Major Cyber Attacks in March 2026: OAuth Phishing, SVG Smuggling, Magecart, and More
March 2026 saw a surge in sophisticated, multi-stage cyber attacks designed to evade early detection. Key threats included OAuth device code phishing (EvilTokens) for M365 account takeover, registry-hidden RAT staging (RUTSSTAGER), macOS backdoors delivered via ClickFix lures, and resilient botnets utilizing Dead Drop Resolvers.
Authors: ANY.RUN
Source:
ANY.RUN
- domainsinger-bodners-bau-at-s-account[.]workers[.]devMalicious Cloudflare worker domain used in EvilTokens phishing infrastructure.
- registry_keyHKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\rutsdll32Registry key used by RUTSSTAGER to store its hidden DLL payload in hexadecimal format.
- urlhxxps://api[.]telegram[.]org/bot7720823275:AAHXIMgPloaq9f8RlyphBrGPOUfjorbfaY4/sendMessageTelegram Bot API URL used for credential exfiltration in Fake PDF HTML phishing.
- urlmicrosoft.com/deviceloginLegitimate Microsoft URL abused as a lure in EvilTokens OAuth phishing campaigns.
Key Takeaways
- EvilTokens campaign abuses Microsoft OAuth Device Code flow for credential-less account takeover, bypassing traditional phishing defenses.
- macOS ClickFix campaigns are delivering an upgraded AMOS Stealer equipped with an interactive reverse shell backdoor.
- RUTSSTAGER malware hides its DLL payload as a hexadecimal string in the Windows registry to deploy OrcusRAT.
- Magecart campaigns are utilizing WebSocket-based exfiltration to steal payment data from hijacked e-commerce checkout flows.
- Kamasers DDoS botnet utilizes Dead Drop Resolvers (GitHub, Telegram, Dropbox) for resilient command-and-control infrastructure.
Affected Systems
- Microsoft 365
- macOS
- Windows 10/11
- e-commerce websites (Spain focused)
- Organizations in Colombia (Government, Finance, Healthcare)
Attack Chain
Attackers employ various initial access vectors, including OAuth device code phishing (EvilTokens), ClickFix lures targeting developers, and SVG smuggling via email attachments. Once executed, payloads like AMOS Stealer, OrcusRAT, or MicroStealer are deployed using multi-stage loaders, registry-hidden DLLs, or nested archives. Persistence is established via backdoors or watchdog processes, followed by data exfiltration via WebSockets, Telegram bots, or direct C2 communication.
Detection Availability
- YARA Rules: No
- Sigma Rules: No
- Snort/Suricata Rules: No
- KQL Queries: No
- Splunk SPL Queries: No
- EQL Queries: No
- Other Detection Logic: Yes
- Platforms: ANY.RUN TI Lookup
The article provides ANY.RUN Threat Intelligence Lookup queries to find related infrastructure and sandbox sessions for the discussed campaigns.
Detection Engineering Assessment
EDR Visibility: Medium — Techniques like registry-hidden DLLs (RUTSSTAGER) and fileless execution (SVG Smuggling) evade basic file scanning, but EDRs can catch the behavioral chain such as PowerShell spawning from unusual parents or registry modifications. Network Visibility: High — Many campaigns rely on distinct network indicators, such as WebSocket exfiltration, Telegram API calls, or specific HTTP headers (X-Antibot-Token). Detection Difficulty: Moderate — While initial payloads are heavily obfuscated or use legitimate services (OAuth, Telegram, GitHub), the subsequent behaviors (registry staging, reverse shells, specific API calls) provide solid detection opportunities.
Required Log Sources
- Process Creation (Event ID 4688 / Sysmon 1)
- Registry Events (Sysmon 12, 13, 14)
- Network Connections (Sysmon 3)
- HTTP/Proxy Logs
Hunting Hypotheses
| Hypothesis | Telemetry | ATT&CK Stage | FP Risk |
|---|---|---|---|
| Look for HTTP requests containing the 'X-Antibot-Token' header communicating with non-standard or newly registered domains, indicating potential EvilTokens phishing infrastructure. | HTTP/Proxy Logs | Initial Access | Low |
| Monitor for large hexadecimal blobs being written to the Windows Registry, particularly under HKLM\SOFTWARE\WOW6432Node\Microsoft, which may indicate RUTSSTAGER activity. | Registry Events | Defense Evasion | Low |
| Identify outbound network connections to api.telegram.org/bot* originating from web browsers or document readers, suggesting credential exfiltration. | Network Connections, Proxy Logs | Exfiltration | Medium |
| Detect PowerShell execution querying Get-MpComputerStatus for RealTimeProtectionEnabled or IsTamperProtected, often used by malware to check AV status. | Process Creation, PowerShell Script Block Logging | Discovery | Low |
Control Gaps
- Traditional email filtering (bypassed by SVG smuggling and legitimate OAuth links)
- File-based AV (bypassed by registry-stored DLLs)
Key Behavioral Indicators
- X-Antibot-Token header
- Hexadecimal DLLs in Registry
- WebSocket connections from checkout pages
- PowerShell checking MpComputerStatus
False Positive Assessment
- Medium (Some network indicators like connections to GitHub, Dropbox, or Telegram are common in enterprise environments and require correlation with suspicious parent processes or specific URI patterns to reduce noise.)
Recommendations
Immediate Mitigation
- Block known malicious domains and IPs associated with EvilTokens, Kamasers, and MicroStealer.
- Search endpoint telemetry for RUTSSTAGER registry keys and AMOS Stealer file paths.
Infrastructure Hardening
- Enforce strict Conditional Access policies for Microsoft 365 to mitigate OAuth token abuse.
- Implement network segmentation to limit the impact of compromised macOS developer machines.
User Protection
- Deploy EDR solutions capable of monitoring registry modifications and in-memory execution.
- Restrict the execution of HTA and JS files from downloaded archives.
Security Awareness
- Train users to recognize OAuth device code phishing and verify the source of verification codes.
- Educate developers on the risks of running terminal commands from unverified documentation pages (ClickFix).
MITRE ATT&CK Mapping
- T1566.002 - Phishing: Spearphishing Link
- T1566.001 - Phishing: Spearphishing Attachment
- T1528 - Steal Application Access Token
- T1112 - Modify Registry
- T1059.001 - Command and Scripting Interpreter: PowerShell
- T1059.007 - Command and Scripting Interpreter: JavaScript
- T1027.006 - Obfuscated Files or Information: HTML Smuggling
- T1056.003 - Input Capture: Web Portal Capture
- T1567.002 - Exfiltration Over Web Service: Exfiltration to Cloud Storage
- T1102.001 - Web Service: Dead Drop Resolver
- T1498 - Network Denial of Service
Additional IOCs
- Ips:
45[.]94[.]47[.]204- AMOS Stealer C2178[.]16[.]54[.]87- Kamasers C2
- Domains:
dibafef289[.]workers[.]dev- EvilTokens phishing infrastructureab-monvoisinproduction-com-s-account[.]workers[.]dev- EvilTokens phishing infrastructuresubzero908[.]workers[.]dev- EvilTokens phishing infrastructuresandra-solorzano-duncanfamilyfarms-net-s-account[.]workers[.]dev- EvilTokens phishing infrastructuretyler2miler-proton-me-s-account[.]workers[.]dev- EvilTokens phishing infrastructureshark-app-5wkz2[.]ondigitalocean[.]app- EvilTokens related infrastructureauthsoftverifyappsoftcodeauths[.]powerappsportals[.]com- EvilTokens related infrastructuredynamic-entry[.]powerappsportals[.]com- EvilTokens related infrastructureemail-internals[.]powerappsportals[.]com- EvilTokens related infrastructuredocusign[.]powerappsportals[.]com- EvilTokens related infrastructureclaude-download[.]squarespace[.]com- macOS ClickFix fake documentation luredownload-version[.]1-4-9[.]com- macOS ClickFix payload deliverytokio11[.]dynuddns[.]net- Vjw0rm C2 domain from SVG Smuggling campaignvapoclope[.]fr- Compromised e-commerce site targeted by Magecartryxuz[.]com- Kamasers related domainsilencestress[.]st- Kamasers related domainvrcpluginhub[.]com- MicroStealer lure domainswordfull[.]com- MicroStealer related domainlimewire[.]com- MicroStealer related domain (abused legitimate service)yuboapp[.]com- MicroStealer related domainnightslump[.]com- MicroStealer related domainkitsucraft[.]com- MicroStealer related domain
- Urls:
/api/device/start- API endpoint used in EvilTokens phishing flow/api/device/status/*- API endpoint used in EvilTokens phishing flow
- File Hashes:
57ce6187be65c1c692a309c08457290ae74a0047304de6805dbb4feb89c0d7e5(SHA256) - RUTSSTAGER related payload6a581c3b6fe7847bb327f5d76e05653a1504e51023454c41835e5dc48bc13ba4(SHA256) - RUTSSTAGER related payload7d157366d74312965912a35cbba4187532cfeb3b803119a3a04c9ba0ba7d4ab0(SHA256) - RUTSSTAGER related payload07f56ac8b5bd7cdb4c33ea5e9cd42bc7f9d3cd5504aabbb476ef010a142d7e29(SHA256) - RUTSSTAGER related payloada6f72590792b3f26271736e5a7ba80102292546bb118cf84ff29df99341abfbe(SHA256) - RUTSSTAGER related payloadE7C0AE330A37A276C4B0B9B342356CF4(MD5) - Fake PDF HTML phishing file74C08B3347E7017E4F3B9D521F5A7477(MD5) - Kamasers payload34261E80D3EA1687AA556E63AF5B88D9(MD5) - Kamasers payloadD93555FE2E98A887C0B7627C8C6D22DD(MD5) - Kamasers payload3FDF0D0A854AD9F4A48B3D1512527912(MD5) - Kamasers payloadFA9976832B05DCC82A66E207A8E7E92C(MD5) - Kamasers payload0E3F628288310858D95EF874E3054CA2(MD5) - Kamasers payload
- Registry Keys:
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\rutsdll32- RUTSSTAGER hidden DLL payload location
- File Paths:
~/.mainhelper- AMOS Stealer backdoor module for interactive reverse shell/private/tmp/20276/FileGrabber/Cookies.binarycookies- AMOS Stealer staging directory for stolen cookiespdf.htm- Fake PDF HTML phishing attachment nameFAC0025487.PDF.html- Fake PDF HTML phishing attachment nameRADMISEDR_Revision_Caso_JUZGADO_1.pdf_F2ABEB.svg- SVG Smuggling attachment nameNotificacion Fiscal.js- Payload dropped via SVG Smugglingradicado.hta- Payload dropped via SVG SmugglingJ0Ogv7Hf.ps1- PowerShell script executed in SVG Smuggling chainrutsStager.exe- RUTSSTAGER initial executablerutsOrcus.exe- RUTSSTAGER deployed OrcusRAT executablerutsWatchdog.exe- RUTSSTAGER persistence watchdog executable
- Command Lines:
- Purpose: Check Windows Defender Real-Time Protection status | Tools:
powershell.exe| Stage: Discovery - Purpose: Check Windows Defender Tamper Protection status | Tools:
powershell.exe| Stage: Discovery
- Purpose: Check Windows Defender Real-Time Protection status | Tools:
- Other:
X-Antibot-Token- HTTP header used in EvilTokens phishing infrastructure7802226280- Telegram Chat ID used for credential exfiltration