• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new phishing attack uses clever microsoft office trick to deploy

New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport RAT

You are here: Home / General Cyber Security News / New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport RAT
March 19, 2024

A new phishing campaign is concentrating on U.S. businesses with the intent to deploy a distant access trojan called NetSupport RAT.

Israeli cybersecurity enterprise Notion Level is tracking the activity under the moniker Procedure PhantomBlu.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“The PhantomBlu procedure introduces a nuanced exploitation technique, diverging from NetSupport RAT’s common delivery system by leveraging OLE (Item Linking and Embedding) template manipulation, exploiting Microsoft Workplace doc templates to execute destructive code when evading detection,” security researcher Ariel Davidpur mentioned.

NetSupport RAT is a destructive offshoot of a genuine remote desktop tool recognised as NetSupport Supervisor, allowing for danger actors to conduct a spectrum of knowledge accumulating steps on a compromised endpoint.

Cybersecurity

The commencing stage is a Wage-themed phishing email that purports to be from the accounting section and urges recipients to open up the hooked up Microsoft Phrase doc to look at the “month to month income report.”

A closer examination of the email concept headers – notably the Return-Path and Message-ID fields – reveals that the attackers use a authentic email marketing platform known as Brevo (previously Sendinblue) to deliver the e-mails.

The Term doc, upon opening, instructs the target to enter a password furnished in the email body and permit enhancing, adopted by double-clicking a printer icon embedded in the doc to look at the income graph.

Microsoft Office

Accomplishing so opens a ZIP archive file (“Chart20072007.zip”) made up of a single Windows shortcut file, which functions as a PowerShell dropper to retrieve and execute a NetSupport RAT binary from a remote server.

“By applying encrypted .docs to supply the NetSupport RAT by using OLE template and template injection, PhantomBlu marks a departure from the typical TTPs commonly associated with NetSupport RAT deployments,” Davidpur said, adding the current strategy “showcases PhantomBlu’s innovation in blending sophisticated evasion tactics with social engineering.”

Expanding Abuse of Cloud Platforms and Well-known CDNs

The development comes as Resecurity disclosed that risk actors are significantly abusing general public cloud solutions like Dropbox, GitHub, IBM Cloud, and Oracle Cloud Storage, as nicely as Web 3. facts-hosting platforms crafted on the InterPlanetary File Program (IPFS) protocol this sort of as Pinata to produce completely undetectable (FUD) phishing URLs working with phishing kits.

These FUD links are offered on Telegram by underground sellers like BulletProofLink, FUDLINKSHOP, FUDSENDER, ONNX, and XPLOITRVERIFIER for selling prices beginning at $200 per thirty day period as portion of a membership product. These inbound links are additional secured guiding antibot boundaries to filter incoming visitors and evade detection.

Cybersecurity

Also complementing these companies are resources like HeartSender that make it achievable to distribute the created FUD inbound links at scale. The Telegram group involved with HeartSender has virtually 13,000 subscribers.

“FUD Inbound links characterize the next phase in [phishing-as-a-service] and malware-deployment innovation,” the enterprise reported, noting attackers are “repurposing higher-name infrastructure for destructive use cases.”

“A single recent destructive campaign, which leveraged the Rhadamanthys Stealer to focus on the oil and gas sector, utilized an embedded URL that exploited an open up redirect on respectable domains, mainly Google Maps and Google Images. This domain-nesting method helps make destructive URLs fewer obvious and additional probably to entrap victims.”

Located this report exciting? Abide by us on Twitter  and LinkedIn to browse extra unique material we write-up.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «e root marketplace admin sentenced to 42 months for selling 350k E-Root Marketplace Admin Sentenced to 42 Months for Selling 350K Stolen Credentials
Next Post: Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices suspected russian data wiping 'acidpour' malware targeting linux x86 devices»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © TheCyberSecurity.News, All Rights Reserved.