Sıla Özeren Hacıoğlu | 13 MIN READ

CREATED ON October 02, 2025

RomCom Threat Actor Evolution (2023–2025)

RomCom, also known as Storm-0978, Tropical Scorpius, and Void Rabisu, has evolved from a regional cyber-espionage group into a sophisticated hybrid threat actor. In 2025, RomCom exploited the WinRAR zero-day vulnerability CVE-2025-8088, a path traversal flaw with a CVSS score of 8.4, to deliver backdoor malware including SnipBot, RustyClaw, and Mythic Agent. 

These attacks targeted financial, manufacturing, defense, and logistics sectors in Europe and Canada through spear-phishing emails disguised as job applications. The group has previously exploited other zero-day vulnerabilities, such as CVE-2023-36884 in Microsoft Word and CVE-2024-9680 in Firefox, to gain unauthorized access to systems. 

RomCom's evolving tactics and use of zero-day exploits make it a significant threat to organizations worldwide.

RomCom Target Sectors and Geography

RomCom’s victimology reflects its evolution from a regional threat to a global hybrid adversary.

In 2022, the group primarily targeted Ukraine, Poland, and neighboring regions, aligning operations with Russian strategic interests. By 2023–2024, its scope widened to include defense and government organizations across Europe and North America, often using phishing lures referencing NATO or Ukrainian politics.

In 2025, RomCom moved aggressively into private industry:

  • Operation Deceptive Prospect (early 2025) targeted retail, hospitality, and critical infrastructure in the UK [1].

  • Later campaigns hit financial, defense, logistics, and manufacturing organizations in Europe and Canada [2].

This shift illustrates RomCom’s ability to alternate between long-term espionage against government agencies and monetization-focused operations against enterprises.

RomCom Tactics, Techniques & Procedures (TTPs): How They Operate

RomCom’s playbook spans the entire attack chain, blending social engineering, zero-day exploits, and custom malware with strong evasion practices.

Initial Access

RomCom relies heavily on social engineering and impersonation. Early entry often comes through:

Spearphishing with decoys — Personalized emails (job applications, invoices, supplier messages, customer compliant portals where issues like stolen luggage or substandard airport facilities are “reported”) that carry malicious attachments or links. Typical decoys are a “resume” or invoice PDF that either contains a loader or launches a trojanized executable while displaying a benign decoy to the user.

Common artifacts:

  • .exe disguised as .pdf, weaponized Office docs, password-protected archives (.rar, .zip) with a decoy file [3]. 
  • URLs disguised as Google Drive or Microsoft OneDrive files as follows [4].
    • gdrive-share[.]online
    • 1dv365[.]live

Direct Example: hxxps://gdrive-share[.]online/workgroup/docs/c0fTJ

Here is an example of an email that RomCom is known to use to gain initial access (where the target is the retail/hospitality sector). 

Subject: Complaint About Staff Performance
From: Kajzer David kajzer.david962701@yahoo.com
Date: Wednesday, March 5, 2025 at 2:29 PM
To: [REDACTED]


[EXTERNAL EMAIL] *** Warning: This email originated from outside of [REDACTED] email system. DO NOT CLICK LINKS or ATTACHMENTS in this email unless you recognise the sender and know the content is safe. If you have any doubts, please contact the IT Service Desk. ***


Dear [REDACTED],
I am writing to formally report the theft of my laptop during my visit to [REDACTED]. On January 28, 2025, I left my laptop in my locked room. Though, upon my return, my laptop was missing. I promptly reported the incident to the receptionist but have not received any resolution.


Actions I Have Taken:
I filed a police report regarding the incident.
I asked for CCTV recordings but was not granted access.
I requested help from the hotel staff, yet no steps have been taken to resolve the issue.
Please find the following supporting documents attached:
Hotel booking confirmation


Police report statement
Ownership verification for the laptop
hxxps://gdrive-share[.]online/workgroup/docs/c0fTJ
Considering that my laptop was stolen at your hotel, I would like to request:
complete compensation covering the cost of my stolen laptop;
a detailed examination of the situation, including a review of security camera footage;
a confirmation of reinforced safety measures to mitigate future risks.
I expect a response within 7 working days. Should you fail to provide a sufficient response, I am prepared to report the complaint to the relevant consumer rights authorities, local tourism boards or legal professionals.


I appreciate your swift consideration of this urgent issue. I anticipate your reply at your earliest opportunity.


With thanks,
Kajzer David


Sent from my OnePlus device.

Compromised customer-facing portals & uploads — In 2025 RomCom began abusing feedback/upload forms and similar channels to deposit malicious archives or links, bypassing some email defenses that focus on inbound mail [4].

CVEs Targeted by RomCom Threat Actor: Identifying Vulnerabilities Under Attack

RomCom distinguishes itself by repeatedly leveraging unpublished vulnerabilities, a capability rarely seen outside advanced APTs.

  • CVE-2023-36884 — Microsoft Word RCE used in June 2023.

Microsoft observed in-the-wild exploitation of a Microsoft Office/Windows HTML RCE (CVE-2023-36884) used in phishing campaigns in mid-2023; Microsoft’s post ties the campaign to the actor cluster tracked as Storm-0978 (RomCom alias) [5]. 

  • CVE-2024-9680 + CVE-2024-49039 — Firefox/Thunderbird + Windows chain (Oct–Nov 2024)

Known reports describe a chained, zero-click exploit that used a Mozilla use-after-free (CVE-2024-9680) and a Windows privilege-escalation (CVE-2024-49039) to deliver a RomCom backdoor [6]; multiple summaries and NVD entries confirm the CVE assignments and active exploitation. Patch/advisory dates around early–mid October / November 2024.

  • CVE-2025-8088 — WinRAR path-traversal (July/Aug 2025) via job-themed phishing archives 

Researchers reported a WinRAR directory-traversal zero-day (CVE-2025-8088) that was exploited in social-engineering campaigns packaged as job/application RAR archives; known reports link RomCom to active exploitation [7]. 

Three distinct zero-days across three years reflect either an internal exploit-development pipeline or privileged access to exploit brokers.

RomCom’s SlipScreen Loader Malware (2025)

Once inside, RomCom uses multi-stage loaders and evasive techniques to ensure persistence on compromised systems. 

One of its key loaders, SlipScreen, employs advanced evasion strategies to avoid detection, while maintaining control over the system.

Name: SlipScreen
Type: First-stage loader in the RomCom malware family
Written in: Rust and C++
Code-Signing: Signed with fraudulent certificates; masquerades as a PDF reader
Evasion Techniques: Verifies recent user activity through registry checks to avoid sandbox environments

Evasion Mechanism: Recent User Activity Validation

SlipScreen checks the Windows Registry to verify at least 55 recent documents. This process helps confirm that the malware is running in an environment with user activity, which avoids sandboxes (often devoid of user activity). 

If the threshold isn’t met, SlipScreen halts execution to avoid detection.

#Recent Documents Registry Path HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs

Here is the code piece from SlipScreen, where it is looking for registry keys.

__builtin_strcpy(dest: &var_46d, src: "RegOpenKeyExA")
int32_t eax = arg2(arg1, &var_46d), var_4a0 = ebx, var_4a4 = ebx;

if (eax != 0) {
    __builtin_strncpy(dest: &var_46d, src: "EnumValue", n: 9);
    int32_t eax_1, ecx_1;
    eax_1, ecx_1 = arg2(arg1, &var_46d);
    int32_t var_4a8_1 = ecx_1, var_4ac_1 = ecx_1;

    if (eax_1 != 0) {
        int32_t var_45f;
        __builtin_strncpy(dest: &var_45f, src: "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\RecentDocs", n: 0x3f);
       
        void var_4c0;
        void* esp_1 = &var_4c0;
        int32_t var_478;
       
        if (eax(0x80000001, &var_45f, 0, 0x20019, &var_478) == 0) {
            int32_t edi_1 = 0;
            while (true) {
                int32_t var_474 = 0x400;
                *(esp_1 + 0x1c) = *(esp_1 + 0x18) = *(esp_1 + 0x14) = *(esp_1 + 0x10) = 0;
                *(esp_1 + 0xc) = &var_474;
                void var_41c;
                *(esp_1 + 8) = &var_41c;
                *(esp_1 + 4) = edi_1;
                *esp_1 = var_478;
                esp_1 -= 0x20;
            }
        }
    }
}

This key stores a list of recently opened documents. SlipScreen uses it to confirm user interaction and determine whether it’s running in a sandbox.

Evasion Mechanism: Shellcode Decryption & Execution

Once the environment is validated, SlipScreen proceeds to decrypt and load shellcode directly into memory. This allows it to evade file-based detection methods by avoiding writing to the disk. The shellcode then establishes communication with the C2 server for further instructions.

Persistence via COM Hijacking: COM Hijacking for Persistence

To maintain persistence, SlipScreen hijacks COM objects to ensure that it automatically executes when explorer.exe restarts. 

This technique leverages registry entries to register malicious DLLs to be loaded by system processes, making detection more difficult.

SOFTWARE\Classes\CLSID\{2155fee3-2419-4373-b102-6843707eb41f}\InprocServer32
SOFTWARE\Classes\CLSID\{30d49246-d217-465f-b00b-ac9ddd652eb7}\InprocServer32
SOFTWARE\Classes\CLSID\{f82b4ef1-93a9-4dde-8015-f7950a1a6e31}\InprocServer32

These registry keys control COM object activation, ensuring that the malicious DLL is loaded automatically when the system reboots or when explorer.exe restarts, keeping the malware active and undetected.

DustyHammock & ShadyHammock Malware

The RomCom threat group leverages DustyHammock and ShadyHammock as highly effective, complementary backdoors essential for their sophisticated espionage campaigns. They use these tools for persistence and evasion, not just as single-stage implants. 

  • DustyHammock, being RUST-based, is technically challenging to analyze, serving as the core backdoor for long-term C2 communication and remote command execution after the initial infection. 

  • ShadyHammock, a C++ component, specializes in stealth by loading the main payload, the XOR-encoded SingleCamper RAT DLL, directly from the Windows Registry into memory, thereby minimizing disk-based indicators. 

This modular, multi-language approach ensures redundancy, complicates defensive measures, and establishes a stable, covert platform for exfiltrating strategic data from targeted entities in countries like Ukraine and Poland.

SnipBot Backdoor (also known as RomCom 5.0 or SingleCamper)

# Malware Sample

SHA-256: 5b30a5b71ef795e07c91b7a43b3c1113894a82ddffc212a2fa71eebc078f5118

SnipBot is the highly evolved and sophisticated Remote Access Trojan (RAT) central to the RomCom threat group's espionage operations, designed for extreme stealth and long-term control. Its primary defensive measure is custom, advanced code obfuscation, specifically a unique window message-based control-flow obfuscation algorithm

This technique splits the malware's execution logic into numerous unordered blocks, triggered only by custom Windows messages, creating a highly complex and non-linear structure that effectively defeats automated sandbox and static analysis tools. 

The initial multi-stage infection chain begins with a downloader, often a signed executable (using a stolen/fraudulent valid code-signing certificate) disguised as a benign document like a PDF or resume, which then fetches the SnipBot module (usually a DLL) from remote, sometimes transient, C2 infrastructure like the temp.sh file-sharing service. 

Once deployed, SnipBot acts as the ultimate Core Capability by enabling attackers to execute arbitrary commands via a hidden cmd.exe process and download supplemental modules like Plink.exe for secure tunneling. 

Finally, for Reconnaissance, it collects crucial victim data (computer/domain name, MAC address, Windows build number) and transmits it to the C2 over HTTPS (Port 443), allowing the threat actors to vet the compromised machine for potential human-operated exploitation.

Post-Exploitation

After gaining persistence, RomCom pivots for either espionage or disruption:

  • Credential Theft: RomCom steals credentials through SAM hive dumping to escalate privileges and deepen system access.

  • Lateral Movement: Using tools like Impacket’s SMBExec and WMIExec, RomCom spreads across networks to infect additional systems.

  • Reconnaissance: RomCom gathers system details with systeminfo, nltest, and custom tools to map the victim's environment and identify valuable assets.

  • Outcomes:

    • Espionage: RomCom conducts covert exfiltration of sensitive documents and intelligence, often aligning with state-sponsored espionage goals.

    • Ransomware: RomCom deploys Industrial Spy, Underground, and Cuba ransomware in double extortion campaigns, demanding ransom and threatening public data leaks.

RomCom Evolution in 2024–2025: Regarding Malware Arsenal

By 2024, RomCom had fully embraced its hybrid nature. It ran parallel campaigns: prolonged espionage against government entities and monetization-driven breaches against enterprises. Campaigns were no longer regional, they spanned North America, Europe, and beyond.

The group also invested in an expanding malware arsenal:

  • MeltingClaw / RustyClaw — phishing downloaders introduced in 2024.

  • DustyHammock / ShadyHammock — stealthy backdoors for reconnaissance.

  • SlipScreen — first-stage loader for SnipBot, evading sandboxes.

  • SnipBot — evolved RomCom RAT with stronger modularity and stealth.

Campaigns highlighted continual adaptation. Operation Deceptive Prospect abused trusted web feedback portals, while the July 2025 WinRAR campaign exploited CVE-2025-8088 through carefully crafted job lures. Archives hid malicious payloads, achieved persistence via DLL hijacking and COM abuse, and attempted stealth deployment. 

Even when unsuccessful, these campaigns proved RomCom’s agility in weaponizing new vulnerabilities.

Collaboration and Attribution

RomCom does not operate in isolation.

Researchers revealed overlap with UNK_GreenSec, with both clusters sharing [8]:

  • The TransferLoader malware loader.

  • Compromised MikroTik routers running REM Proxy for phishing traffic.

RomCom also maintained strong ties to Cuba ransomware, sharing infrastructure and payload delivery. Its blend of espionage-aligned targeting with ransomware deployment suggests a Russia-linked ecosystem where state interests and cybercrime intersect.

MITRE ATT&CK Mapping of RomCom Cyber KillChain

Stage

Technique

MITRE ID

Initial Access

Spearphishing Attachment

T1566.001

Initial Access

Drive-by Compromise (Trojanized software, rogue portals)

T1189

Exploitation

Exploitation for Client Execution (0-days: CVE-2023-36884, CVE-2024-9680, CVE-2025-8088)

T1203

Execution

Malicious File Execution (RAR/PDF droppers)

T1204.002

Persistence

DLL Search Order Hijacking

T1574.001

Persistence

Registry Run Keys / Startup Folder

T1547.001

Defense Evasion

Code Signing Abuse

T1553.002

Defense Evasion

Virtualization/Sandbox Evasion (RecentDocs check)

T1497.001

Credential Access

Security Account Manager (SAM) Dumping

T1003.002

Lateral Movement

SMB/Windows Admin Shares (SMBExec)

T1021.002

Lateral Movement

WMI (WMIExec)

T1047

Discovery

System Information Discovery

T1082

Exfiltration

Exfiltration Over C2 Channel

T1041

Impact

Data Encrypted for Impact (Ransomware)

T1486

How Picus Helps Defend Against RomCom Threat Actor’s Attacks?

The Picus Security Validation Platform safely simulates RomCom actor’s tactics, techniques, and procedures using its continuously updated Threat Library, identifying blind spots across EDRs, NGFWs, and SIEMs before attackers can exploit them. 

You can also test your defenses against hundreds of other malware variants, such as SnipBot, SlipScreen Loader, RustyClaw, within minutes with a 14-day free trial of the Picus Platform.

Threat ID

Threat Name

Attack Module

87432

WinRAR CVE-2025-8088 Path Traversal Vulnerability Download Threat  

Network Infiltration

65388

WinRAR CVE-2025-8088 Path Traversal Vulnerability Email Threat  

Email Infiltration

34843

Tropical Scorpius Threat Group Campaign Malware Download Threat

Network Infiltration

30763

Tropical Scorpius Threat Group Campaign Malware Email Threat

Email Infiltration

75695

SnipBot Backdoor Malware Download Threat

Network Infiltration

62254

SnipBot Backdoor Malware Email Threat

Email Infiltration

26093

RustyClaw Malware Downloader Download Threat

Network Infiltration

22315

RustyClaw Malware Downloader Email Threat

Email Infiltration

25241

Mythic Backdoor Malware Download Threat

Network Infiltration

74847

Mythic Backdoor Malware Email Threat

Email Infiltration

21319

RomCom Threat Group Campaign RAT Download Threat

Network Infiltration

79261

RomCom Threat Group Campaign RAT Email Threat

Email Infiltration

37650

RomCom RAT Download Threat

Network Infiltration

85377

RomCom RAT Email Threat

Email Infiltration

92483

RomCom Backdoor Malware Download Threat

Network Infiltration

88642

RomCom Backdoor Malware Email Threat

Email Infiltration

References

[1] “UK Infrastructure Hit by Russian Linked Cyber Group.” Available: https://www.scworld.com/brief/uk-infrastructure-hit-by-russian-linked-cyber-group

[2] “Monthly Threat Brief August 2025.” Available: https://www.connectwise.com/blog/monthly-threat-brief-august-2025

[3] “ESET Research: Russian RomCom group exploits new vulnerability, targets companies in Europe and Canada,” ESET Newsroom. Available: https://www.eset.com/us/about/newsroom/research/eset-research-russian-romcom-group-exploits-new-vulnerability-targets-companies-in-europe-and-canada/. [Accessed: Sep. 29, 2025]

[4] J. Penny, S. C. Analyst, and Y. Solanki, “Bridewell,” Bridewell, Apr. 29, 2025. Available: https://www.bridewell.com/insights/blogs/detail/operation-deceptive-prospect-romcom-targeting-uk-organisations-through-customer-feedback-portals. [Accessed: Sep. 29, 2025]

[5] M. T. Intelligence, “Storm-0978 attacks reveal financial and espionage motives,” Microsoft Security Blog, Jul. 11, 2023. Available: https://www.microsoft.com/en-us/security/blog/2023/07/11/storm-0978-attacks-reveal-financial-and-espionage-motives/. [Accessed: Sep. 30, 2025]

[6] Z. Zorz, “RomCom hackers chained Firefox and Windows zero-days to deliver backdoor,” Help Net Security, Nov. 26, 2024. Available: https://www.helpnetsecurity.com/2024/11/26/romcom-backdoor-cve-2024-9680-cve-2024-49039/. [Accessed: Sep. 30, 2025]

[7] “Update WinRAR tools now: RomCom and others exploiting zero-day vulnerability.” Available: https://www.welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability. [Accessed: Sep. 30, 2025]

[8] “10 Things I Hate About Attribution: RomCom vs. TransferLoader,” Proofpoint, Jun. 27, 2025. Available: https://www.proofpoint.com/us/blog/threat-insight/10-things-i-hate-about-attribution-romcom-vs-transferloader. [Accessed: Sep. 30, 2025]

 

Table of Contents