Sunday, May 18, 2025
HomeCyber AttackThreat Actors Attacking U.S. Citizens Via Social Engineering Attack

Threat Actors Attacking U.S. Citizens Via Social Engineering Attack

Published on

SIEM as a Service

Follow Us on Google News

As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting U.S. citizens, according to a detailed report from Seqrite Labs.

Security researchers have uncovered a malicious campaign exploiting the tax season through sophisticated social engineering tactics, primarily phishing attacks.

These cybercriminals are deploying deceptive emails and malicious attachments to steal sensitive personal and financial information while distributing dangerous malware.

- Advertisement - Google News

The campaign leverages redirection techniques and malicious LNK files, such as “104842599782-4.pdf.lnk,” to trick users into executing harmful payloads disguised as legitimate tax documents.

social engineering Attack
Infection chain

This strategy preys on user trust, especially among vulnerable demographics like green card holders, small business owners, and new taxpayers, who may lack familiarity with government tax processes.

Stealerium Malware and Multi-Stage Infection Chain

The infection chain begins with phishing emails containing deceptive attachments that, once opened, execute a series of obfuscated payloads.

Seqrite Labs’ technical analysis reveals that these attachments embed Base64-encoded PowerShell commands, which download additional malicious files like “rev_pf2_yas.txt” and “revolaomt.rar” from attacker-controlled Command and Control (C2) servers.

The final payload, often named “Setup.exe” or “revolaomt.exe,” is a PyInstaller-packaged Python executable containing encrypted data that decrypts at runtime.

This leads to the deployment of Stealerium malware, a .NET-based information stealer (version 1.0.35), notorious for harvesting sensitive data from browsers, cryptocurrency wallets, and apps like Discord, Steam, and Telegram.

social engineering Attack
 .NET Base Malware sample

Stealerium also conducts extensive system reconnaissance, capturing Wi-Fi configurations, webcam screenshots, and even detecting adult content to trigger additional captures.

Its anti-analysis features, including sandbox evasion and mutex controls, make it particularly challenging to detect and mitigate.

The malware registers bots via HTTP POST requests to C2 servers like “hxxp://91.211.249.142:7816,” facilitating data exfiltration over web services.

Beyond credential theft, Stealerium targets gaming platforms, VPN credentials, and messenger apps, extracting data from tools like FileZilla, NordVPN, and Outlook.

It creates hidden directories in %LOCALAPPDATA% for persistence and employs AES-256 encryption to secure stolen data.

Seqrite Labs advises immediate caution, recommending advanced endpoint protection solutions to combat this evolving threat.

Staying vigilant against suspicious emails and attachments during tax season is critical to avoiding identity theft and financial loss.

Indicators of Compromise (IoCs)

File NameSHA-256
Setup.exe/revolaomt.exe6a9889fee93128a9cdcb93d35a2fec9c6127905d14c0ceed14f5f1c4f58542b8
104842599782-4.pdf.lnk48328ce3a4b2c2413acb87a4d1f8c3b7238db826f313a25173ad5ad34632d9d7
payload_1.ps1 / fgrsdt_rev_hx4_ln_x.txt10f217c72f62aed40957c438b865f0bcebc7e42a5e947051edee1649adf0cbf2
revolaomt.rar31705d906058e7324027e65ce7f4f7a30bcf6c30571aa3f020e91678a22a835a
104842599782-4.htmlff5e3e3bf67d292c73491fab0d94533a712c2935bb4a9135546ca4a416ba8ca1

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

VMware ESXi, Firefox, Red Hat Linux & SharePoint Hacked – Pwn2Own Day 2

Security researchers demonstrated their prowess on the second day of Pwn2Own Berlin 2025, discovering...

Critical WordPress Plugin Flaw Puts Over 10,000 Sites of Cyberattack

A serious security flaw affecting the Eventin plugin, a popular event management solution for...

Sophisticated NPM Attack Leverages Google Calendar2 for Advanced Communication

A startling discovery in the npm ecosystem has revealed a highly sophisticated malware campaign...