Spam and phishing mail

Malicious News – Birth, Death, Spy Scandal

Ok Take a look at the following screenshots. What do you notice?

Subject: “Perfect gift for royal baby … a tree?” –  BreakingNews CNN

Subject: “Snowden able to leave Moscow airport” –  BreakingNews CNN

perfect_gift_for_royal_baby_01 perfect_gift_for_royal_baby_02

Well both unsurprisingly are using very topical headline grabbing news to entice us to click on the links. It seems that the spammers are using a template and then mix and match them. The first one is especially interesting as the subject is about the royal baby. We have blogged already about spam using this hot theme.

Either this is a mistake or a deliberate ploy by them. In any case it’s in very bad taste linking a happy, joyous event with such a tragedy!

We have seen many emails of this kind and with the same structure. Every letter has a “video” frame or a picture. Every link’s address is an infected page. You are then redirected several times before you reach the exploit. Kaspersky detects this as: HEUR:Exploit.Script.Generic. This exploit infects a computer with

Trojan-PSW.Win32.Fareit.pjt a password stealer. In particular it looks for browser cookies, ftp client credentials and email passwords.

Malicious News – Birth, Death, Spy Scandal

Your email address will not be published. Required fields are marked *

 

Reports

Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Lazarus covets COVID-19-related intelligence

As the COVID-19 crisis grinds on, some threat actors are trying to speed up vaccine development by any means available. We have found evidence that the Lazarus group is going after intelligence that could help these efforts by attacking entities related to COVID-19 research.

Sunburst: connecting the dots in the DNS requests

We matched private and public DNS data for the SUNBURST-malware root C2 domain with the CNAME records, to identify who was targeted for further exploitation. In total, we analyzed 1722 DNS records, leading to 1026 unique target name parts and 964 unique UIDs.

Subscribe to our weekly e-mails

The hottest research right in your inbox