The email, referring to an account statement of Garanti BBVA, now also contains an IBAN. The attachment is a compressed file in z format with an exe inside: the malware.
The message template is identical to the previous one, except for the dates and the name of the attachment: 25_153325_221122_113030.7z. Inside is an exe, the malware, which exfiltrates stolen data via SMTP.
Cleafy cybersecurity experts: Threat actors behind the malware now target a specific financial institution at a time, and change their focus only once the victim starts to implement countermeasures.
US cyber security experts: BeagleBoyz gang is targeting organizations with Op. “FASTCash 2.0”, in an ongoing cyber-enabled bank robbery scheme, attempting to steal $2 Billions.
Kaspersky cyber security experts: The APT is about to begin the final stage of it’s operation and cash out the funds. Many elements confirm that is the work of the russian-speaking hackers.