NEWS

Threat Actors Abuse NetBird in Spear-Phishing Campaign Targeting Finance Executives

By Bruce Skillern

Cybersecurity firm Trellix uncovered a sophisticated spear-phishing operation in late May 2025 that exploited NetBird, a legitimate open-source remote access platform, to infiltrate organizations worldwide.

The campaign has targeted financial executives across Europe, Africa, Canada, the Middle East, and South Asia, with companies in the banking, insurance, investment, and energy sectors especially affected (Trellix, 2025; The Hacker News, 2025). Following a detailed analysis by security firm Trellix, NetBird confirmed the attacks originated from a single malicious account that registered 197 machines, which was subsequently disabled. The total number of distinct organizations remains unknown as multiple machines could have been breached within a single entity (Trellix, 2025; NetBird, 2025).

The campaign which is being tracked by researchers, but has not yet been attributed to a known threat actor group, observed fake recruiter emails impersonating Rothschild & Co. offering “strategic opportunities” to lure victims. These messages initiated a multi-stage infection sequence designed to covertly install NetBird and OpenSSH on victim systems (Bobsguide, 2025). Despite the abuse, NetBird confirmed that no vulnerability was exploited, the attackers leveraged admin privileges gained through social engineering (NetBird, 2025).

Attack Chain

  1. Initial Lure: A phishing email posing as a Rothschild & Co recruiter contains a PDF attachment that links to a Firebase-hosted site (Trellix, 2025).
  2. CAPTCHA Gate: The phishing site hides the real URL using encrypted JavaScript, which is only revealed after solving a custom CAPTCHA (Insikt, 2025).
  3. Downloader:
    1. Stage One : Victims download a ZIP archive named Rothschild_&*Co-6745763.zip, containing a 1KB VBScript (Rothschild*&_Co-6745763.vbs). This script contacts a C2 server to retrieve and execute a secondary script (pull.vbs) using wscript.exe (The Hacker News, 2025).
    2. Stage Two: The secondary VBScript downloads a payload (trm), renames it to trm.zip, and extracts NetBird and OpenSSH MSI installers. These tools are silently installed, and their services are launched (The Hacker News, 2025).
  4. Persistence Setup: The script creates a hidden local admin account named “user” with password Bs@202122, enables RDP, schedules NetBird auto-launch on reboot, modifies firewall rules, and removes NetBird shortcuts to stay undetected (NetBird, 2025).

Mitigation Strategies

For Executives

  • Approach unsolicited job opportunities with skepticism, especially ZIP attachments.
  • Do not bypass security alerts or enable content from suspicious sources.
  • Immediately report suspicious messages to IT or security teams.

For Security Teams

  • Deploy EDR tools to monitor abnormal VBS/PowerShell use and MSIExec behavior.
  • Track creation of new local admin accounts with generic names.
  • Implement a high-priority alert for .zip files containing .vbs scripts delivered via email, especially when the VBScript is small (<5KB) and makes external network connections.
  • Continuously audit firewall modifications and scheduled task changes.
  • Integrate phishing trends and simulations into employee training (Bobsguide, 2025).

TTPs & IOCs

MITRE ATT&CK Mapping

T1566.002T1204.002T1059.005T1105
Spearphishing via LinkUser Execution (ZIP/VBS)VBScript ExecutionTool Transfer (via HTTP)
T1059.001T1218.007T1543.003T1136.001
PowerShell ExecutionSigned Binary Proxy Execution (msiexec)Windows Service CreationLocal Account Creation
T1053.005T1548.002T1112T1562.004
Scheduled Task CreationBypass UACRegistry ModificationFirewall Rule Manipulation
T1021.001T1021.004  
RDP Remote AccessSSH Remote Access  

Indicators of Compromise (IOCs)

Indicator TypeIndicator
IP Address192[.]3[.]95[.]152
Stage-0 URLhttps://googl-6c11f.firebaseapp[.]com/…
Redirect URLhttps://googl-6c11f.web[.]app/…
Stage-1 VBScriptRothschild_&_Co-6745763.vbs (53192b6ba65a6abd44f167b3a8d0e52d)
Stage-2 VBScriptpull.vbs (b91162a019934b9cb3c084770ac03efe)
Payload Archivetrm.zip
Local Admin Accountuser / Bs@202122
Servicesnetbird, sshd
Setup KeyE48E4A70-4CF4-4A77-946B-C8E50A60855A

Centripetal’s Perspective

This campaign demonstrates a blend of evasive delivery tactics and abuse of legitimate software to establish persistent access on executive endpoints. Centripetal’s network intelligence capabilities provided early visibility into the adversary’s infrastructure. Notably, the command-and-control IP address 192.3.95[.]152, used for second-stage payload retrieval, was observed and classified on June 4, 2025, with 100% detection coverage across internal threat intelligence feeds. In addition, the stage-zero and redirect domains: googl-6c11f.firebaseapp[.]com and googl-6c11f.web[.]app, were matched and covered within external DNS intelligence sources as early as May 17, 2025. This dual-layer coverage across both IP and domain observables ensured pre- and post-compromise visibility, bolstering early mitigation capabilities.

Cross-feed coverage analysis showed full threat recognition using the minimal necessary provider set. Combined with high-confidence CTI matching, this enabled effective disruption of the attack chain before adversaries could progress to lateral movement or data theft. Centripetal’s detection data underscores the importance of maintaining comprehensive coverage of remote-access infrastructure across diverse intelligence sources.

 

The NetBird spear-phishing campaign serves as a stark reminder that an attacker’s most effective tool can be one already running in the target’s environment. With persistent techniques and evasive phishing lures, the attackers demonstrated a methodical and patient approach targeting high-level executives which calls for aggressive defense-in-depth security strategies. Organizations must prioritize executive protection, enhance endpoint visibility, and institutionalize ongoing awareness training. NetBird remains a secure product; however, its abuse by attackers underlines the importance of access controls and anomaly detection across enterprise endpoints to detect adversaries who hide in plain sight.

Centripetal is also pleased to offer Penetration Testing and Vulnerability Assessment services to help organizations identify vulnerabilities and reduce risk. If interested, please contact our Professional Services team at profservs@centripetal.ai or reach out to your Centripetal Account Representative.

Resources

Tweet Article
Share Article

SIGN UP TO OUR NEWSLETTER

Experience how CleanINTERNET® can proactively protect your organization.