Monday, July 15, 2024

Hackers Spreading Zeus Sphinx Malware to Hijack Windows Process Using Malformed MS Word Documents

Researchers uncovered a new malspam campaign through which cyber criminals launching Zeus Sphinx Malware via Coronavirus Lure Malformed MS documents.

Since the novel Coronavirus pandemic rapidly spreading country to country, threat actors taking advantage of the trending news to tempting victims and attack their systems with the large scale of malspam campaign.

Researchers from IBM X-FORCE observed the Zeus Sphinx Malware activities in 2019, since then the activities of this campaign rapidly increased and they are mainly targeting the government relief payments and also continue to focus bank sectors in US, Canada, and Australia.

Maldoc Spam Delivery

Cybercriminals taking advantage of trending COVID-19 theme to distributing the Malformed MS word document through phishing, spam campaign.

Spam email urge victims to open the attachment and fill the document to receive the compensation from the Government, and they are distributing a variety of documents and the majority of documents with .doc or .docx files

Later the document request victims to enable executing a macro to trigger the infection chain and ended up hijacking the windows process to fetch the malware downloader.

The malware downloader then communication with the command and control server to fetch the new Zeus Sphinx malware payload.

New Zeus Sphinx variant starts off with the weaponized document that creates a malicious folder under %SYSTEMDRIVE% and writes a batch file into it.

According to the IBM report ” Once on the device, Sphinx establishes persistence via commonly used methods to maintain its grasp on the end user’s machine. In this case, it writes numerous folders and files to disk and adds some Registry keys in order to hide and manage its configuration files over time. “

Sphinx also capable of collecting the online account credentials from banks and a wide range of other websites using a web injection technique that has inherited from its Zeus v2 codebase.

Indicators of Compromise (IoCs)




VBS sample: 2FC871107D46FA5AA8095B78D5ABAB78

Sphinx samples:


Also Read:

Chinese APT Hackers Exploit MS Word Bug to Drop Malware Via Weaponized Coronavirus Lure Documents

Hackers Attack Windows Users with Info-Stealer Malware via Weaponized MS Word Documents

Major Vulnerabilities in Top Free Android VPN Apps Let Hackers Stealing Passwords, Photos, Messages From 120 Million Users


Latest articles

Critical Cellopoint Secure Email Gateway Flaw Let Attackers Execute Arbitrary Code

A critical vulnerability has been discovered in the Cellopoint Secure Email Gateway, identified as...

Singapore Banks to Phase out OTPs for Bank Account Logins Within 3 Months

The Monetary Authority of Singapore (MAS) and The Association of Banks in Singapore (ABS)...

GuardZoo Android Malware Attacking military personnel via WhatsApp To Steal Sensitive Data

A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to...

ViperSoftX Weaponizing AutoIt & CLR For Stealthy PowerShell Execution

ViperSoftX is an advanced malware that has become more complicated since its recognition in...

Malicious NuGet Campaign Tricking Developers To Inject Malicious Code

Hackers often target NuGet as it's a popular package manager for .NET, which developers...

Akira Ransomware Attacking Airline Industry With Legitimate Tools

Airlines often become the target of hackers as they contain sensitive personal and financial...

DarkGate Malware Exploiting Excel Files And SMB File Shares

DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activity since September 2023, employing...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles