cibercriminosos de língua russa cometeu uma série de ataques de pesca em embaixadas de países europeus.

Cybercriminals attacked embassies of European countries in Italia, Liberia, Kenia and other countries after sending its employees fishing letters.

UMAs report Check Point researchers, malware letters contained Microsoft Excel documents with headings «Military Financing Program» and “top secret” mark.

After activation of malware’s macros from the document were extracted two files. Em particular, on the attacked system was downloaded malware library TeamViewer DLL (TV.DLL).

A cadeia de infecção
A cadeia de infecção

Intruders are supposedly Russians or at least Russian-speakers, this is obvious from accidentally left Cyrillic alphabet symbols and even whole documents on Russian.

Contudo, it is unlikely that they pursue political motives and are “not political hackers”, consider Check Point specialists.

“It is hard to tell if there are geopolitical motives behind this campaign by looking solely at the list of countries it was targeting. Since it was not after a specific region and the victims came from different places in the world.”, — the Check Point press release says.

Government finance officials were among victims of these attacks, and CheckPoint consider this is not a co-incidence.

“They all appear to be handpicked government officials from several revenue authorities,” – reported experts of Check Point.

Specialists even managed to trace one of the criminals; he is famous on the Internet under the name EvaPiks and registered on several hackers’ and carders’ forums.

EvaPiks published instruction on committing described above attacks and even consulted on them. Considering involvement of intruders to carders’ society, researchers suggest they pursue financial interest.

Fonte: www.theverge.com

Sobre Trojan Killer

Carry Trojan Killer portátil em seu memory stick. Certifique-se que você é capaz de ajudar o seu PC resistir a quaisquer ameaças cibernéticas onde quer que vá.

Além disso, verifique

MageCart na Cloud Platform Heroku

Os investigadores encontraram vários MageCart Web Skimmers Em Heroku Cloud Platform

Pesquisadores da Malwarebytes informou sobre encontrar vários skimmers MageCart web na plataforma Heroku nuvem …

Android Spyware CallerSpy

máscaras spyware CallerSpy como uma aplicação de chat Android

Trend Micro especialistas descobriram a CallerSpy malwares, que mascara como uma aplicação de chat Android, …

Deixar uma resposta