Register now for better personalized quote!

This phishing attack delivers three forms of malware. And they all want to steal your data

May, 16, 2022 Hi-network.com

A phishing campaign targeting Microsoft Windows users delivers three different forms of malware, all designed to steal sensitive information from victims.

Detailed by cybersecurity researchers at Fortinet, those who unintentionally run the malicious attachment sent in phishing emails fall victim to AveMariaRAT, BitRAT and PandoraHVNC trojan malware.

The campaign allows cyber criminals to steal usernames, passwords and other sensitive information, including bank details. BitRAT is particularly dangerous to victims, because it can take full control of infected Windows systems, complete with the ability to view webcam activity, listen to audio through the microphone, secretly mine for cryptocurrency that goes into a wallet owned by the attackers and download additional malicious files.

Security

  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next

The initial phishing message is designed to look like a payment report from a trusted source, with a short request to open an attached Microsoft Excel document.

SEE: Cybersecurity: Let's get tactical

This file contains malicious macros and researchers note that, when the document is opened, Microsoft Excel flags potential security concerns about the use of macros. If the user ignores this message and opens the file, it starts the process of delivering malware.

Using Visual Basic Application (VBA) scripts and PowerShell, the malware is retrieved for installation onto the victim's machine. The PowerShell code is split into three parts for the three different forms of malware, which can each be installed.

The research does not detail why the phishing email delivers three malware payloads, but it's likely that with three different forms of malware to deploy, there's a greater chance of the cyber criminals being able to gain access to whatever sensitive information they're looking to steal.

Phishing remains one of the most common methods cyber criminals use to deliver malware because, put simply, it's effective -but there are things that can be done to avoid falling victim.

Users should be wary of unexpected emails claiming to contain important information hidden in attachments -particularly if that attachment requires you to enable macros first. If possible, for example, if the email claims to come from a college or business associate, you could contact them using a different method than email to check if it's really them who sent the email.

Businesses can also help employees avoid falling victim to phishing emails by using appropriate anti-spam and anti-virus software, as well a training users on how to spot and report phishing emails. 

MORE ON CYBERSECURITY

  • Cloud computing security: New guidance aims to keep your data safe from cyberattacks and breaches
  • Beware: This cheap and 'homemade' malware is surprisingly effective
  • A security researcher easily found my passwords and more: How my digital footprints left me surprisingly over-exposed
  • This phishing campaign delivers malware that steals your passwords and chat logs
  • Phishing emails targeting LinkedIn accounts are on the rise. Here's what to watch out for

tag-icon Hot Tags : Tech Security

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.