Hackers Launching a Fast-changing Malware Attack using .DOC Extention via Malspam Emails

Researchers discovered a new malware that rapidly changing its sophisticated behavior in order to escape from the email security protection and infection the victims.

It’s very common that threat actors spreading countless malware via email campaigns, at the same time email security providers are keep fighting with them to block and terminate it.

But attackers using sophisticated techniques to evade security detection leads to increase the success ratio of the infection.

In this case, malspam emails are being sent to the targeted victims using automatically downloads a Word template using a .doc extension.

Unlike many attacks that use a single pattern with slight customizations, this attack uses a variety of different subject lines, email content, email addresses, display name spoofs, and destination URLs.

Also Attackers masquerading as a confirmation on a paid invoice that fooled users to click and open it to initiate the infection process.

Mostly attackers spoofing the email address to send the malspam email that contains a malicious link that points back to a compromised website where the malware will be ready to infect the system.

Also Read: Certified Advanced Persistent Threat Analyst online course

According to greathorn “Initially, this attack pattern identified  at 12:24pm on Wednesday, February 20th, the attack has (so far) consisted of three distinct waves, each wave corresponding with a different destination URL, one at 12:24pm ET, one 2:05pm ET, and a third at 2:55pm ET, suggesting an attack pattern that anticipated and planned for relatively quick shutdowns of the destination URLs. “

Cybercriminals mainly using many of the compromised accounts for phishing emails to target the victims especially the corporate employees.

“A small handful of attacks were highly targeted, appearing to be from another employee at the recipient’s organization and with customized subject and display names”.

GreatHorn researchers continuously monitoring this malware and its new attack pattern and provide additional information and remediation support.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

OceanLotus(APT32) Threat Actor Group Deliver KerrDown Malware Via Word Document and RAR Archive

Qealler – Heavily Obfuscated JAR-based Password Stealer Malware Delivered Through Invoice-related Files

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Open Source Linux Firewall IPFire 2.29 – Core Update 194 Released: What’s New!

IPFire, the powerful open-source firewall, has unveiled its latest release, IPFire 2.29 – Core Update…

2 hours ago

Threat Actors Leverage DDoS Attacks as Smokescreens for Data Theft

Distributed Denial of Service (DDoS) attacks, once seen as crude tools for disruption wielded by…

3 hours ago

20-Year-Old Proxy Botnet Network Dismantled After Exploiting 1,000 Unpatched Devices Each Week

A 20-year-old criminal proxy network has been disrupted through a joint operation involving Lumen’s Black…

3 hours ago

“PupkinStealer” – .NET Malware Steals Browser Data and Exfiltrates via Telegram

A new information-stealing malware dubbed “PupkinStealer” has emerged as a significant threat to individuals and…

3 hours ago

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs (Uniform…

3 hours ago

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations

Broadcom-owned VMware has released security patches addressing a moderate severity insecure file handling vulnerability in…

5 hours ago