Reversing Labs cybersecurity experts: Who opened the malicious Word attachment is required to make multiple, additional clicks to activate the embedded malware.
The Omicron COVID-19 variant used by cybercrime to spread RedLine Stealer. FortiGuard cybersecurity experts found the “Omicron Stats.exe”, a variant of the malware. Probably, the infection vector is an email. Beware”
The Omicron COVID-19 variant has been used by cybercrime actors as a bait to spread RedLine Stealer. It has been discovered by FortiGuard Labs cybersecurity experts. Researchers came across a curiously named file, “Omicron Stats.exe”, which turned out to be a variant of the malware. “While we have not been able to identify the infection vector for this particular variant – they write in as blog post -, we believe that it is being distributed via email. Past RedLine Stealer variants are known to have been distributed in COVID-themed emails to lure victims. The file name of this current variant, ‘Omicron Stats.exe,’ was used just as the Omicron variant was becoming a global concern, following the pattern of previous variants. And given that this malware is embedded in a document designed to be opened by a victim, we have concluded that email is the infection vector for this variant as well”.