The email contains a compressed attachment with an executable inside. Launching it installs the malware. It sends, via SMTP, emails with the stolen data.
CISA-CNMF cyber security experts: It’s a malware, used by a sophisticated cyber actor, to deploy a RAT. Once it has persistance, a second file delete the dropper.
ESET cybersecurity experts: The cyber espionage group’s new malware, SpyC23.A, has extended functionality. It exploits a fake app store to distribute it.
A link in the email downloads a .doc file, which then downloads a DLL and infects the pc with malware. The attachment exploits the same template as Emotet.
The malware infection chain is the same type as that used two weeks ago. Xls attachment contacts specific url, from which a DLL is downloaded infecting the victim.
Bleeping Computer cybersecurity experts: The group behind the malware put $1 million on a hacker forum to show its “force”. It looks for skilled penetration testers and hackers.
Fake email from an alleged "professional technical employee" with .ace attachment. Inside there is an executable with malware. The data is exfiltrated via email.
Mallu Cyber Soldiers underline the cybersecurity Expert Nitin Pandey exhortation to pass ASAP the Personal Data Protection Bill 2019 to increase Privacy and Safety.