One security researcher has identified a new phishing campaign that is distributing a LokiBot info-stealing malware and another payload called the Jigsaw Ransomware.
Hackers are now deploying more than one malware to ensure their attack is organized streamlined with better success rates. Hackers use this malware combo, to steal the usernames and passwords of different applications first, then they deploy the ransomware demanding ransom for the encryption.
This phishing campaign had attachments that had impersonated invoices, bank transfers, business inquiries, orders and more. Excel attachments such as Swift.xlsx, order.xlsx, Inquiry.xlsx and Invoice for payment.xlsx is used to lure the victims to download these attachments. A legitimate looking spreadsheets is the mere advantage for hackers, as most recipients will believe that those attachments are from the actual source itself.
Jame, a security researcher has identified this campaign, and mentioned that the attachment are weaponized with LCG kit, exploiting an old remote code execution vulnerability in Microsoft Office tracked as CVE-2017-11882 in Equation Editor.
If the attachment is downloaded, the instructions in the file will download the malware from a remote site and starts executing its intended process. James had disclosed the cjjjjjjjjjjjjjjjjjjj.exe file, is the LokiBot and has the capabilities to steal credentials from mail, browsers, FTP, and other terminal applications. After stealing the details, it transfers the information through command and control server to the creators of the campaign.
Meanwhile, LokiBot also initiates the second attack vector by downloading and installing the Jigsaw Ransomware variant that has employed Salvadore Dali mask that was used in the popular Spanish series ‘Money Heist’.
Like any other ransomware, Jigsaw also encrypts the victims files and folders, and starts deleting the encrypted files until the ransom is paid. However, this ransomware can be decrypted easily compared to others.
If you are infected by this ransomware, ensure you terminate drpbx.exe process from your Task Manager, and this will help you secure your files from deletion.
Additionally, updating your Microsoft Office to the latest versions, especially Excel could ensure you are protected against these twin payload deployments on your devices.
Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…
View Comments
This paragraph provides clear idea designed for the new visitors of blogging,
that in fact how to do running a blog.
Here is my web site ... Royal CBD
Howdy! I understand this is kind of off-topic however I needed to ask. Latia Terencio Berkly
I am glad to be a visitor of this thoroughgoing web blog ! , regards for this rare information! . Averil Zedekiah Gibbon
You made some really good points there. I checked on the net for
more information about the issue and found most individuals will go along
with your views on this web site.
Great post, you have pointed out some good points, I as well conceive this s a very fantastic website. Theressa Sayres Dietsche
Fantastic site you have here but I was curious about if
you knew of any community forums that cover the same topics talked about in this article?
I'd really love to be a part of community where I can get suggestions from
other experienced people that share the same interest.
If you have any recommendations, please let me know. Thanks a lot!
Superb, what a webpage it is! This weblog gives valuable data to us, keep it up. Eachelle Verge Kucik
wonderful issues altogether, you just won a brand new reader.
What would you recommend about your submit that you made a few days ago?
Any positive?
There is apparently a bunch to identify about this. I assume you made some good points in features also. Eulalie Richy Kasey
Pretty! This was an incredibly wonderful article. Many thanks for supplying this information. Agnesse Weber Belak