<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Czech-Republic — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/czech-republic/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 16 Apr 2026 10:00:33 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/czech-republic/feed.xml" rel="self" type="application/rss+xml"/><item><title>PowMix Botnet Targeting Czech Workforce</title><link>https://feed.craftedsignal.io/briefs/2026-04-powmix/</link><pubDate>Thu, 16 Apr 2026 10:00:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-powmix/</guid><description>The PowMix botnet campaign targets Czech organizations, particularly HR, legal, and recruitment agencies, using compliance-themed lures delivered via phishing emails, with the attack employing a Windows shortcut file that executes a PowerShell loader to bypass AMSI and deploy the botnet payload in memory.</description><content:encoded><![CDATA[<p>The PowMix botnet campaign, active since at least December 2025, is targeting the Czech workforce. The attackers are using compliance-themed lures impersonating legitimate brands such as EDEKA and referencing the Czech Data Protection Act. These lures are distributed via malicious ZIP files, potentially through phishing emails, and aim to compromise victims in HR, legal, and recruitment agencies, as well as job aspirants in IT, finance, and logistics. PowMix employs randomized command-and-control (C2) beaconing intervals and embeds encrypted heartbeat data into C2 URL paths, mimicking legitimate REST API URLs to evade network signature detections. The botnet can dynamically update the C2 domain in its configuration file and abuses the Heroku cloud platform for C2 operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attack begins with a phishing email containing a malicious ZIP file.</li>
<li>The victim opens the ZIP file and executes a Windows shortcut (.LNK) file.</li>
<li>The .LNK file executes an embedded PowerShell loader script.</li>
<li>The PowerShell script creates a copy of the ZIP file and its contents in the victim&rsquo;s &ldquo;ProgramData&rdquo; folder.</li>
<li>The PowerShell script bypasses AMSI by setting the <code>amsiInitFailed</code> field to <code>true</code>.</li>
<li>The PowerShell script extracts the PowMix botnet payload from the ZIP archive using a hardcoded delimiter (&ldquo;zAswKoK&rdquo;).</li>
<li>The extracted payload is a secondary PowerShell script that is reconstructed by replacing placeholders.</li>
<li>The secondary PowerShell script is executed in memory using <code>Invoke-Expression</code> (IEX), establishing communication with the C2 server on Heroku.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This campaign targets Czech organizations across various levels, with a focus on HR, legal, and recruitment sectors. If successful, the attacker gains control over the infected machine, potentially enabling data theft, espionage, or further malicious activities. The final payload and ultimate intent of the attackers remain unknown, but the botnet could be used for various purposes, including distributed denial-of-service (DDoS) attacks or as a foothold for lateral movement within the victim&rsquo;s network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for PowerShell executing from unusual locations like the <code>ProgramData</code> folder to detect initial execution (see Sigma rule: &ldquo;Detect PowerShell Executing from ProgramData&rdquo;).</li>
<li>Deploy the Sigma rule &ldquo;Detect AMSI Bypass via Reflection&rdquo; to identify attempts to disable the Antimalware Scan Interface.</li>
<li>Monitor network connections for traffic to <code>*.herokuapp.com</code> initiated by unusual processes, which may indicate C2 communication (see IOCs and Sigma rule: &ldquo;Detect Heroku C2 Communication&rdquo;).</li>
<li>Inspect PowerShell command lines for the presence of the <code>Invoke-Expression</code> command, which is used to execute the payload in memory (see Sigma rule: &ldquo;Detect PowerShell IEX with Suspicious Parameters&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>powmix</category><category>botnet</category><category>czech-republic</category><category>heroku</category></item></channel></rss>