A financially motivated phishing campaign, tracked as Operation MoneyMount-ISO, is targeting organizations with a multi-stage attack to deploy the Phantom Stealer info-stealing malware. Researchers from Seqrite Labs report that the campaign uses Russian-language phishing emails aimed at employees in finance, accounting, and treasury departments. The attack leverages a malicious ISO disk image file attached within a ZIP archive to bypass email security filters. When the victim mounts the ISO file and executes the disguised payload, a memory-resident infection chain is initiated, ultimately deploying Phantom Stealer. The malware is capable of harvesting a wide array of sensitive data, including browser credentials, cryptocurrency wallets, and keystrokes, which is then exfiltrated to the attackers. The campaign highlights the continued trend of threat actors using container file formats like ISO to evade detection.
Operation MoneyMount-ISO is a classic phishing campaign with a modern twist to evade security controls. The primary goal is the theft of credentials and financial information for monetary gain.
The attack chain demonstrates several techniques designed to evade both automated security tools and user suspicion:
T1566.001 - Spearphishing Attachment. The use of a ZIP archive containing an ISO file is a key defense evasion tactic, as many email gateways are less likely to block these container formats compared to direct executables.T1204.002 - User Execution: Malicious File.T1055 - Process Injection helps avoid leaving traces on disk that could be detected by traditional antivirus software. The malware also includes extensive anti-analysis checks to detect sandboxes and virtual machines.T1555.003 - Credentials from Web BrowsersT1056.001 - KeyloggingT1567.002 - Exfiltration to Cloud Storage (for Discord/Telegram) and T1048.003 - Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol (for FTP).A successful infection with Phantom Stealer can have severe consequences for an organization:
explorer.exe -> [disguised_executable.exe] originating from a virtual drive is suspicious.M1017 - User Training.Configure email gateways to block ISO and other container file formats used to deliver malware.
Train users, especially in high-risk departments, to recognize and report suspicious emails with attachments.
Use EDR solutions to detect suspicious process injection and memory-resident malware.
Block outbound connections to known malicious C2 channels and unauthorized cloud services like Telegram and Discord.
Mapped D3FEND Techniques:
To counter the 'Operation MoneyMount-ISO' campaign at the entry point, organizations must implement strict File Content Rules on their email security gateways. The primary tactic is to bypass scanners by hiding a malicious executable within an ISO file, which is then zipped. Security policies should be configured to block or at least quarantine all incoming emails containing .iso, .img, .vhd, or .udf attachments, especially when they are nested within archives like .zip or .rar. For organizations with a legitimate business need for these file types, rules should be more targeted, applying this blocking policy specifically to emails from external or untrusted domains. This preventative measure disrupts the attack chain before the user is ever exposed to the malicious payload.
As a defense-in-depth measure, system administrators should harden Windows endpoints by changing the default file handler for ISO files. By default, Windows 10 and 11 automatically mount an ISO as a virtual drive when a user double-clicks it, making it easy to access the malicious executable inside. This behavior can be changed via Group Policy or registry modification to instead open ISO files with an archiving utility like 7-Zip. This forces the user to manually extract the contents, presenting the file in a less convincing way than a clean virtual drive. This extra step provides another opportunity for the user to become suspicious and for endpoint security tools to scan the extracted files before execution. This hardening technique disrupts the user-friendly feature that the attackers are abusing.
To block the final and most critical stage of the Phantom Stealer attack—data exfiltration—organizations must enforce strict Outbound Traffic Filtering at the network perimeter. The malware is known to exfiltrate data to Telegram, Discord, and FTP servers. Corporate firewalls and web proxies should be configured to block all outbound connections to the APIs for Telegram (api.telegram.org) and Discord (discord.com/api/webhooks) from all user workstations, unless there is an explicit business justification. Similarly, outbound FTP traffic should be blocked by default. This egress filtering acts as a crucial backstop; even if an endpoint is compromised, this control can prevent the stolen data from ever leaving the network, rendering the attack a failure.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats