Tuesday, April 15, 2025
Homecyber securityOrcinius Trojan Attacking Users Via Dropbox & Google Docs

Orcinius Trojan Attacking Users Via Dropbox & Google Docs

Published on

SIEM as a Service

Follow Us on Google News

 A newly identified multi-stage trojan, dubbed “Orcinius,” has been reported to exploit popular cloud services Dropbox and Google Docs as part of its attack strategy.

The sophisticated malware begins its assault with an innocuous-looking Excel spreadsheet, which contains a VBA macro modified through a technique known as ‘VBA stomping’.

Upon execution, this macro hooks into the Windows operating system, enabling the trojan to monitor and capture keystrokes and active windows.

- Advertisement - Google News

How Orcinius Operates

According to Broadcom reports, the initial attack vector of Orcinius is particularly insidious.

The Excel spreadsheet, once opened, triggers the VBA macro, which then initiates the download of secondary payloads from Dropbox and Google Docs.

This multi-stage approach allows the malware to evade traditional detection methods, making it a formidable threat.

The trojan’s ability to hook into the Windows OS and capture sensitive information like keystrokes and active windows further amplifies its danger, potentially leading to significant data breaches and financial losses for affected users.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Symantec has identified several indicators of this threat, including ISB.Downloader!gen60, ISB.Downloader!gen68, X97M.Zorex, Web.Reputation.1, and WS.Malware.1.

These indicators are crucial for detecting and mitigating the impact of Orcinius.

VMware Carbon Black products have also been updated to block and detect associated malicious indicators through existing policies.

The recommended policy includes blocking all types of malware from executing, whether known, suspect, or potentially unwanted programs (PUPs) and delaying execution for cloud scans to leverage the VMware Carbon Black Cloud reputation service fully.

As cyber threats evolve, individuals and organizations must stay vigilant and adopt robust cybersecurity measures.

"Is Your System Under Attack? Try Cynet XDR: Automated Detection & Response for Endpoints, Networks, & Users!"- Free Demo

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Use Microsoft Teams Chats to Deliver Malware to Windows PCs

A sophisticated cyberattack campaign has emerged, leveraging Microsoft Teams chats to infiltrate Windows PCs...

Apache Roller Vulnerability Allows Hackers to Bypass Access Controls

A newly disclosed vulnerability in Apache Roller, the popular open-source blog server, could allow...

Galaxy S24 Vulnerability Poses Risk of Unauthorized File Access

A security flaw in Samsung’s Quick Share feature for the Galaxy S24 series has...

Colleges and Schools Now Top Targets for Online Threat Actors

Across the globe, a new kind of threat is targeting the very institutions dedicated...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Use Microsoft Teams Chats to Deliver Malware to Windows PCs

A sophisticated cyberattack campaign has emerged, leveraging Microsoft Teams chats to infiltrate Windows PCs...

Apache Roller Vulnerability Allows Hackers to Bypass Access Controls

A newly disclosed vulnerability in Apache Roller, the popular open-source blog server, could allow...

Galaxy S24 Vulnerability Poses Risk of Unauthorized File Access

A security flaw in Samsung’s Quick Share feature for the Galaxy S24 series has...