Sunday, January 26, 2025
HomeComputer SecurityHackers Launching a Fast-changing Malware Attack using .DOC Extention via Malspam...

Hackers Launching a Fast-changing Malware Attack using .DOC Extention via Malspam Emails

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered a new malware that rapidly changing its sophisticated behavior in order to escape from the email security protection and infection the victims.

It’s very common that threat actors spreading countless malware via email campaigns, at the same time email security providers are keep fighting with them to block and terminate it.

But attackers using sophisticated techniques to evade security detection leads to increase the success ratio of the infection.

In this case, malspam emails are being sent to the targeted victims using automatically downloads a Word template using a .doc extension.

Unlike many attacks that use a single pattern with slight customizations, this attack uses a variety of different subject lines, email content, email addresses, display name spoofs, and destination URLs.

Also Attackers masquerading as a confirmation on a paid invoice that fooled users to click and open it to initiate the infection process.

Mostly attackers spoofing the email address to send the malspam email that contains a malicious link that points back to a compromised website where the malware will be ready to infect the system.

Also Read: Certified Advanced Persistent Threat Analyst online course

According to greathorn “Initially, this attack pattern identified  at 12:24pm on Wednesday, February 20th, the attack has (so far) consisted of three distinct waves, each wave corresponding with a different destination URL, one at 12:24pm ET, one 2:05pm ET, and a third at 2:55pm ET, suggesting an attack pattern that anticipated and planned for relatively quick shutdowns of the destination URLs. “

Cybercriminals mainly using many of the compromised accounts for phishing emails to target the victims especially the corporate employees.

“A small handful of attacks were highly targeted, appearing to be from another employee at the recipient’s organization and with customized subject and display names”.

GreatHorn researchers continuously monitoring this malware and its new attack pattern and provide additional information and remediation support.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

OceanLotus(APT32) Threat Actor Group Deliver KerrDown Malware Via Word Document and RAR Archive

Qealler – Heavily Obfuscated JAR-based Password Stealer Malware Delivered Through Invoice-related Files

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Beware of Fake Captcha Verifications Spreading Lumma Malware

In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA...

GhostGPT – Jailbreaked ChatGPT that Creates Malware & Exploits

Artificial intelligence (AI) tools have revolutionized how we approach everyday tasks, but they also...

Murdoc Botnet Exploiting AVTECH Cameras & Huawei Routers to Gain Complete Control

Researchers have identified an active malware campaign involving a Mirai botnet variant, dubbed Murdoc,...