Summary
During March 2025, our CTI team identified a campaign we are calling "Operation Deceptive Prospect". We identified this campaign by an intrusion set that we assess with high confidence to have significant technical overlap with the RomCom threat actor.
The threat actor leveraged externally facing customer feedback portals to submit phishing emails directed at customer service representatives of two Bridewell customers operating within the UK retail and hospitality, and CNI sectors. Contained within the feedback forms were user complaints pertaining to events facilities operated by the target or recruitment enquiries, including links to further information supporting the complaints stored on Google Drive and Microsoft OneDrive impersonation domains hosted threat actor-controlled VPS infrastructure.
This campaign utilises multiple redirection stages to deliver an executable downloader masking as a .pdf signed with a likely stolen or compromised code signing certificate. We have been tracking activity since 2024 and are sharing the observed activity to help organisations identify and mitigate the "Operation Deceptive Prospect" campaign.
Who is RomCom?
RomCom, also known by the aliases Storm-0978, Tropical Scorpius, UNC2596, Void Rabisu and UAC-0180, is a Russian-based threat group focused on espionage and financially motivated operations. They have been active since at least 2022. This group predominantly targets governmental and military entities, with a notable focus on organisations associated with Ukrainian affairs and bodies like NATO. Their primary operational methods include spear-phishing campaigns and the distribution of malware, which is often disguised with trojanised installers for popular legitimate software applications, ultimately aimed at intelligence gathering.
Based out of Russia, RomCom conducts a mix of cyber criminal activities, including opportunistic ransomware attacks (deploying the Underground ransomware, closely related to Industrial Spy) and extortion operations. The group also carry out targeted campaigns designed to steal credentials, likely in support of their intelligence objectives. The group is known for developing and distributing the RomCom backdoor, frequently delivered through these compromised software installers. While definitive attribution is complex, security researchers point to overlaps in tactics and infrastructure that suggest possible links or alignment with Russian state interests.
Historical Activity
Active since at least 2022, the RomCom threat actor has engaged in diverse campaigns blending cyber crime and espionage. Initially, the group was associated with deploying the Cuba ransomware through methods like malvertising and targeted phishing operations.
The RomCom backdoor itself has undergone significant evolution. By late 2023, a version dubbed RomCom 4.0 (or PEAPOD) emerged, noted for being lighter and stealthier while retaining robust command capabilities for execution, file theft, and payload delivery.
Further evolution led to the discovery of "SnipBot" (considered RomCom 5.0), with samples identified dating back to December 2023 and analysed in 2024. SnipBot introduced enhanced capabilities, including unique code obfuscation methods (window message-based control flow), new anti-sandboxing and evasion techniques, and an expanded set of 27 commands offering granular control over data exfiltration, targeting specific file types and directories, and utilising tools like 7-Zip for compression.
SnipBot campaigns, often initiated via phishing emails with links disguised as PDFs or necessary font updates, utilised signed downloaders and COM hijacking for persistence. These campaigns targeted varied sectors like IT services, legal, and agriculture, suggesting a potential shift or expansion towards espionage objectives alongside financial motives.
RomCom has demonstrated proficiency in exploiting zero-day vulnerabilities. In June 2023, the group was observed exploiting CVE-2023-36884, a vulnerability in Microsoft Word. Later, in October-November 2024, RomCom executed a sophisticated zero-click attack campaign by chaining two zero-day vulnerabilities: CVE-2024-9680 (a critical use-after-free flaw in Mozilla Firefox's animation component) and CVE-2024-49039 (a Windows privilege escalation flaw allowing escape from the Firefox sandbox).
By luring victims with vulnerable Firefox versions to specially crafted websites (often hosted on domains mimicking legitimate sites), the attackers could execute arbitrary code and install the RomCom backdoor without user interaction. Targets of this campaign were primarily located in Europe and North America. Throughout 2024, RomCom's cyber espionage operations targeted governmental entities, defense, and energy sectors in Ukraine, pharmaceutical and insurance sectors in the US, the legal sector in Germany, and other governmental bodies in Europe.
Operation Deceptive Prospect
Figure 1. STIX graph for “Operation Deceptive Prospect"
The "Deceptive Prospect" campaign targets customer feedback portals on company websites as a mechanism to deliver phishing emails containing malicious links directing customer service representatives to supporting evidence in the form of files, such as police statements.
Of the intrusion attempts delivered to Bridewell customers, we observed emails reporting stolen luggage at a hotel, recruitment enquiries, and unsatisfactory levels of facilities at a major UK airport.
The emails contained well-worded complaints with convincing personas generated to impersonate an English-speaking individual. In both cases, the threat actors utilised Yahoo email addresses to submit their portal complaints following the same format patterns:
- "[a-z]+\\.[a-z]+[0-9]{6}@yahoo.com"
- "[a-z]{6,}[0-9]{6}@yahoo.com"
Customer Feedback Portal Complaints
Figure 2. Email lure used by RomCom to target retail/hospitality sector
Figure 3. Email lure used by RomCom to target Aviation sector
The above emails were received through internet facing feedback channels where staff handle the customer complaints service mailbox. The handlers work the complaint case using the feedback. In this instance, RomCom were crafting social engineering tactics to get them to open links regarding a stolen laptop or substandard airport facilities.
We hypothesised that it is highly likely that the threat actor used Artificial Intelligence (AI) to generate email content therefore, we analysed various elements of the body structure to form an assessment. During our research into RomCom infrastructure, we later identified another intrusion attempt, during threat hunting, by the threat actor involving recruitment enquiries which was omitted from this part of the analysis.
Firstly, both emails follow a consistent formulaic structure such as "Context -> Issues -> Evidence -> Impact -> Recommendation -> Action Request." Additionally, the "Stolen Laptop" email has inconsistencies with email subject and content, such as referencing staff performance as the complaint title but the body of text refers to a lost laptop. Additionally, the Laptop email contained a "Sent from my OnePlus device" in a possible attempt to seem more convincing to the target. Both emails contained URLs attempting to impersonate Google Drive or Microsoft OneDrive, a technique we have observed RomCom utilise in historical campaigns.
Assessment Criterion | Laptop Theft Complaint | Airport Infrastructure Complaint |
Suspicious Link | Present. (gdrive-share[.]online) Non-standard domain mimicking Google Drive. Considered a very strong indicator of AI generation, phishing, or a fake example. | Present. (1dv365[.]live) Non-standard domain mimicking Microsoft 365/OneDrive. Considered a very strong indicator of AI generation, phishing, or a fake example. |
Formatting Anomalies | None significantly noted. | Present. Bizarre "3€" and "€" characters appear after list item headings. Liking an encoding issue when parsed. |
Language/ Tone | Formal, generally correct, somewhat generic complaint language. Structured but lacks strong personal voice. | Mostly formal language with a slightly awkward initial pleasantry ("hope you're doing great"). Contains plausible details but feels somewhat template driven. |
Structure | Highly logical and follows a standard complaint template (Problem, Actions, Evidence, Demands, Threat, Closing). Considered a moderate indicator. | Highly logical and follows a standard complaint template (Context, Issues, Evidence, Impact, Recommendation, Action Request). Considered a moderate indicator. |
Device Signature | Present ("Sent from my OnePlus device"). Adds a minor touch of human realism, potentially countering AI indicators slightly. | Not present in the provided text. |
Figure 4. Table showing structural comparisons between analysed lures
Pillars of Social Engineering
Bridewell CTI analysed the contents of the emails against the "Pillars of Social Engineering" to understand which techniques are employed by the threat actors to increase their chances of success.
Both emails contained some form of intimidation, claiming to escalate the issue within a fixed time window (7 days) or highlight possible reputational damage because of inaction. The main pillar leveraged in both cases is that of Trust. Both emails rely heavily on trust between the complainant and the recipient customer service employee.
In both cases, the threat actor relies on the recipient's presumed sense of duty and attempts to build credibility with document mentions and steps taken to assist the customer service representative in acting and responding. In the case of the airport complaint, the threat actor uses the persona of an experienced traveller to validate their observations based on travel to other airports globally to validate their claims.
Social Engineering Pillar | Text 1: Laptop Theft Complaint | Text 2: Airport Infrastructure Complaint |
Authority | Low: Sender is a customer/ victim. Mentioning a police report adds slight procedural weight but claims no personal power. | Moderate: Authority is claimed based on experience ("frequent business traveller," knowledge of other airports), implying credibility to critique. |
Intimidation | Moderate: Contains a direct threat to escalate the complaint to external authorities (consumer rights, tourism boards, legal) if demands are unmet. | Low: No direct threats from the sender. Mentions negative outcomes like "damage the airport's reputation" therefore, not a direct threat. |
Consensus/ Social Proof | None: The complaint is framed as an individual incident. | Moderate: Suggests shared experience ("A lot of people, myself included...") and uses comparison to "other global hubs" to imply deviation from a standard (social proof). |
Scarcity | None: No limited availability or time-sensitive offer is mentioned. | None: No element of scarcity is used. |
Urgency | Moderate: A specific deadline ("within 7 working days") is set, supported by phrases like "swift consideration" and "urgent issue." | Low: Uses standard polite closing ("prompt attention") without a hard deadline or strong imperative language. |
Familiarity/ Liking | None: The tone is strictly formal and transactional. | Low: A minor attempt at rapport with "I hope you're doing great," but the overall tone remains formal. |
Trust (Exploitation) | High: Relies on the recipient's presumed sense of duty. Attempts to build credibility with document mentions. Crucially uses a suspicious link (gdrive-share[.]online) disguised as Google Drive to exploit trust. | High: Builds credibility via the experienced traveller persona and plausible issues. Critically uses a suspicious link (1dv365[.]live) disguised as Microsoft 365/OneDrive to exploit trust. |
Figure 5. Table showing analysis of lures against the Pillars of Social Engineering
Complaint Domains
Within each email is a link attempting to impersonate cloud storage services such as Google Drive and Microsoft OneDrive. We identified the following domains: gdrive-share[.]online within the Laptop Theft Complaint and 1dv365[.]drive within the Airport Infrastructure Complaint.
Each domain is appended with a URL path of "file/share" or "workgroup/docs" followed by a 5-character alphanumeric string. The threat actors have recently purchased these domains through Rebrandly as a distribution reseller for domain name registrations.
All RomCom domains we identified utilised Rebrandly, who host their services on Amazon S3 storage within the United States. This is likely a conscious effort by the threat actors to evade detection by utilising common and reputable services as the first stage of their infection chain, improving evasion success to redirect victim traffic to dedicated VPS infrastructure in latter stages of the infection. RomCom threat actors also utilise Tucows DNS infrastructure with systemdns.com nameservers pointing to Amazon S3 IPs for all complaint-related first stage domains.
Figure 6. First stage domain hosted on Rebrandly
We are tracking two clusters of first stage domains that we attribute to RomCom threat actors. The first cluster are active domains that we have observed in the involvement of the reported infection chain, leading to payload hosting infrastructure.
The second cluster are domains that match all the expected RomCom indicators, but we have not yet observed infection activity involvement. It is assessed with medium-high confidence that these will be in the short-near term.
Of the active domains identified within the "Deceptive Prospect" campaign, we identified "live", "pub" and "online" Top Level Domains (TLDs) in use with the following URL patterns: "/workgroup/files/", "/workgroup/docs/, "/folder/open/" and, "/data/", "/cloud/sync/" directing users to the intermediate infrastructure.
RomCom's first stage domain infrastructure revolves around: the dominance of cheap, unregulated gTLDs such as "live"; "pub" and "online" in our active cluster; “Drive”-centric naming to mimic OneDrive/Microsoft 365; numeric and punctuation obfuscation; and an emphasis on “Share” and “Storage” themes. In total, we have identified nearly 100 domains matching these characteristics. Below we have broken down the domain distribution by TLD of all identified domains.
TLD | Count | % of 97 |
.click | 30 | 31% |
.live | 30 | 31% |
.pub | 6 | 6% |
.website | 6 | 6% |
.link | 6 | 6% |
.online | 5 | 5% |
.works | 4 | 4% |
.expert | 3 | 3% |
.social | 3 | 3% |
.bio/.zone/.space/.com | 4 (1 each) | 4 × 1% |
Figure 7. Table showing the breakdown of RomCom domains by TLD
Intermediate Infrastructure
Google Drive or Microsoft OneDrive impersonation links initiate a set of redirects through an intermediate service, which involves solely the domain "opn.to" as a URL shortener service, hosted on OVH SAS in France. In the event of unsuccessful redirects, the adversary appears to have leveraged the Unitag QR code service, only identifying "OOPS...404 The QR Code you are looking for does not seem to exist anymore" as a default redirected web page.
However, we did not identify any usage of a QR code in the infection and web traffic merely routed through the opn[.]to domain automatically on execution of the initial first stage domain in the web browser.
Figure 8. Intermediate 404 webpage
Payload Hosting
Ultimately, the victim lands on a payload hosting site operated on threat actor-controlled infrastructure, impersonating OneDrive with a fake .pdf file extension and associated download button to retrieve supplemental complaint evidence. We have identified payload domains: gcloud-drive[.]com, 1dvstorage[.]com, cloudedrive[.]com, datadrv1[.]com and onelivedrv[.]com used by RomCom to stage these pages.
Figure 9. RomCom payload hosting webpage
These domains are registered with the Tucows registrar and are hosted on ASNs such as SHOCK-1, HZ Hosting and AEZA Group Ltd. Historically, RomCom has used HZ Hosting and AEZA to host Snipbot C2 infrastructure and payload hosting, providers which are typically abused by other threat actors.
A notable difference between the payload infrastructure and lure domains is that these utilise Njalla Okta LLC for DNS services. Previously, RomCom actors have also used hosting providers such as LIMENET, a Bullet Proof Hosting Provider, who had presence in Bulgaria, much like the AEZA Group Ltd infrastructure in this campaign.
Final Payloads
Initiating the download will retrieve the executable of the same name from the Mediafire file sharing site and drop the fake pdf Windows executable on the victim's machine. In previous campaigns, the threat actors have been observed to use file sharing site "temp.sh" store payloads, making a change in tactic for payload staging.
Please note that the filename mentioned below is not the same as the one found during this campaign. However, we identified the same file hash with different file names reused in other intrusions which we have observed.
Figure 10. HTML Content showing payload retrieval from Mediafire hosting
File Analysis
We were able to retrieve the original file that would have been part of the infection chain had it continued further. This file was used to conduct static, dynamic, and code analysis of the file to identify potential similarities with RomCom malware, discover new network indicators which can aid in further infrastructure analysis, and externally hunt for other related malware samples.
Static Analysis
SHA256 File hash | 8b683ed0d1cd0139093e21889be077d0e4e50e7adaf638b56e2077df5c6eda4b |
PE Import Hash | 37b1151994483cd67441c44382804318 |
Complier | Microsoft Visual C/C++ (2017 v.15.5-6) [EXE32] |
Linker | Microsoft Linker (14.42) [GUI32, signed] |
File Type | PE32 Executable |
File Size | 160 KB |
File icon | PDF Document |
Figure 11. Detect It Easy file attributes of analysed sample
Language Locale Code: Polish (0415 in hexadecimal)
File Names:
- Drug Composition & Reaction Evidence april.exe
- Medical Report scan april.exe
- Medical Records 2025 april.exe
- Drug Composition & Reaction Evidence april (1).exe
- Attachment_Harassment evidence april.exe
- Evidence File april.exe
- aprToSign.exe
It was not known what specific file name was associated with our observed intrusions. Based on the email theme, we assess it was likely a file name such as "Evidence File april.exe" since the lure was non-medical/ legal related. Alternative file names also suggest that the targeting could have been more specific in nature outside of the observed intrusions. In addition to this, the telemetry from Virus Total suggests with low confidence that other countries may also include France, USA, Portugal, Croatia and Germany.
Figure 12. Geographical submissions of file sample from VirusTotal
AV Detections:
At the time of reporting this activity, this file is detected as malicious only by ESET using the Win32/TrojanDownloader.RomCom.A. The name of the signature further supports our hypothesis that there is technical overlap with RomCom from a tooling perspective as well. Only this file is linked to the AV signature, no other files were discovered.
Packer: The file under consideration does not appear to be packed. This is based on the entropy values, and raw and virtual sizes of the file sections.
Compilation Time Stamp: April 16 11:25:29 2025
Figure 13. Compilation Timestamp of sample
Code Sign Certificate: The file is signed by the organisation GMC CONSTRUCTION AND TRADING COMPANY LIMITED. This certificate is likely stolen or compromised. The date when the file was signed and compiled is the same. The signed organsiation also appears to be UK-based and was dissolved the day before the signing the certificate. Currently, only this file was identified to be signed using the code signing certificate. Below you will see that there is a difference between the signing time and validation period of the certificate.
Figure 14. Code Signing Certificate information
Strings: Upon analysis on ASCII and Unicode strings embedded in the file, there were no indications of malicious strings. However, a particular unicode string "Created by: GRZANA" stands out as it hints towards the developer based on the alias. The origin of the name is unknown. This should be treated with caution due to the absence of this alias in external reporting till date. There were two other samples that also included this string.
Sample 1 SHA256 File Hash: 8183f4b75cbe318a34846b0d8bb9caf219b4b2686d14a531090b6550398cbbca
The file name of sample 1 "WindowsProject1.exe" combined with the compilation time stamp suggest that this was likely a test file used during the early stages of the development. This sample was signed using the organisation "Emma Weber" and shares the same PE import hash as the original file. There were no other debug artifacts associated with this sample.
Sample 2 SHA256 File Hash: 4055e3a45d63778dfc5775ae6e512fb3991df1dadf91630a26ed5747e350f75f
Sample 2 was signed using "Mark Linn" and has a different PE import hash from the original file and icon (music icon).
All three identified samples share similar file sizes, compilation timestamps, language locale code, developer alias string, code signing pattern (one file per signature) and common contained resources which together conclude that the files are very similar to one another. None of these file hashes were mentioned in external reporting.
Furthermore, some of the lesser used PE imports from the original file were leveraged to spot and cluster potentially related file samples in combination with other attributes such as the specific complier used. As a result, six new samples were discovered, these are assessed to be related to the original file based on low confidence. It is still early during the analysis process to determine or validate any attribution to known malware.
b7d48c6982fa1ce21ac9bf4a0a95e109ec2b92176a05556deb920600fb21d57b 3191542dc4c94d5b9f85e00aa60c6d0e48f42ad936e8dbba714962564141e2bd 58d5fffdf41da83b0eef0ea3dd208f371cef87e118cfde4976b83de9158083d1 c77c73fdb66fb0e8720979adcc36081bc6cf8defbfb0adb9c3ec19188a922320 99e6daaa559dc0f812dfd03aa68a8a862cfb5779fa734c6c9e7d7d6ad1286b03 e48bcdb4af6e2f8945adba74a1dc4c7657c75344afc2b487a0373440bb200748
Dynamic Analysis
The file was executed in a sandbox environment. As a result, very limited behaviour was exhibited by the executable with no signs of obvious suspicious/ malicious activity (network, child processes, files dropped) upon execution. The file appears to be some sort of audio/video playing software with a very basic user interface.
However, the presence of the PDF icon during file execution is suspicious since the file has nothing to do with rendering PDFs. The previously specified language locale can be verified based on the language selection option being Polish. The cause behind the expression of such limited file behaviour would require further examination of code.
Figure 15. ClickPlay application screenshot
Upon analysis of the in-memory strings found while running the file, the list of executed process during the run time of the binary and changes to the registry keys, one potential defense evasive technique identified was the checking for the RecentDocs registry key for the number of documents on the target system.
This anti-sandbox technique was mentioned by Unit42 in their Inside SnipBot: The Latest RomCom Malware Variant" article. This observation requires further investigation into the code to identify the relevant API functions used to lookup the registry structure and what value of the number of recent documents the file is comparing against.
0x745daeac (26): MaxRecentDocs
0x745daeac (38): NoRecentDocsHistory
Figure 16. Registry value checks screenshot
External Correlations: Upon corelating the findings from the file analysis with recent infection chains uncovered by external reporting involving RomCom, the Palo Alto's Unit 42 article "Inside SnipBot: The Latest RomCom Malware Variant" shows overlap to a certain extent based on the recent reporting period, initial infection chain, checking of recent documents as form of defense evasion, similar file names and other factors.
File Assessment
After correlating the findings from the file analysis independently, there are no signs of suspicious or malicious activity emitted from the file. However, it is important to recognise that this requires further examination of the file which was determined to be out of scope at the time of writing this.
There is a confirmation bias in the analysis where we are searching for evidence to support our earlier infrastructure analysis pointing towards RomCom activity along with the subsequent detection of the file as RomCom according to ESET.
Diamond Model

Figure 17. Diamond Model for “Operation Deceptive Prospect” campaign
Tactics, Techniques and Procedures (TTPs)
- T1036: Masquerading
- T1036.008: Masquerade File Type
- T1199: Trusted Relationship
- T1497: Virtualization/Sandbox Evasion
- T1553.002: Code Signing
- T1566: Phishing
- T1566.002: Spearphishing Link
- T1583: Acquire Infrastructure
- T1584: Compromise Infrastructure
- T1584.003: Virtual Private Server
- T1585.002: Email Accounts
- T1587.002: Code Signing Certificates
- T1588.007: Artificial Intelligence
- T1656: Impersonation
Threat Hunting and Detection Analytics
For KQL and YARA detection content, please visit the Bridewell CTI Github repository here: https://github.com/Bridewell-CTI/
Indicators of Compromise (IOCs)
For a full list of IOCs linked to this campaign, please visit the Bridewell CTI repository here:
https://github.com/Bridewell-CTI/IOCs/blob/main/2025/04/Operation_Deceptive_Prospect.txt
References
https://unit42.paloaltonetworks.com/snipbot-romcom-malware-variant/