Tim Brandom’s Post

View profile for Tim Brandom, graphic

Sr Business Operations Analyst at OneTrust

According to Proofpoint’s technical blog post shared with Hackread.com ahead of publishing, the attack campaign begins with phishing emails that seem to originate from legitimate tax agencies. These emails contain links directing the recipient to a landing page hosted on InfinityFree or directly to a malicious file. When victims click the “View Document” button on the landing page, the browser’s User Agent is checked. If the system is identified as Windows, the user is redirected to a search-ms URI, which silently prompts Windows Explorer to display a shortcut (LNK) file or a ZIP file disguised as a PDF. If the victim executes the LNK file, it triggers a series of actions leading to the deployment of the Voldemort malware. This malware is capable of collecting system information, uploading files, and executing additional commands from a command-and-control (C2) server.

View profile for Garett Moreau 🇺🇸, graphic

World-Class Managed IT; Leader in CySec; Forensics Examiner; IT Polymath; Information Dominance

"The Voldemort Malware campaign is spreading globally with over 20,000 phishing emails sent to more than 70 organizations, with a peak of 6,000 emails sent in a single day." The Voldemort campaign employs a complex attack chain, combining both common and unusual techniques. One of the most notable aspects is the use of Google Sheets for command-and-control operations. This is an unusual method that highlights the creativity of the bad guys. https://lnkd.in/gwVBjuhd #auguryit #cysec

New Voldemort Malware Uses Google Sheets to Target Key Sectors Globally

New Voldemort Malware Uses Google Sheets to Target Key Sectors Globally

https://hackread.com

To view or add a comment, sign in

Explore topics