• krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseoSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • krseolinkSpider
  • Researchers Warn of Spam Campaign Targeting Victims with SVCReady Malware
    Home Malware Researchers Warn of Spam Campaign Targeting Victims with SVCReady Malware

    Researchers Warn of Spam Campaign Targeting Victims with SVCReady Malware

    Source Link

    SVCReady Malware

    A new wave of phishing campaigns has been observed spreading a previously documented malware called SVCReady.

    “The malware is notable for the unusual way it is delivered to target PCs — using shellcode hidden in the properties of Microsoft Office documents,” Patrick Schläpfer, a threat analyst at HP, said in a technical write-up.

    SVCReady is said to be in its early stage of development, with the authors iteratively updating the malware several times last month. First signs of activity date back to April 22, 2022.

    Infection chains involve sending Microsoft Word document attachments to targets via email that contain VBA macros to activate the deployment of malicious payloads.

    CyberSecurity

    But where this campaign stands apart is that instead of employing PowerShell or MSHTA to retrieve next-stage executables from a remote server, the macro runs shellcode stored in the document properties, which subsequently drops the SVCReady malware.

    In addition to achieving persistence on the infected host by means of a scheduled task, the malware comes with the ability to gather system information, capture screenshots, run shell commands, as well as download and execute arbitrary files.

    This also included delivering RedLine Stealer as a follow-up payload in one instance on April 26 after a machine was initially compromised with SVCReady.

    CyberSecurity

    HP said it identified overlaps between the file names of the lure documents and the images contained in the files used to distribute SVCReady and those employed by another group called TA551 (aka Hive0106 or Shathak), but it’s not immediately clear if the same threat actor is behind the latest campaign.

    “It is possible that we are seeing the artifacts left by two different attackers who are using the same tools,” Schläpfer noted. “However, our findings show that similar templates and potentially document builders are being used by the actors behind the TA551 and SVCReady campaigns.”

    Related Articles

    Leave a Comment

    techhipbettruvabetnorabahisbahis forumutaraftarium24edusedusedueduseduseduseduseduseduedu
    betwild giris
    kingbetting güncel
    rokubet giriş
    biabet giris
    sugar rush 1000
    padişahbet güncel giriş
    vegabet
    casinomilyon giriş
    lüks casino güncel giriş
    свит бонанза
    neyine
    cashwin giris
    betmatik güncel giriş
    plinko romania
    padişahbet güncel giriş
    imajbet giriş
    biabet giriş
    pin up aviator
    rexbet giriş
    betwild giris