Don’t open that ‘copyright infringement’ email attachment – it’s an infostealer

Don't open that 'copyright infringement' email attachment – it's an infostealer

November 7, 2024 at 05:26PM

Organizations should be wary of phishing emails falsely claiming copyright infringement, which deploy the Rhadamanthys malware. The campaign uses AI for automation, targeting various countries. Attackers aim to steal sensitive data, including cryptocurrency wallet seed phrases, indicating a financially motivated effort by lower-level cybercriminals rather than state-sponsored groups.

### Meeting Takeaways

1. **Emerging Threats**: Organizations should be vigilant against fake copyright infringement emails designed to steal data, as part of a phishing campaign utilizing the Rhadamanthys infostealer malware.

2. **Malware Distribution**: The Rhadamanthys infostealer is being spread globally since July, targeting various countries including the US, Israel, South Korea, Peru, Thailand, Spain, Switzerland, and Poland.

3. **Phishing Tactics**: Emails are disguised as legal notices from media and technology companies, falsely claiming copyright violations on business Facebook pages. They use different Gmail accounts to appear legitimate.

4. **Malware Payload**: Victims receive instructions in a password-protected ZIP file containing a decoy PDF, an executable, and a DLL that deploys the Rhadamanthys stealer once extracted and executed.

5. **Psychological Manipulation**: The threat of legal action is used to induce panic, prompting victims to act quickly and recklessly.

6. **AI Usage**: The latest version of Rhadamanthys (0.7) incorporates AI for basic optical character recognition (OCR) to automate email account creation and content generation, though it is not highly advanced and prone to errors.

7. **Targeted Regions**: A broad range of countries are targeted, with specific tactics failing when language errors occur (e.g., using Hebrew for Korean targets).

8. **Financial Motivation**: The attack is financially driven, aiming to steal cryptocurrency wallet credentials and other sensitive data to sell on the black market or use for further attacks.

9. **Reevaluation of Threat Actors**: While previously suspected to be state-sponsored, researchers suggest that the operators of Rhadamanthys are likely lower-level criminals due to their indiscriminate and financially motivated tactics.

10. **Action Recommendations for Security Leaders**: Organizations are encouraged to prioritize automation and AI in their cybersecurity strategies to effectively combat these widespread phishing campaigns.

11. **Further Research**: Technical details about Rhadamanthys, including indicators of compromise for better detection, are available through research publications from organizations like Cisco Talos and Recorded Future’s Insikt Group.

### Conclusion
This meeting highlighted the sophistication and urgency of addressing cybersecurity threats such as the Rhadamanthys infostealer. Organizations must enhance their defenses against these evolving and financially motivated phishing attacks.

Full Article