[ad_1]
A brand new malware marketing campaign has been noticed concentrating on Italy with phishing emails designed to deploy an data stealer on compromised Windows programs.
“The info-stealer malware steals delicate data like system information, crypto pockets and browser histories, cookies, and credentials of crypto wallets from sufferer machines,” Uptycs safety researcher Karthickkumar Kathiresan mentioned in a report.
Details of the marketing campaign have been first disclosed by Milan-based IT providers agency SI.web final month.
The multi-stage an infection sequence commences with an invoice-themed phishing e mail containing a hyperlink that, when clicked, downloads a password-protected ZIP archive file, which harbors two information: A shortcut (.LNK) file and a batch (.BAT) file.
Irrespective of which file is launched, the assault chain stays the identical, as opening the shortcut file fetches the identical batch script designed to put in the knowledge stealer payload from a GitHub repository. This is achieved by leveraging a reliable PowerShell binary that is additionally retrieved from GitHub.
Once put in, the C#-based malware gathers system metadata, and data from dozens of internet browsers (e.g., cookies, bookmarks, bank cards, downloads, and credentials), in addition to a number of cryptocurrency wallets, all of which is transmitted to an actor-controlled area.
To mitigate such assaults, organizations are really helpful to implement “tight safety controls and multi-layered visibility and safety options to establish and detect malware.”


