• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
military themed email scam spreads malware to infect pakistani users

Military-themed Email Scam Spreads Malware to Infect Pakistani Users

You are here: Home / General Cyber Security News / Military-themed Email Scam Spreads Malware to Infect Pakistani Users
June 21, 2024

Cybersecurity researchers have lose gentle on a new phishing campaign that has been recognized as focusing on people today in Pakistan working with a tailor made backdoor.

Dubbed PHANTOM#SPIKE by Securonix, the unfamiliar menace actors behind the action have leveraged military-relevant phishing documents to activate the an infection sequence.

“Though there are many techniques employed today to deploy malware, the risk actors made use of ZIP files with a password-guarded payload archive contained within,” researchers Den Iuzvyk, Tim Peck, and Oleg Kolesnikov stated in a reportreport shared with The Hacker News.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The marketing campaign is notable for its deficiency of sophistication and the use of uncomplicated payloads to realize remote entry to target machines.

Cybersecurity

The email messages arrive bearing a ZIP archive that purports to be assembly minutes relevant to the Worldwide Navy-Technical Forum Army 2024, a genuine event structured by the Ministry of Protection of the Russian Federation. It’s established to be held in Moscow in mid-August 2024.

Current within the ZIP file is a Microsoft Compiled HTML Aid (CHM) file and a hidden executable (“RuntimeIndexer.exe”), the previous of which, when opened, shows the conference minutes as very well as a pair of visuals, but stealthily operates the bundled binary as soon as the user clicks wherever on the doc.

The executable is made to functionality as a backdoor that establishes connections with a distant server over TCP in get to retrieve instructions that are subsequently run on the compromised host.

PHANTOM#SPIKE Malware

In addition to passing together system facts, it executes the instructions through cmd.exe, gathers the output of the procedure, and exfiltrates it back to the server. This includes working commands like systeminfo, tasklist, curl to extract the general public IP deal with using ip-api[.]com, and schtasks to set up persistence.

“This backdoor effectively functions as a command line-dependent distant entry trojan (RAT) that provides the attacker with persistent, covert, and secure access to the contaminated system,” the researchers mentioned.

“The capability to execute commands remotely and relay the benefits back again to the C2 server makes it possible for the attacker to management the infected technique, steal sensitive information or execute further malware payloads.”

Discovered this report fascinating? Follow us on Twitter  and LinkedIn to examine additional distinctive information we put up.


Some elements of this write-up are sourced from:
thehackernews.com

Previous Post: «oyster backdoor spreading via trojanized popular software downloads Oyster Backdoor Spreading via Trojanized Popular Software Downloads
Next Post: Chinese Hackers Deploy SpiceRAT and SugarGh0st in Global Espionage Campaign chinese hackers deploy spicerat and sugargh0st in global espionage campaign»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.