Breaking

New phishing campaign drops two payloads in ‘Dali Masks’ threatening device security

One security researcher has identified a new phishing campaign that is distributing a LokiBot info-stealing malware and another payload called the Jigsaw Ransomware.

Hackers are now deploying more than one malware to ensure their attack is organized streamlined with better success rates. Hackers use this malware combo, to steal the usernames and passwords of different applications first, then they deploy the ransomware demanding ransom for the encryption.

This phishing campaign had attachments that had impersonated invoices, bank transfers, business inquiries, orders and more. Excel attachments such as Swift.xlsx, order.xlsx, Inquiry.xlsx and Invoice for payment.xlsx is used to lure the victims to download these attachments. A legitimate looking spreadsheets is the mere advantage for hackers, as most recipients will believe that those attachments are from the actual source itself.

Jame, a security researcher has identified this campaign, and mentioned that the attachment are weaponized with LCG kit, exploiting an old remote code execution vulnerability in Microsoft Office tracked as CVE-2017-11882 in Equation Editor.

How does this new phishing campaign work?

If the attachment is downloaded, the instructions in the file will download the malware from a remote site and starts executing its intended process. James had disclosed the cjjjjjjjjjjjjjjjjjjj.exe file, is the LokiBot and has the capabilities to steal credentials from mail, browsers, FTP, and other terminal applications. After stealing the details, it transfers the information through command and control server to the creators of the campaign.

Meanwhile, LokiBot also initiates the second attack vector by downloading and installing the Jigsaw Ransomware variant that has employed Salvadore Dali mask that was used in the popular Spanish series ‘Money Heist’.

Like any other ransomware, Jigsaw also encrypts the victims files and folders, and starts deleting the encrypted files until the ransom is paid. However, this ransomware can be decrypted easily compared to others.  

How to get rid of Jigsaw ransomware?

If you are infected by this ransomware, ensure you terminate drpbx.exe process from your Task Manager, and this will help you secure your files from deletion.

Additionally, updating your Microsoft Office to the latest versions, especially Excel could ensure you are protected against these twin payload deployments on your devices.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on FacebookLinkedinInstagramTwitter and Reddit.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

View Comments

  • This paragraph provides clear idea designed for the new visitors of blogging,
    that in fact how to do running a blog.

    Here is my web site ... Royal CBD

  • I am glad to be a visitor of this thoroughgoing web blog ! , regards for this rare information! . Averil Zedekiah Gibbon

  • You made some really good points there. I checked on the net for
    more information about the issue and found most individuals will go along
    with your views on this web site.

  • Great post, you have pointed out some good points, I as well conceive this s a very fantastic website. Theressa Sayres Dietsche

  • Fantastic site you have here but I was curious about if
    you knew of any community forums that cover the same topics talked about in this article?
    I'd really love to be a part of community where I can get suggestions from
    other experienced people that share the same interest.

    If you have any recommendations, please let me know. Thanks a lot!

  • Superb, what a webpage it is! This weblog gives valuable data to us, keep it up. Eachelle Verge Kucik

  • wonderful issues altogether, you just won a brand new reader.

    What would you recommend about your submit that you made a few days ago?
    Any positive?

  • There is apparently a bunch to identify about this. I assume you made some good points in features also. Eulalie Richy Kasey

  • Pretty! This was an incredibly wonderful article. Many thanks for supplying this information. Agnesse Weber Belak

Recent Posts

Best Microsoft Intune Alternatives: Top 5 MDMs to Consider

Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…

1 day ago

Top 7 Best Smartphones with Best Security Features in 2024

Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…

3 weeks ago

Top 11 Log Management Tools for Efficient System Management

Discover the top 11 log management tools for efficient system management and monitoring. Learn about…

2 months ago

Top 5 Threat Intelligence Tools For 2024

Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…

2 months ago

Privileged Access Management: 5 Best PAM Solutions in the Market

Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…

2 months ago

Apple Device Management: Top Solutions for iOS and macOS Management

Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…

2 months ago