Hackers Disguise Malware As Screensaver Files In Fake Shipping Email Attack

Image by jcomp, from Freepik

Hackers Disguise Malware As Screensaver Files In Fake Shipping Email Attack

Reading time: 2 min

Cybersecurity firm Symantec has uncovered a phishing campaign targeting industries across Asia, Europe, and the U.S., using fake shipping emails and disguised screensaver files to infect victims with malware.

In a rush? Here are the quick facts:

  • The ModiLoader tool deploys stealers including Remcos and Agent Tesla and AsyncRAT.
  • The emails pretend to be official communications from a prominent Taiwanese freight company that provides shipping updates.
  • The attack targets four specific sectors which include electronics together with automotive and manufacturing and broadcasting.

Attackers pretend to be a major Taiwanese freight and logistics company and send phishing emails in Chinese that look like real shipment updates. The subject line includes detailed shipping info, referencing customs clearance from Kaohsiung to Atlanta on April 7.

The recipients are subsequently asked to verify shipping documents like the ISF, packing list, and invoice. Inside is a malicious file disguised as a Windows screensaver (.SCR). When clicked, it silently installs a malware loader called ModiLoader.

GBHackers notes that the ModiLoader is a known threat that downloads and installs remote access tools and information stealing malware. Symantec has reported that it has been used to drop malware like Remcos, Agent Tesla, MassLogger, AsyncRAT and Formbook.

“While they might appear harmless, they are essentially executable programs with a different file extension. Once executed, these files can perform any action a regular executable can—such as installing loaders, backdoors, keyloggers, or ransomware. As of today, they continue to be heavily used in attack chains,’’ warned Symantec.

The campaign has affected multiple sectors including automotive, electronics, publishing, broadcasting, and manufacturing, and the victims are located in countries such as Japan, the UK, Sweden, the U.S., Hong Kong, Taiwan, Thailand, and Malaysia.

Symantec is fighting the threat by using a variety of protections including machine learning, file scanning, email filtering, and Carbon Black endpoint security. The malware has been flagged under multiple names including Trojan.Gen.MBT and Scr.Malcode!gen19.

Experts urge businesses to educate employees about suspicious emails.

Did you like this article? Rate it!
I hated it I don't really like it It was ok Pretty good! Loved it!

We're thrilled you enjoyed our work!

As a valued reader, would you mind giving us a shoutout on Trustpilot? It's quick and means the world to us. Thank you for being amazing!

Rate us on Trustpilot
0 Voted by 0 users
Title
Comment
Thanks for your feedback
Loader
Please wait 5 minutes before posting another comment.
Comment sent for approval.

Leave a Comment

Loader
Loader Show more...