Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Luna Moth: A New Breed of Cyber Extortionists Exploiting IT Help Desks to Steal Data from US Firms



A new breed of cyber extortionists, dubbed "Luna Moth," has emerged as a major threat in the cybersecurity landscape. This group of skilled hackers uses innovative tactics, including impersonating IT help desks through email, fake websites, and phone calls, to breach the security systems of law firms, financial institutions, and other organizations in the United States. With a focus on stealing data from US firms, Luna Moth's attacks are designed to deceive victims into installing remote monitoring software that grants attackers remote access to their machines. The group uses legitimate tools and typosquatted domains to evade detection, making it difficult for victims to distinguish between genuine and malicious communications. As organizations face this new threat, it is essential to stay vigilant against sophisticated attacks.

  • Luna Moth, a sophisticated data-theft extortion group, has emerged as a major threat in the cybersecurity landscape.
  • The group impersonates IT help desks through email, fake websites, and phone calls to deceive victims into installing remote monitoring and management (RMM) software.
  • Luna Moth uses legitimate tools and digitally signed applications to bypass traditional security measures and compromise systems.
  • The attackers threaten to leak stolen data publicly unless the victimized organization pays a ransom, which can range from $1 million to $8 million.
  • The group demonstrates a keen understanding of IT operations and exploits vulnerabilities in RMM software.



  • Luna Moth, a new and sophisticated data-theft extortion group, has emerged as a major threat in the cybersecurity landscape. Dubbed "Silent Ransom Group" by researchers, this group of skilled hackers has been using innovative tactics to breach the security systems of law firms, financial institutions, and other organizations in the United States.

    According to a recent report by EclecticIQ, a leading cybersecurity research firm, Luna Moth's attacks involve impersonating IT help desks through email, fake websites, and phone calls. These phishing campaigns are designed to deceive victims into installing remote monitoring and management (RMM) software from fake IT help desk sites that grant the attackers remote access to their machines.

    The report highlights that most of these domains impersonate IT helpdesk or support portals for major U.S. law firms and financial services firms, using typosquatted patterns. This tactic allows Luna Moth to masquerade as a legitimate IT service provider, making it difficult for victims to distinguish between genuine and malicious communications.

    The attackers use a range of tools, including Syncro, SuperOps, Zoho Assist, Atera, AnyDesk, and Splashtop, which are all legitimate and digitally signed. This makes them less likely to trigger any warnings from security software, as they appear to be benign applications. However, once installed, the attackers gain hands-on keyboard access, allowing them to spread to other devices and search local files and shared drives for sensitive data.

    Once valuable files have been located, Luna Moth exfiltrates them to attacker-controlled infrastructure using tools like WinSCP (via SFTP) or Rclone (cloud syncing). After stealing the data, the attackers contact the victimized organization and threaten to leak it publicly on their clearweb domain unless they pay a ransom. The ransom amount varies per victim, ranging from $1 million to $8 million.

    The stealth of these attacks is noteworthy, as they involve no malware, malicious attachments, or links to malware-ridden sites. Instead, the victims are convinced to install RMM software by impersonating IT staff, which grants the attackers remote access to their machines. This approach allows Luna Moth to bypass traditional security measures and compromise the systems of even the most secure organizations.

    The emergence of Luna Moth highlights the evolving nature of cyber threats and the need for organizations to stay vigilant against sophisticated attacks. As a group, they demonstrate a keen understanding of IT operations and the ability to exploit vulnerabilities in RMM software, which are often overlooked as benign applications.

    According to EclecticIQ's report, Luna Moth has likely registered at least 37 domains through GoDaddy to support its callback-phishing campaigns. The report also recommends that organizations consider restricting the execution of RMM tools that are not used in their environment and add indicators of compromise (IoCs) to blocklists.

    In conclusion, Luna Moth's tactics demonstrate a new level of sophistication and stealth in cyber extortion attacks. As this group continues to evolve, it is essential for organizations to remain alert and take proactive measures to protect themselves against such threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Luna-Moth-A-New-Breed-of-Cyber-Extortionists-Exploiting-IT-Help-Desks-to-Steal-Data-from-US-Firms-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/luna-moth-extortion-hackers-pose-as-it-help-desks-to-breach-us-firms/


  • Published: Mon May 5 18:58:47 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us