Two New Malware Campaigns Found

By

Attacks involve a Word doc attachment with embedded macros

Security researchers at Carbon Black have found two malware campaigns related to the Ursnif malware.

“This attack originally came in via phishing emails that contained an attached Word document with embedded macros; Carbon Black located roughly 180 variants in the wild. The macro would call an encoded PowerShell script and then use a series of techniques to download and execute both a Ursnif and GandCrab variant,” wrote Carbon Black in a blog report.

Carbon Black has released a detailed overview of the campaigns.

Researchers at Talos have released a list of IOCs (indicators of compromise) to help users detect and mitigate the spread of the malware.

01/29/2019
comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=