Cybersecurity experts at Symantec have uncovered a sophisticated phishing campaign targeting various sectors across multiple countries, leveraging the Windows screensaver file format (.scr) as a vector for malware distribution.
This method, while seemingly innocuous, allows attackers to execute malicious code under the guise of a harmless screensaver file.
The campaign, observed by Symantec, involves threat actors impersonating a reputable Taiwanese logistics company.
The phishing emails, written in Chinese, purport to provide updates on international shipments, specifically targeting recipients with a fictitious logistics notification.
The email subject line reads, “//AMD ISF + AMD BL DRAFT // 聯盛 – 裝船通知單 – 4/7 結關 KAO TO ATLANTA,GA VIA NYC CFS【友鋮】SO.N023,” and requests verification of shipping details along with accompanying documents.
Attached to these emails is a malicious archive titled “景大 台北港ISF (032525) – invoice# JN-032525C – KAO TO ATLANTA,GA VIA NYC CFS【友鋮】SO.N023.xlsx.rar.”
Within this archive lies a .SCR file, which, when executed, deploys ModiLoader, a Delphi-based malware loader known for its versatility in deploying various types of malware.
This loader has been observed distributing threats like Remcos, Agent Tesla, MassLogger, AsyncRAT, and Formbook, among others.
The campaign targets a diverse range of sectors including Industrial Machinery Manufacturing, Publishing, Broadcasting, Automotive Manufacturing, Electronics, Adhesive Products Manufacturing, Conglomerate (Automotive, Aerospace), Sanitary Ware Retail, Abrasive Products Manufacturing, and Theme Park industries.
The countries affected include Japan, the United Kingdom, Sweden, the United States, Hong Kong, Taiwan, Thailand, and Malaysia.
Symantec has implemented several protective measures to mitigate this threat:
This campaign underscores the ongoing evolution of cyber threats, where attackers continue to exploit seemingly benign file formats to deliver sophisticated malware.
Organizations are urged to remain vigilant, update their security measures, and educate employees about the risks associated with opening unexpected attachments, even if they appear to come from legitimate sources.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!
Verizon Business's 2025 Data Breach Investigations Report (DBIR), released on April 24, 2025, paints a…
A recent cyber espionage campaign by the notorious Lazarus Advanced Persistent Threat (APT) group, tracked…
In a alarming cybersecurity breach uncovered by Cisco Talos in 2023, a critical infrastructure enterprise…
In a startling revelation from Microsoft Threat Intelligence, threat actors are increasingly targeting unsecured Kubernetes…
A recently uncovered cyberattack campaign has brought steganography back into the spotlight, showcasing the creative…
Threat actors exploited a zero-day vulnerability in Ivanti Connect Secure, identified as CVE-2025-0282, to deploy…