New phishing campaign packs an info-stealer, ransomware punch

New phishing campaign packs an info-stealer, ransomware punch


A new phishing campaign is distributing a double-punch of a LokiBot information-stealing malware along with a second payload in the form of the Jigsaw Ransomware.


By using this malware combo, the attackers first steal saved user names and passwords stored in a variety of applications and then deploy the Jigsaw Ransomware to try and get a small ransom to sweeten the attack.


Weaponized Excel spreadsheets


The exact emails sent as part of this campaign have not been found, but the attachments impersonate invoices, bank transfers, orders, and business inquiries.


This campaign is using Excel attachments with names such as Swift.xlsx, orders.xlsx, Invoice For Payment.xlsx, Inquiry.xlsx.


Unlike many phishing attachments, the actors appear to be utilizing legitimate or carefully crafted spreadsheets that have been weaponized to seem believable, as shown below.



Click to see a larger version

According to security researcher James, who discovered this campaign, these attachments have been weaponized using LCG Kit so that they exploit an old Microsoft Office CVE-2017-11882 remote code execution vulnerability in Equation Editor.



Weaponized attachment

If successfully exploited, malware will be downloaded from a remote site and executed.



The vulnerability being exploited to download malware

While this malware has since been removed from the site, James told BleepingComputer that th ..

Support the originator by clicking the read the rest link below.