A new malware campaign that impersonates as legitimate staffing companies abuse messaging services to deliver More_eggs malware.
The campaign primarily targeted US companies that include retail, entertainment, pharmacy, and others that commonly employ online payments, such as online shopping portals.
Threat actors send direct message abusing Linkedin message service to the victim’s pretending to be from a staffing company offering employment.
Proofpoint researchers observed a
More_eggs Malware Campaign
Threat actors use to create a Linkedin profile targeting individuals in a certain company and send them invitations with a short message.
Following the message attackers will send an Email to target’s work address reminding about the invitation. The Email contains a direct link added within the body of Email or as a PDF attachment embedded with URL.
Upon clicking URL or opening the PDF it takes victims to a spoofed landing page that triggers the download of Microsoft Word file with malicious macros embedded. In some cases instead of Microsoft Word file, it is JScript loader.
The campaign was first spotted by Brian Krebs that targets specific anti-money laundering officers at credit unions.
Threat actors used number of tools to distribute the malware
Taurus Builder – Tool purchased from underground markets, used to create malicious word documents.
VenomKit – An exploit kit to maintain unauthorized access on compromised servers.
More_eggs – Downloaded malware that used to download additional payloads.
Threat actors continue to increase their sophistication methods to deliver malware using a variety of campaigns. Here you can see the complete list of IOCs.