted communications with a remote server linked to Iranian network infrastructure, enabling data exfiltration activity.
Why This Matters
This research highlights a growing defensive challenge: attackers increasingly bypass traditional security controls by modifying system protections and repurposing legitimate IT management software. The findings reinforce the need for organizations to block revoked software, enforce strict RMM allowlists, and monitor for security-control tampering.
You can read the research here: ScreenConnect Attack: SmartScreen Bypass and RMM Abuse
Leave a comment »