Spam and phishing mail

Malicious News – Birth, Death, Spy Scandal

Ok Take a look at the following screenshots. What do you notice?

Subject: “Perfect gift for royal baby … a tree?” –  BreakingNews CNN

Subject: “Snowden able to leave Moscow airport” –  BreakingNews CNN

perfect_gift_for_royal_baby_01 perfect_gift_for_royal_baby_02

Well both unsurprisingly are using very topical headline grabbing news to entice us to click on the links. It seems that the spammers are using a template and then mix and match them. The first one is especially interesting as the subject is about the royal baby. We have blogged already about spam using this hot theme.

Either this is a mistake or a deliberate ploy by them. In any case it’s in very bad taste linking a happy, joyous event with such a tragedy!

We have seen many emails of this kind and with the same structure. Every letter has a “video” frame or a picture. Every link’s address is an infected page. You are then redirected several times before you reach the exploit. Kaspersky detects this as: HEUR:Exploit.Script.Generic. This exploit infects a computer with

Trojan-PSW.Win32.Fareit.pjt a password stealer. In particular it looks for browser cookies, ftp client credentials and email passwords.

Malicious News – Birth, Death, Spy Scandal

Your email address will not be published. Required fields are marked *

 

Reports

Lyceum group reborn

According to older public researches, Lyceum conducted operations against organizations in the energy and telecommunications sectors across the Middle East. In 2021, we have been able to identify a new cluster of the group’s activity, focused on two entities in Tunisia.

GhostEmperor: From ProxyLogon to kernel mode

While investigating a recent rise of attacks against Exchange servers, we noticed a recurring cluster of activity that appeared in several distinct compromised networks. With a long-standing operation, high profile victims, advanced toolset and no affinity to a known threat actor, we decided to dub the cluster GhostEmperor.

APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

Subscribe to our weekly e-mails

The hottest research right in your inbox