The latest Threat Insights Report from HP Inc., analyzing data from Q3 2025, highlights a clear trend towards more sophisticated and evasive social engineering tactics. Attackers are moving beyond simple fake invoices and are now employing professionally designed animations, abusing trusted services like Discord, and crafting elaborate multi-stage attacks to bypass both technical defenses and user suspicion. These campaigns are increasingly focused on deploying information stealers, with session cookie hijacking emerging as a primary goal. The findings underscore the need for defense-in-depth security and continuous user education.
The report details several novel campaigns that demonstrate this increase in sophistication:
Animated Legal Threat Campaign: Attackers impersonated the Colombian Prosecutor's Office, sending emails with fake legal warnings. The link led to a fraudulent website featuring a slick, auto-scrolling animation that guided the victim to download a password-protected archive. This archive contained the PureRAT malware, which was installed using a DLL sideloading technique. The campaign was highly evasive, with a very low detection rate by traditional antivirus tools.
Abuse of Discord for Malware Hosting: Another campaign used Discord's Content Delivery Network (CDN) to host the Phantom Stealer malware. By hosting the payload on a trusted platform, attackers can often bypass network filtering rules. This specific attack chain was also able to bypass the Memory Integrity protection feature in Windows 11.
Fake PDF Reader Update: A classic tactic with a modern twist involved a malicious PDF that redirected users to a website masquerading as an Adobe update page. Instead of an update, the download installed a modified version of the ScreenConnect remote access tool, giving attackers persistent access to the victim's machine.
The campaigns leverage a combination of techniques to achieve their goals:
T1566 - Phishing) makes the lures more convincing.T1574.002): Loading a malicious DLL by a legitimate, signed executable to bypass application whitelisting.T1105 - Ingress Tool Transfer): Using services like Discord's CDN to host malware, making the traffic appear benign.T1539). This allows attackers to bypass MFA by stealing an active session cookie and impersonating the user.The increasing sophistication of these attacks means that even security-aware users can be tricked. A successful compromise can lead to the installation of Remote Access Trojans (RATs) like PureRAT, giving attackers full control of the system. The rise of information stealers like Phantom Stealer puts sensitive data at immediate risk, including passwords, financial information, and session cookies for corporate applications. The theft of session cookies is particularly dangerous as it can grant access to secure enterprise environments without needing to crack passwords or bypass MFA prompts.
No specific IOCs were provided in the summary reports.
Detecting these advanced threats requires looking beyond simple indicators.
cdn.discordapp.com) from non-standard applications or servers. This can be achieved with D3FEND Outbound Traffic Filtering.A multi-layered defense is essential to counter these evolving threats.
Train users to identify and report sophisticated social engineering attempts, including those that impersonate authority or use professional-looking lures.
Use network filtering to block or alert on connections to known malicious domains and monitor traffic to trusted platforms like Discord from unusual sources.
Mapped D3FEND Techniques:
Use browser isolation or sandboxing to analyze downloaded files and web content in a contained environment, preventing malware from reaching the endpoint.
Mapped D3FEND Techniques:
Deploy an EDR solution capable of detecting malicious behaviors like DLL sideloading and session cookie theft, rather than relying solely on file signatures.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats