The email xls attachment contacts a single link and downloads the dll, starting the malware infection chain. But only from Italian IPs and not on the blacklist.
The email xls attachment contacts a single link and downloads the dll, activating the malware infection. Provided that the IP is Italian and not on the blacklist.
The bait are false invoice offsets. The xls attachment contacts single link from which it downloads the dll, starting the malware infection. But only from Italian IPs.
The xls attachment contacts a single link and downloads the dll, which activates the malware infection. Provided that the IP is Italian and not on the blacklist.
The xlsm attachment contacts a single url from which it downloads the dll, starting the malware infection. But only from Italian IPs and if they’re not blacklisted.
The xlsm attachment contacts single url from which it downloads the dll, starting malware infection. But only from Italian IPs and if they are not blacklisted.
The email xlsm attachment contacts single url from which it downloads the dll, which starts malware infection. But only from Italian IPs and if they are not blacklisted.
The attack is part of the TA551 (Shathak) offensive. The doc file in the email zip attachment contacts a url to download the dll and start malware infection.
The attack is part of the TA551 (Shathak) campaign. The xlsm file in the email zip attachment contacts internal URLs to download the dll, starting malware infection.