'Operation MoneyMount-ISO' Phishing Campaign Deploys Phantom Stealer via Malicious ISOs

Russian-Language Phishing Campaign 'Operation MoneyMount-ISO' Targets Finance Departments with Phantom Stealer Malware

HIGH
December 17, 2025
5m read
PhishingMalwareThreat Actor

Related Entities

Organizations

Seqrite Labs

Products & Tech

TelegramDiscord

Other

Phantom Stealer

Full Report

Executive Summary

A financially motivated phishing campaign, tracked as Operation MoneyMount-ISO, is targeting organizations with a multi-stage attack to deploy the Phantom Stealer info-stealing malware. Researchers from Seqrite Labs report that the campaign uses Russian-language phishing emails aimed at employees in finance, accounting, and treasury departments. The attack leverages a malicious ISO disk image file attached within a ZIP archive to bypass email security filters. When the victim mounts the ISO file and executes the disguised payload, a memory-resident infection chain is initiated, ultimately deploying Phantom Stealer. The malware is capable of harvesting a wide array of sensitive data, including browser credentials, cryptocurrency wallets, and keystrokes, which is then exfiltrated to the attackers. The campaign highlights the continued trend of threat actors using container file formats like ISO to evade detection.


Threat Overview

Operation MoneyMount-ISO is a classic phishing campaign with a modern twist to evade security controls. The primary goal is the theft of credentials and financial information for monetary gain.

  • Threat Actor: An unspecified Russian-speaking, financially motivated group.
  • Targeting: The campaign is highly targeted, with emails specifically crafted for departments that handle financial transactions, such as finance, accounting, and procurement.
  • Delivery Method: The attack begins with a phishing email, written in formal Russian, impersonating a financial entity and referencing a bank transfer. The email contains a ZIP archive with a malicious ISO file.
  • Payload: The ultimate payload is Phantom Stealer, a potent info-stealer that collects a wide variety of data from compromised systems.

Technical Analysis

The attack chain demonstrates several techniques designed to evade both automated security tools and user suspicion:

  1. Initial Access: The attack relies on T1566.001 - Spearphishing Attachment. The use of a ZIP archive containing an ISO file is a key defense evasion tactic, as many email gateways are less likely to block these container formats compared to direct executables.
  2. Execution: The user must mount the ISO file (which happens automatically on modern Windows systems) and then double-click the executable inside, which is disguised as a document. This corresponds to T1204.002 - User Execution: Malicious File.
  3. Defense Evasion: The infection chain is memory-resident. The initial loader decrypts and injects a malicious DLL into memory, which then injects the final Phantom Stealer payload. This use of T1055 - Process Injection helps avoid leaving traces on disk that could be detected by traditional antivirus software. The malware also includes extensive anti-analysis checks to detect sandboxes and virtual machines.
  4. Credential Access & Collection: Phantom Stealer performs a wide range of data theft activities:
  5. Exfiltration: The stolen data is exfiltrated to the attackers via multiple channels, including Telegram bots, Discord webhooks, and FTP servers. This aligns with T1567.002 - Exfiltration to Cloud Storage (for Discord/Telegram) and T1048.003 - Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol (for FTP).

Impact Assessment

A successful infection with Phantom Stealer can have severe consequences for an organization:

  • Financial Theft: Stolen banking credentials and cryptocurrency wallets can be used to directly steal funds from corporate or personal accounts.
  • Data Breach: The theft of browser credentials can lead to the compromise of numerous other corporate and cloud services, resulting in a wider data breach.
  • Business Email Compromise (BEC): Access to an employee's credentials, especially in the finance department, is a stepping stone to sophisticated BEC fraud.
  • Ransomware Precursor: Info-stealer infections are often sold on the dark web to other threat actors, who may use the access to deploy ransomware.

Detection & Response

  • Email Security Gateway Logs: Analyze logs for incoming emails with ZIP or ISO attachments, especially those sent to finance-related distribution lists or individuals.
  • Endpoint Detection: Monitor for the mounting of ISO files followed by the execution of an embedded executable. The process chain explorer.exe -> [disguised_executable.exe] originating from a virtual drive is suspicious.
  • Network Monitoring: Look for outbound network connections from endpoints to known malicious infrastructure, or to Telegram and Discord API endpoints that are not associated with legitimate corporate use. This is a key D3FEND Outbound Traffic Filtering (D3-OTF) strategy.
  • Memory Analysis: For suspected infections, memory forensics can be used to identify the injected Phantom Stealer payload, as the malware primarily runs in memory.

Mitigation

  1. Block Malicious Attachments: Configure email security gateways to block or quarantine emails with ISO, IMG, or VHD file attachments, or those contained within ZIP files, especially if they are from untrusted sources. This is a form of D3FEND File Content Rules (D3-FCR).
  2. User Training: Train employees, particularly in high-risk departments like finance, to be highly suspicious of unsolicited emails with payment-related themes and attachments. They should be taught to never open attachments from unknown senders and to verify suspicious requests through a separate communication channel. This is M1017 - User Training.
  3. Change File Associations: As a hardening measure, system administrators can change the default Windows file association for ISO files so that they do not automatically mount when double-clicked. Instead, they could be set to open with an archiving tool like 7-Zip, which would require the user to manually extract the contents, providing another opportunity for inspection.
  4. Endpoint Protection: Use an EDR solution capable of detecting memory-resident threats and suspicious process injection techniques.

Timeline of Events

1
December 17, 2025
This article was published

MITRE ATT&CK Mitigations

Configure email gateways to block ISO and other container file formats used to deliver malware.

Train users, especially in high-risk departments, to recognize and report suspicious emails with attachments.

Use EDR solutions to detect suspicious process injection and memory-resident malware.

Mapped D3FEND Techniques:

Block outbound connections to known malicious C2 channels and unauthorized cloud services like Telegram and Discord.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To counter the 'Operation MoneyMount-ISO' campaign at the entry point, organizations must implement strict File Content Rules on their email security gateways. The primary tactic is to bypass scanners by hiding a malicious executable within an ISO file, which is then zipped. Security policies should be configured to block or at least quarantine all incoming emails containing .iso, .img, .vhd, or .udf attachments, especially when they are nested within archives like .zip or .rar. For organizations with a legitimate business need for these file types, rules should be more targeted, applying this blocking policy specifically to emails from external or untrusted domains. This preventative measure disrupts the attack chain before the user is ever exposed to the malicious payload.

As a defense-in-depth measure, system administrators should harden Windows endpoints by changing the default file handler for ISO files. By default, Windows 10 and 11 automatically mount an ISO as a virtual drive when a user double-clicks it, making it easy to access the malicious executable inside. This behavior can be changed via Group Policy or registry modification to instead open ISO files with an archiving utility like 7-Zip. This forces the user to manually extract the contents, presenting the file in a less convincing way than a clean virtual drive. This extra step provides another opportunity for the user to become suspicious and for endpoint security tools to scan the extracted files before execution. This hardening technique disrupts the user-friendly feature that the attackers are abusing.

To block the final and most critical stage of the Phantom Stealer attack—data exfiltration—organizations must enforce strict Outbound Traffic Filtering at the network perimeter. The malware is known to exfiltrate data to Telegram, Discord, and FTP servers. Corporate firewalls and web proxies should be configured to block all outbound connections to the APIs for Telegram (api.telegram.org) and Discord (discord.com/api/webhooks) from all user workstations, unless there is an explicit business justification. Similarly, outbound FTP traffic should be blocked by default. This egress filtering acts as a crucial backstop; even if an endpoint is compromised, this control can prevent the stolen data from ever leaving the network, rendering the attack a failure.

Sources & References

Russian Phishing Campaign Delivers Phantom Stealer Via ISO Files
Infosecurity Magazine (infosecurity-magazine.com) December 15, 2025
Phantom Stealer Uses ISO Files to Breach Windows Systems
eSecurity Planet (esecurityplanet.com) December 15, 2025
Phantom Stealer Spread by ISO Phishing Emails Hitting Russian Finance Sector
The Hacker News (thehackernews.com) December 15, 2025
Illicit ISO files facilitate Phantom Stealer deployment
SC Magazine (scmagazine.com) December 16, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Phantom StealerInfoStealerPhishingISO fileMalwareFinanceCredential TheftRussian

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading