BazarLoader Downloader is Using Social Engineering Techniques

BazarLoader Downloader is Using Social Engineering Techniques

BazarLoader downloader has been discovered in two separate cyberattack campaigns. Both the campaigns employed unique social engineering techniques and popular products used in many organizations. It was first spotted last April and since then, researchers have discovered six variants.

What has been discovered?

In the first campaign, the attackers were targeting employees of big organizations with emails offering important information regarding customer service, invoices, payroll, or contracts.
The links inside the emails were hosted on BaseCamp or Slack cloud storage and looked genuine.
In the second campaign, the spam messages were identified. The emails talk about a free trial for an online service that is about to expire and the target must call on the provided telephone number to prevent expiry.
Upon calling, a person on the other side asks them to visit a malicious website address that spreads a malicious Office document.

A connection to TrickBot?

Sophos discovered that TrickBot and BazarLoader use some of the same C2 infrastructures.
Both the malware were spotted communicating with a common IP address that was used in previous attacks.

Conclusion


BazarLoader operators have been actively targeting victims using unique social engineering techniques. In addition, the discovery of six variants shows active and continued development of the threat. Thus, organizations should employ adequate security measures in place to stay protected.



Support the originator by clicking the read the rest link below.