phishing tactics

Winsage
November 12, 2024
A new phishing campaign is using an Excel file to distribute a fileless version of the Remcos Remote Access Trojan (RAT). Researchers from Fortinet found that attackers are sending purchase order emails with an Excel attachment that exploits a remote code execution vulnerability in Office (CVE-2017-0199). Activating the file downloads an HTML Application (HTA) file from a remote server, which is launched via mshta.exe.malware. Remcos can log keystrokes, capture screenshots, and execute commands on compromised systems. This variant operates without leaving traditional file traces, making detection more difficult. Email phishing is a common method for cybercriminals to infect devices and steal sensitive information. Users are advised to be cautious with emails and attachments.
Winsage
September 23, 2024
A wave of cyberattacks has emerged, utilizing phishing emails that contain HTML attachments or malicious links. When recipients interact with these emails, a Java-based Remote Access Trojan (RAT) is deployed, allowing attackers to manage the victim's file system, monitor and control processes, remotely access the desktop, transfer files, capture keystrokes, take screenshots, and activate the webcam without the user's knowledge.
AppWizard
September 7, 2024
Researchers from McAfee have identified 280 counterfeit Android apps designed to infiltrate cryptocurrency wallets. These malicious apps exploit vulnerabilities by scanning devices for images containing mnemonic phrases used for account recovery. They masquerade as legitimate services and use phishing tactics to trick users into downloading them. Once installed, the apps can access sensitive information, including: - Contacts: Extracting the entire contact list. - SMS Messages: Capturing all incoming SMS messages, including two-factor authentication codes. - Photos: Uploading stored images to attackers' servers. - Device Information: Collecting details about the device, such as operating system version and phone numbers. McAfee emphasizes the importance of vigilance and recommends that users exercise caution when installing applications and granting permissions. They also highlight the necessity of security software to protect personal devices from such threats.
Search