Multiple malware families were staged on the same web servers and distributed through mass phishing campaigns. Dridex, Gootkit, Nymaim, Trickbot, Fareit, Neutrino, AZORult, Gandcrab and Hermes have all been traced back to the FranTech websites. The servers Bromism identified were found to be using similar software builds, default installations of CentOS and Apache HTTP Server versions 2.4.6 or 2.2.15. The malicious executables that were found were nearly always hosted in their root directory.”]

