Two New Malware Campaigns Found
Security researchers at Carbon Black have found two malware campaigns related to the Ursnif malware.
“This attack originally came in via phishing emails that contained an attached Word document with embedded macros; Carbon Black located roughly 180 variants in the wild. The macro would call an encoded PowerShell script and then use a series of techniques to download and execute both a Ursnif and GandCrab variant,” wrote Carbon Black in a blog report.
Carbon Black has released a detailed overview of the campaigns.
Researchers at Talos have released a list of IOCs (indicators of compromise) to help users detect and mitigate the spread of the malware.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.