Ongoing Phishing and Malware Campaigns in December 2024

Ongoing Phishing and Malware Campaigns in December 2024

December 10, 2024 at 05:12AM

Cybersecurity threats are evolving, with ongoing zero-day attacks using corrupted files largely undetected, as seen in a recent analysis by ANY.RUN. Additionally, fileless malware and phishing tactics are on the rise. Utilizing advanced tools like ANY.RUN’s Interactive Sandbox helps organizations identify and analyze these threats effectively.

### Meeting Takeaways (Dec 10, 2024 – Malware Analysis / Cyber Threat)

1. **Current Cyber Threat Landscape**
– Cyber attackers are continuously evolving their strategies; organizations must remain vigilant and informed about new threats.

2. **Zero-Day Attack Overview**
– A persistent zero-day attack utilizing corrupted Word documents and ZIP files has been identified, evading detection by most security systems.
– **Key Points:**
– Malicious files show 0 detections on VirusTotal because current security systems fail to analyze them due to corruption.
– Once opened, these files can restore their malicious contents.
– ANY.RUN’s sandbox is capable of manually opening these corrupted files, allowing analysts to examine what threats they carry.

3. **Fileless Malware Attacks**
– Attackers are using a fileless loader, Psloramyra, to deploy Quasar RAT through a PowerShell script, leaving no traces on disk by operating entirely in memory.
– **Key Points:**
– A scheduled task is created to ensure continuous operation (every two minutes).
– Techniques involve utilizing legitimate system processes to facilitate the attack.

4. **Phishing via Azure Blob Storage**
– Attackers are leveraging Azure’s cloud storage to host phishing pages, deceiving victims into entering their credentials on fake forms.
– **Key Points:**
– Scripts gather victim information to increase the credibility of the phishing site.

5. **Emerging Threat: Emmenhtal Loader**
– A new loader, Emmenhtal, executes a series of scripts that can deliver various malware families, including Lumma and Amadey.
– **Key Points:**
– The execution chain involves encrypted payloads and PowerShell scripts, which can lead to significant system compromise.

6. **ANY.RUN Interactive Sandbox**
– Recommended for advanced malware analysis and threat detection.
– **Features:**
– Rapid threat identification (< 40 seconds). - Safe VM environment for engaging with malicious files. - Real-time detection of malicious behavior. - Free 14-day trial available for testing features. ### Action Items - Consider investing in and testing the ANY.RUN Interactive Sandbox to enhance security measures against the discussed threats. - Share awareness of these current malware techniques with relevant teams to improve organizational defenses. [alkpt]1[/alkpt]