Luna Moth Hackers Masquerade as IT Helpdesks to Breach U.S. Firms
🎙️ Dive Deeper with Our Podcast!
Explore the latest Incident Response: Luna Moth Hackers Masquerade as IT Helpdesks to Breach U.S. Firms
👉 Listen to the Episode: https://technijian.com/podcast/inside-the-luna-moth-scam-how-fake-it-desks-are-breaching-u-s-businesses/
Subscribe: Youtube | Spotify | Amazon
Luna Moth’s Rising Threat: Callback Phishing Without Malware
A stealthy cybercriminal group, known both as Luna Moth and the Silent Ransom Group (SRG), is intensifying its efforts to infiltrate organizations across the United States, particularly within the legal and financial sectors. According to cybersecurity expert Arda Büyükkaya at EclecticIQ, their operations revolve around one key objective: stealing sensitive data for extortion purposes.
From Ransomware to Phishing-Driven Extortion
Luna Moth’s history traces back to the infamous BazarCall campaigns, which provided initial access for ransomware groups like Ryuk and later Conti. However, after Conti’s dissolution in early 2022, these threat actors pivoted into a new direction, forming SRG and refining their techniques.
Unlike previous ransomware-based methods, Luna Moth’s current operations rely purely on social engineering. No malware is involved—just carefully crafted deception.
Deceptive Tactics: Impersonating IT Help Desks
Since March 2025, Luna Moth has launched a wave of callback phishing campaigns. These involve sending fraudulent emails that appear to come from a company’s IT helpdesk, prompting recipients to call a fake support number to address fabricated technical issues.
When victims call the number, a threat actor posing as an IT technician guides them to download remote access tools under the guise of helpdesk assistance.
Use of Legitimate Remote Tools for Unauthorized Access
Phony Domains and Deceptive Sites
The attackers direct users to bogus IT support websites hosted under domains like [company_name]-helpdesk.com and [company_name]helpdesk.com. These domains are typically registered via GoDaddy, and 37 or more such domains have already been confirmed by researchers.
Popular RMM Tools Exploited
Victims are convinced to install Remote Monitoring and Management (RMM) software, such as:
- Syncro
- SuperOps
- Zoho Assist
- Atera
- AnyDesk
- Splashtop
Because these are legitimate and digitally signed applications, they often bypass security alerts, making them ideal tools for unauthorized access.
Hands-On Intrusions and Data Exfiltration
Step-by-Step Attack Flow
Once installed, the RMM software provides attackers with direct keyboard access to the victim’s machine. From there, they:
- Move laterally across the network.
- Search for sensitive files on local drives and shared folders.
- Extract valuable information using tools like WinSCP (via SFTP) or Rclone for cloud synchronization.
This manual data theft model is highly effective and difficult to detect without behavioral anomaly monitoring.
High-Stakes Extortion: Demands up to $8 Million
Following successful data exfiltration, Luna Moth contacts the victimized company and threatens to publish stolen files on its public website unless a ransom—ranging from 1 million to 8 million USD—is paid.
Unlike traditional ransomware attacks, there are no malicious payloads, file encryption, or infected attachments involved. Victims inadvertently open the door themselves by following instructions from a seemingly helpful IT representative.
Prevention: How Organizations Can Defend Against Luna Moth
Recommended Security Practices
To safeguard against these sophisticated phishing attacks, organizations should:
- Block known malicious domains and IPs listed in EclecticIQ’s report
- Restrict the use of unauthorized RMM tools within the network
- Train employees to verify unsolicited IT support requests through official internal channels
- Deploy endpoint detection systems that monitor RMM activity for irregular patterns
- Conduct phishing simulation exercises to raise staff awareness
Conclusion
Luna Moth’s operations serve as a stark reminder that cyberattacks don’t always require malware or advanced exploits. Sometimes, all it takes is a convincing voice and a well-crafted email. By staying alert and implementing robust verification processes, businesses can thwart these silent, yet devastating, intrusions.
FAQs About Luna Moth Phishing Attacks
1. What is Luna Moth’s main tactic in their recent cyberattacks?
They use callback phishing, impersonating IT support to trick victims into installing remote access tools.
2. How do they gain access to a victim’s device?
They guide victims to install legitimate RMM tools from fake helpdesk websites, enabling remote access.
3. Are these attacks linked to ransomware?
No, these operations do not involve ransomware. They rely on manual data theft and follow-up extortion.
4. What kind of tools do Luna Moth use?
They utilize popular RMM platforms like Zoho Assist, AnyDesk, Atera, and Splashtop.
5. What can companies do to protect themselves?
Implement domain filtering, restrict unauthorized software, and educate staff on social engineering threats.
6. How much ransom do these attackers demand?
The ransom demands range from 1 million to 8 million USD, depending on the targeted organization.
About Technijian
Technijian is a premier managed IT services provider, committed to delivering innovative technology solutions that empower businesses across Southern California. Headquartered in Irvine, we offer robust IT support and comprehensive managed IT services tailored to meet the unique needs of organizations of all sizes. Our expertise spans key cities like Aliso Viejo, Anaheim, Brea, Buena Park, Costa Mesa, Cypress, Dana Point, Fountain Valley, Fullerton, Garden Grove, and many more. Our focus is on creating secure, scalable, and streamlined IT environments that drive operational success.
As a trusted IT partner, we prioritize aligning technology with business objectives through personalized IT consulting services. Our extensive expertise covers IT infrastructure management, IT outsourcing, and proactive cybersecurity solutions. From managed IT services in Anaheim to dynamic IT support in Laguna Beach, Mission Viejo, and San Clemente, we work tirelessly to ensure our clients can focus on business growth while we manage their technology needs efficiently.
At Technijian, we provide a suite of flexible IT solutions designed to enhance performance, protect sensitive data, and strengthen cybersecurity. Our services include cloud computing, network management, IT systems management, and disaster recovery planning. We extend our dedicated support across Orange, Rancho Santa Margarita, Santa Ana, and Westminster, ensuring businesses stay adaptable and future-ready in a rapidly evolving digital landscape.
Our proactive approach to IT management also includes help desk support, cybersecurity services, and customized IT consulting for a wide range of industries. We proudly serve businesses in Laguna Hills, Newport Beach, Tustin, Huntington Beach, and Yorba Linda. Our expertise in IT infrastructure services, cloud solutions, and system management makes us the go-to technology partner for businesses seeking reliability and growth.
Partnering with Technijian means gaining a strategic ally dedicated to optimizing your IT infrastructure. Experience the Technijian Advantage with our innovative IT support services, expert IT consulting, and reliable managed IT services in Irvine. We proudly serve clients across Irvine, Orange County, and the wider Southern California region, helping businesses stay secure, efficient, and competitive in today’s digital-first world.