Attacks commence with the distribution of malicious purchase confirmation emails.
Threat actors have been using fraudulent credit card alerts to enable password-stealing malware compromise.
According to an analysis from the AhnLab Security Intelligence Center and reported by Cybernews, attacks commence with the distribution of malicious purchase confirmation emails - purportedly from credit card firms - that include an HTML-spoofing LNK file attachment.
This opens a seemingly legitimate security page that downloads an HTA file, which facilitates the deployment of a malicious DLL that compromises targeted systems' Chrome browser with malware through reflective DLL injection.
Aside from enabling keylogging and data exfiltration, the injected malware also allows backdoor access for subsequent intrusions, said researchers.
Written by
Dan Raywood is a B2B journalist with 25 years of experience, including covering cybersecurity for the past 17 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes.
He has spoken at events including 44CON, Infosecurity Europe, RANT Forum, BSides Scotland, Steelcon and the National Cyber Security Show, and served as editor of SC Media UK, Infosecurity Magazine and IT Security Guru. He was also an analyst with 451 Research and a product marketing lead at Tenable.