Tuesday, February 11, 2025
HomeCyber Security NewsHackers Trick Users With Data Leak Message to Deploy Malware

Hackers Trick Users With Data Leak Message to Deploy Malware

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered the spread of a malicious exe file that targets specific individuals and is disguised as information related to a personal data leak.

The malware functions as a backdoor, executing obfuscated commands in XML format after receiving them from the threat actor.

Because this malware is focused on specific targets, users should avoid opening attachments in emails from unknown senders.

Malicious exe File Disguised as a Word File

According to the AhnLab Security Emergency Response Center (ASEC), an email purporting to be from a cyber investigation team was sent. Furthermore, the infected exe file was pretended to be a Word document.

https://i0.wp.com/asec.ahnlab.com/wp-content/uploads/2023/12/image-31.png?resize=1024%2C619&ssl=1
An email impersonating a cyber investigation team

“When the malicious exe file is executed, the files in the .data section are created into the %Programdata% folder. Out of the created files, all files are obfuscated except for the legitimate doc file”, ASEC said in a report shared with Cyber Security News.

https://i0.wp.com/asec.ahnlab.com/wp-content/uploads/2023/12/image-16.png?resize=1024%2C530&ssl=1
The malicious exe file disguised as a Word file

Except for the legitimate doc file, every file that was generated is obfuscated as given below:

  • Lomd02.png (Malicious jse script)
  • Operator.jse (Malicious jse script)
  • WindowsHotfixUpdate.jse (Malicious jse script)
  • 20231126_9680259278.doc (Legitimate doc file)
  • WindowsHotfixUpdate.ps1 (Malicious PowerShell script)

Researchers said among the newly generated files is a valid document file called ‘20231126_9680259278.doc’. This was most likely included by the threat actor to trick the user into thinking they had opened a legitimate file.

Because the C2 was closed in this case, the malware’s ultimate action was not visible; however, researchers say it functions as a backdoor by receiving obfuscated commands from the threat actor and executing them in XML format.

In this scenario, normal users are unable to detect that their PCs are infected with malware because the bait file is executed concurrently.

Hence, individuals should avoid opening attachments from emails they receive from unidentified sources since these malicious files are meant to target individual people.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Authorities Seize 8Base Ransomware Dark Web Site, Arrest Four Key Operators

Thai authorities arrested four European hackers in Phuket on February 10, 2025, for their...

12,000+ KerioControl Firewalls Exposed to 1-Click RCE Attack

Cybersecurity researchers caution that over 12,000 instances of GFI KerioControl firewalls remain unpatched and...

Apple iOS 0-day Vulnerability Exploited Wild in Extremely Sophisticated Attack

Apple has released emergency security updates to address a zero-day vulnerability, CVE-2025-24200, that has...

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Authorities Seize 8Base Ransomware Dark Web Site, Arrest Four Key Operators

Thai authorities arrested four European hackers in Phuket on February 10, 2025, for their...

12,000+ KerioControl Firewalls Exposed to 1-Click RCE Attack

Cybersecurity researchers caution that over 12,000 instances of GFI KerioControl firewalls remain unpatched and...

Apple iOS 0-day Vulnerability Exploited Wild in Extremely Sophisticated Attack

Apple has released emergency security updates to address a zero-day vulnerability, CVE-2025-24200, that has...