Friday, February 05, 2021

Rogue "Malware Spreading Security Researchers" Launch Malicious Social Engineering Campaign Against Legitimate Researchers - OSINT Analysis

Security researchers from Google have recently spotted and properly analyzed a currently circulation malicious software spreading social engineering driven malicious campaign that's actively interacting with legitimate researchers on social media and private channels for the purpose of tricking them into testing a newly discovered zero day flaw which in reality drops malware on the affected hosts and phones back to a C&C server potentially attempting to compromise the researchers in question.

Sample screenshots of the campaign currently in circulation:






Sample malicious MD5s known to have participated in the campaign:
MD5: 7fc2af97b004836c5452922d4491baaa
MD5: 6252cec30f4fb469aefa2233fe7323f8
MD5: 56018500f73e3f6cf179d3b853c27912
MD5: b52e05683b15c6ad56cebea4a5a54990
MD5: 9e9f69ed56482fff18933c5ec8612063
MD5: f5475608c0126582081e29927424f338
MD5: ae17ce1eb59dd82f38efb9666f279044

Stay tuned!

No comments:

Post a Comment