Thursday, April 17, 2025
Homecyber securityThreat Actors Use Windows Screensaver Files as Malware Delivery Method

Threat Actors Use Windows Screensaver Files as Malware Delivery Method

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity experts at Symantec have uncovered a sophisticated phishing campaign targeting various sectors across multiple countries, leveraging the Windows screensaver file format (.scr) as a vector for malware distribution.

This method, while seemingly innocuous, allows attackers to execute malicious code under the guise of a harmless screensaver file.

Campaign Overview

The campaign, observed by Symantec, involves threat actors impersonating a reputable Taiwanese logistics company.

- Advertisement - Google News

The phishing emails, written in Chinese, purport to provide updates on international shipments, specifically targeting recipients with a fictitious logistics notification.

The email subject line reads, “//AMD ISF + AMD BL DRAFT // 聯盛 – 裝船通知單 – 4/7 結關 KAO TO ATLANTA,GA VIA NYC CFS【友鋮】SO.N023,” and requests verification of shipping details along with accompanying documents.

Malicious Payload Delivery

Attached to these emails is a malicious archive titled “景大 台北港ISF (032525) – invoice# JN-032525C – KAO TO ATLANTA,GA VIA NYC CFS【友鋮】SO.N023.xlsx.rar.”

Within this archive lies a .SCR file, which, when executed, deploys ModiLoader, a Delphi-based malware loader known for its versatility in deploying various types of malware.

This loader has been observed distributing threats like Remcos, Agent Tesla, MassLogger, AsyncRAT, and Formbook, among others.

The campaign targets a diverse range of sectors including Industrial Machinery Manufacturing, Publishing, Broadcasting, Automotive Manufacturing, Electronics, Adhesive Products Manufacturing, Conglomerate (Automotive, Aerospace), Sanitary Ware Retail, Abrasive Products Manufacturing, and Theme Park industries.

The countries affected include Japan, the United Kingdom, Sweden, the United States, Hong Kong, Taiwan, Thailand, and Malaysia.

Symantec has implemented several protective measures to mitigate this threat:

  • Adaptive-based: Identified as ACM.Untrst-RunSys!g1, Symantec’s adaptive protection mechanisms are designed to detect and block such threats.
  • Carbon Black-based: VMware Carbon Black products have policies in place to block all types of malware, including known, suspect, and potentially unwanted programs (PUPs), with a recommendation to delay execution for cloud scanning to leverage the reputation service.
  • Email-based: Symantec’s email security products and Email Threat Isolation (ETI) technology provide an additional layer of defense against phishing attempts.
  • File-based: The malware is detected as Trojan.Gen.MBT and Scr.Malcode!gen19, ensuring that malicious files are identified and blocked.
  • Machine Learning-based: Heur.AdvML.B is used to detect advanced machine learning-based threats.

This campaign underscores the ongoing evolution of cyber threats, where attackers continue to exploit seemingly benign file formats to deliver sophisticated malware.

Organizations are urged to remain vigilant, update their security measures, and educate employees about the risks associated with opening unexpected attachments, even if they appear to come from legitimate sources.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...