Third-Party Supply Chain Attack Affecting Auto Dealerships

Third-Party Supply Chain Attack Affecting Auto Dealerships

SpearTip Security Brief | March 17, 2025

 

What happened?

On March 11th, 2025, SpearTip’s Managed Detection and Response team responded to an alert of malicious code execution at a car dealership. Investigation of the indicators and an interview with the user indicated that the user visited the website of the dealership, from which they were redirected and then prompted to execute a PowerShell command through a ClickFix social engineering campaign. The campaign attempted to deploy the SectopRAT (Remote Access Trojan), which can be used to control browsers and steal sensitive information from the host.

 

Source of Compromises

In the days following the discovery of the malicious code execution, our team observed an increasing number of executions for dealerships nationwide, prompting further investigation by our team. As we investigated the websites users indicate they visited before they interacted with the ClickFix pop-up, it was discovered they all called an object “https://idostream[.]com/member/les_video_srp.js’, which contained malicious JavaScript to load the fake Captcha page.
 

The Captcha page would load Base 64 encoded PowerShell into the clipboard, which, by following the commands on the screen, would be expected by the user. “idostream.com” is owned by LESAutomotive, a company focused on vehicle video marketing solutions, which explains why the videos are present within the websites of car dealerships.

 

 

 

Why is it important?

If threat actors are able to successfully install the remote access trojan tools such as the SectopRAT, they will be able to control the user environment and conduct malicious activities which could result in data theft, account compromise, wire fraud, and other potentially harmful actions to the organization of the user who has clicked these videos.
 

How SpearTip can help and Remediation Steps

While the ClickFix attacks are not new, SpearTip has not previously seen them delivered in this way; instead, they are often delivered through phishing emails. SpearTip recommends educating users on pop-ups while explaining the potential dangers, and recommending contact with their IT Administrator for next steps when they receive a pop-up instructing them to perform abnormal actions on their machine.

SpearTip’s Managed Detection and Response team operating out of our 24/7/365 Security Operations Center can help organizations actively detect and respond to malicious threats just like this one. Our services allow us to continuously monitor endpoints, identities, and user behaviors to protect organizations.

In addition, our Incident Response team assists organizations after they have been breached to help restore operations quickly and mitigate any further damage while working to find the root cause of a breach.

List of indicators

Dropped File, Lancaster.zip, SHA256

 1a34c9b4500cf7859c36c102209902202fb7188aca1ba759f2d5018bf2655cc1

 

Dropped File, Stars_pack_version_21.3.1.zip, SHA256 6094ef164e5483ee1699a5c874c2c05fab0b3c15ef9bb5ab050c3bcfa8f14e43

Dropped File, zkwindow.exe, https://www.virustotal.com/gui/file/e11d68ee9294a55de8548687935567d030dae3a594d40ea75f88598f30ebb76e

Existence of File Path, %TEMP%\version_21

Use our compromise checklist below to help you decide on how to enhance your security posture if you feel you’ve been affected by a breach. 

 

  Answer
  QuestionsResponse 1ResultResponse 2ResultUnknownResult
1Do you have active services with the breached party?  (If Yes, proceed to Question 2)No Yes UnknownUnknown Exposure – Treat as yes
1bDo you use a competitor of the breached party?NoNot likely to be exposedYesMinimal likelihood exposureUnknownUnknown Exposure
1cDo you have a vendor that utilizes the services of the breached party?NoNot likely to be exposedYesPotential ExposureUnknownUnknown Exposure – Treat as Potential Exposure
2Do you have a secure VPN connection with the breached party?YesGoodNoPotential for Action to taken UnknownUnknown Exposure
3Do you require the breached party to utilize MFA when connecting to your systems?YesGoodNoPotential for Action to taken UnknownUnknown Exposure
4Do you require MFA to connect to the breached party?YesGoodNoPotential for Action to taken UnknownUnknown Exposure
5Have you configured SSO with the breached party?YesGoodNoPotential for Action to taken UnknownUnknown Exposure
6If not using SSO, are your account passwords with the third party common with your other credentials?YesGoodNoPotential for Action to taken UnknownUnknown Exposure
7Does the breached party have access to sensitive or critical data or systems in your environment?NoGoodYesPotential for Action to taken UnknownUnknown Exposure
8Do you share documents back and forth with the breached party?NoGoodYesPotential for Action to taken UnknownUnknown Exposure
9Does the documents you share with the breached party contain sensitive information?NoGoodYesPotential for Action to taken UnknownUnknown Exposure
10Aside from the data in the application, is there other data that the vendor knows about your organization that could be problematic such as credit card information or other financial information that could be exploited?NoGoodYesPotential for Action to taken UnknownUnknown Exposure
11Do you monitor for Dark Web data exposure?YesGoodNoPotential for Action to taken UnknownUnknown Exposure

Categories

Connect With Us

Featured Articles

blog-image-260
The Anatomy of a Phishing Attack
02 April 2025
Weekly Business Gifs_Images (3.8 x 2
How to Evaluate If Your Third-Party Providers are Cyber Resilient
20 March 2025
Third-Party Supply Chain Attack Affecting Auto Dealerships
Third-Party Supply Chain Attack Affecting Auto Dealerships
17 March 2025
Security Awareness Training blog
How Security Awareness Training & Education Can Drastically Reduce Cyber Risk
06 February 2025

See ShadowSpear in Action

Identify, neutralize, and counter cyberattacks - provide confidence in your security posture

Stay Connected With SpearTip

inside the soc

Inside the SOC Newsletter

View our articles that cover trending topics in cybersecurity with insights from our 24/7/365 Security Operations Center.
shadowspear platform

ShadowSpear Platform

Cybersecurity actors are working around the clock, shouldn’t your security team be too? Technology solutions and security controls fail for a number of reasons, poor deployment, improper implementation, or just no one monitoring the alerts.
shadowspear demo

ShadowSpear Demo

Experience ShadowSpear for yourself. Our lightweight, integrated solution will help you sleep easier at night and provide immediate confidence in your security posture.