Squeaky Flotilla

6 object(s)
 

Jennie007Greene

As of 9/14/205, several distinct Wordpress domains submitted to the OpenPhish.com database, urlscan.io, and other artifact collection platforms have been infected by threat actors with the Jennie007Greene.php web shell. For the purpose of protecting these domains from further exploitation and defacement, no specific domains will be discussed; however, general Indicators of Compromise are available below.

Multiple compromised domains allow the threat actor wide swathes of access to victim emails, usernames, and passwords. In addition to recording phishing campaign credentials in .txt files, the attackers used the Telegram bot API to exfiltrate sensitive victim data.

Files frequently found alongside Jennie007Greene.php included a configuration file that specified the format in which data would be sent via Telegram bot; a section of this formatted message was consistently observed to include the string “@SMARTMACBOOKBOT*TFCU”. Inspecting the data enumerated from attacker-controlled chats, we determined that messages containing this string began appearing on August 21st of 2025, though was preceeded by messages without the string. We may therefore mark 08/21/25 aa a general point at which this iteration of the threat actor’s phishing campaigns started.

Indicators of Compromise: