Inside the Shadows: How Storm-0249 Hijacks Trust and Turns Security Tools into Ransomware Weapons
A new breed of ransomware attacks leverages fileless PowerShell, DLL sideloading, and social engineering to slip past defenses and target enterprises with surgical precision.
It starts with a simple pop-up and a convincing pretext: a technical issue that needs fixing. But behind the facade, a sophisticated cybercrime syndicate is rewriting the playbook on ransomware attacks. Storm-0249, once known as a middleman selling network access to the highest bidder, is now orchestrating its own campaigns - blending stealth, social engineering, and abuse of trusted security tools to devastating effect.
From Broker to Ransomware Architect
Storm-0249 first emerged in the cybercrime underworld as an initial access broker - selling footholds into compromised networks to ransomware gangs like Storm-0501. But recent intelligence reveals a strategic evolution. Instead of simply selling access, Storm-0249 now crafts its own precision attacks, targeting high-value organizations and using their own security tools against them.
Weaponizing Trust: The ClickFix Ruse
The group’s latest scheme relies on the so-called “ClickFix” technique. Victims are socially engineered - often via fake support messages - to paste a command into the Windows Run dialog. The command leverages curl.exe to fetch a PowerShell script from a domain that mimics Microsoft, exploiting users’ trust in familiar brands. The script itself runs filelessly, leaving almost no trace on disk.
SentinelOne Turned Against Itself
The attack doesn’t stop at initial compromise. The PowerShell script downloads a malicious MSI package, which drops a doctored DLL file - masquerading as part of SentinelOne’s endpoint security software - into the victim’s system. When the legitimate SentinelAgentWorker.exe runs, it unwittingly loads the rogue DLL, granting attackers encrypted, persistent access, all while hiding in plain sight.
Living Off the Land for Stealth
Storm-0249 further evades detection by abusing built-in Windows utilities like reg.exe and findstr.exe to extract unique system identifiers (such as MachineGuid). These identifiers are then used to bind ransomware encryption keys to specific machines, ensuring that only the attackers can decrypt the files - even if the malware is captured or reverse-engineered.
The New Face of Ransomware
This campaign marks a departure from scattershot phishing to highly targeted, technically sophisticated attacks. By exploiting trust in signed, familiar processes and living-off-the-land techniques, Storm-0249 is raising the bar for stealth and persistence. For defenders, it’s a stark warning: the tools you trust most may now be your greatest liability.