• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
military themed email scam spreads malware to infect pakistani users

Military-themed Email Scam Spreads Malware to Infect Pakistani Users

You are here: Home / General Cyber Security News / Military-themed Email Scam Spreads Malware to Infect Pakistani Users
June 21, 2024

Cybersecurity researchers have lose gentle on a new phishing campaign that has been recognized as focusing on people today in Pakistan working with a tailor made backdoor.

Dubbed PHANTOM#SPIKE by Securonix, the unfamiliar menace actors behind the action have leveraged military-relevant phishing documents to activate the an infection sequence.

“Though there are many techniques employed today to deploy malware, the risk actors made use of ZIP files with a password-guarded payload archive contained within,” researchers Den Iuzvyk, Tim Peck, and Oleg Kolesnikov stated in a reportreport shared with The Hacker News.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The marketing campaign is notable for its deficiency of sophistication and the use of uncomplicated payloads to realize remote entry to target machines.

Cybersecurity

The email messages arrive bearing a ZIP archive that purports to be assembly minutes relevant to the Worldwide Navy-Technical Forum Army 2024, a genuine event structured by the Ministry of Protection of the Russian Federation. It’s established to be held in Moscow in mid-August 2024.

Current within the ZIP file is a Microsoft Compiled HTML Aid (CHM) file and a hidden executable (“RuntimeIndexer.exe”), the previous of which, when opened, shows the conference minutes as very well as a pair of visuals, but stealthily operates the bundled binary as soon as the user clicks wherever on the doc.

The executable is made to functionality as a backdoor that establishes connections with a distant server over TCP in get to retrieve instructions that are subsequently run on the compromised host.

PHANTOM#SPIKE Malware

In addition to passing together system facts, it executes the instructions through cmd.exe, gathers the output of the procedure, and exfiltrates it back to the server. This includes working commands like systeminfo, tasklist, curl to extract the general public IP deal with using ip-api[.]com, and schtasks to set up persistence.

“This backdoor effectively functions as a command line-dependent distant entry trojan (RAT) that provides the attacker with persistent, covert, and secure access to the contaminated system,” the researchers mentioned.

“The capability to execute commands remotely and relay the benefits back again to the C2 server makes it possible for the attacker to management the infected technique, steal sensitive information or execute further malware payloads.”

Discovered this report fascinating? Follow us on Twitter  and LinkedIn to examine additional distinctive information we put up.


Some elements of this write-up are sourced from:
thehackernews.com

Previous Post: «oyster backdoor spreading via trojanized popular software downloads Oyster Backdoor Spreading via Trojanized Popular Software Downloads
Next Post: Chinese Hackers Deploy SpiceRAT and SugarGh0st in Global Espionage Campaign chinese hackers deploy spicerat and sugargh0st in global espionage campaign»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.