Sunday, April 13, 2025
Homecyber securityThreat Actors Use Windows Screensaver Files as Malware Delivery Method

Threat Actors Use Windows Screensaver Files as Malware Delivery Method

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity experts at Symantec have uncovered a sophisticated phishing campaign targeting various sectors across multiple countries, leveraging the Windows screensaver file format (.scr) as a vector for malware distribution.

This method, while seemingly innocuous, allows attackers to execute malicious code under the guise of a harmless screensaver file.

Campaign Overview

The campaign, observed by Symantec, involves threat actors impersonating a reputable Taiwanese logistics company.

- Advertisement - Google News

The phishing emails, written in Chinese, purport to provide updates on international shipments, specifically targeting recipients with a fictitious logistics notification.

The email subject line reads, “//AMD ISF + AMD BL DRAFT // 聯盛 – 裝船通知單 – 4/7 結關 KAO TO ATLANTA,GA VIA NYC CFS【友鋮】SO.N023,” and requests verification of shipping details along with accompanying documents.

Malicious Payload Delivery

Attached to these emails is a malicious archive titled “景大 台北港ISF (032525) – invoice# JN-032525C – KAO TO ATLANTA,GA VIA NYC CFS【友鋮】SO.N023.xlsx.rar.”

Within this archive lies a .SCR file, which, when executed, deploys ModiLoader, a Delphi-based malware loader known for its versatility in deploying various types of malware.

This loader has been observed distributing threats like Remcos, Agent Tesla, MassLogger, AsyncRAT, and Formbook, among others.

The campaign targets a diverse range of sectors including Industrial Machinery Manufacturing, Publishing, Broadcasting, Automotive Manufacturing, Electronics, Adhesive Products Manufacturing, Conglomerate (Automotive, Aerospace), Sanitary Ware Retail, Abrasive Products Manufacturing, and Theme Park industries.

The countries affected include Japan, the United Kingdom, Sweden, the United States, Hong Kong, Taiwan, Thailand, and Malaysia.

Symantec has implemented several protective measures to mitigate this threat:

  • Adaptive-based: Identified as ACM.Untrst-RunSys!g1, Symantec’s adaptive protection mechanisms are designed to detect and block such threats.
  • Carbon Black-based: VMware Carbon Black products have policies in place to block all types of malware, including known, suspect, and potentially unwanted programs (PUPs), with a recommendation to delay execution for cloud scanning to leverage the reputation service.
  • Email-based: Symantec’s email security products and Email Threat Isolation (ETI) technology provide an additional layer of defense against phishing attempts.
  • File-based: The malware is detected as Trojan.Gen.MBT and Scr.Malcode!gen19, ensuring that malicious files are identified and blocked.
  • Machine Learning-based: Heur.AdvML.B is used to detect advanced machine learning-based threats.

This campaign underscores the ongoing evolution of cyber threats, where attackers continue to exploit seemingly benign file formats to deliver sophisticated malware.

Organizations are urged to remain vigilant, update their security measures, and educate employees about the risks associated with opening unexpected attachments, even if they appear to come from legitimate sources.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...