Threat actors exploit the company certificates to sign the attachment to decept the anti virus. Goal: to let the victims download and install QBot malware.
A mail or a SMS asks users to pay a residual colissimo shipping cost, opening a link. It redirect to a fake La Poste login site. The goal is to steal PII and sensitive data.
The cybersecurity expert Pierluigi Paganini: On November 26, leaking the data stolen begun: an archive of 3.03GB that accounts for 2% of the total amount of stolen data.
The .jar attachment downloads the malware. This is a Trojan, capable of stealing credentials and loading additional malicious payloads into the victim's PC.
It has been discovered by the cybersecurity expert MalwareHunterTeam. The lure is a supposed unusually activity on the victim’s account. The goal: steal PII and sensitive data.
The link in the messages directs the victim to a url (different for each email) and downloads an SCR, a VBS or a doc, which activate the malware infection.