Hakerzy wysyłają rekruterom CV ze złośliwym oprogramowaniem more_eggs

Researchers from the Canadian company eSentire have reported a new wave of phishing attacks using resumes embedded with the more_eggs malware. Cybercriminals have attacked corporate recruiters with fake resumes.

Cybersecurity researchers have identified and prevented four separate cyber incidents, three of which occurred at the end of March this year. Affected entities include a US-based aerospace company, an accounting firm based in the UK, and a law firm and recruitment agency based outside of Canada.

Przypomnę, że my, na przykład, Rozmawialiśmy o Hancitor złośliwe oprogramowanie, który wykorzystuje wiadomości phishingowe, złamane dane uwierzytelniające, or brute-forcing RDP to access vulnerable Windows machines. А также, что Mars' new infostealer is being distributed via OpenOffice ads on Google.

A year ago, in the pre-Easter period, experts also discovered a targeted phishing campaign infecting victims with more_jajka. jednak, during this operation, the attackers were targeting LinkedIn professionals who were looking for jobs, not hiring managers looking for job candidates. The hackers sent ZIP files to job seekers disguised as job offers. When criminal targets an opened the zip file, it causes installation of the more_eggs.

Operation more_eggs changed the social engineering scenario this year by targeting hiring managers with fake resumes, instead of job seekers with fake job offers.wszystkie polecenia są wykonywane w ten sam sposób.

Złośliwe oprogramowanie, allegedly developed by the Golden Chickens (also known as the Venom Spider), is a stealthy, modular set of backdoors capable of stealing valuable information and traversing a compromised network.

More_eggs is malicious software containing several components engineered to steal valuable credentials, including usernames and passwords for corporate bank accounts, email accounts and IT administrator accounts, among others.i poczuj eksperci mówią.

Experts believe that anti-virus software may not be enough to protect against such a complex attack system as more_eggs.

Recommendations on how to avoid becoming a victim of More_Eggs:

  1. Safety training for all employees. Safety training should be mandatory for all company employees.
  2. Users should avoid downloading and running files from unverified sources. Na przykład, be wary of Word and Excel documents sent from an unknown source or obtained from the Internet that prompt users toEnable Macros”.
  3. Avoid free versions of paid software. Always check the full URL before downloading files to make sure it matches the origin (na przykład, Microsoft Team must come from a Microsoft domain).
  4. Check file extensions, don’t just trust the file type logo. The executable file can be disguised as a PDF.
  5. Ensure that there are standard procedures in place for employees to submit potentially harmful content for review.

Helga Smith

Zawsze interesowałem się informatyką, zwłaszcza bezpieczeństwo danych i motyw, który nazywa się obecnie "nauka o danych", od moich wczesnych lat nastoletnich. Przed dołączeniem do zespołu usuwania wirusów jako redaktor naczelny, Pracowałem jako ekspert ds. cyberbezpieczeństwa w kilku firmach, w tym jeden z kontrahentów Amazona. Kolejne doświadczenie: Uczę na uniwersytetach Arden i Reading.

Zostaw odpowiedź

Witryna wykorzystuje Akismet, aby ograniczyć spam. Dowiedz się więcej jak przetwarzane są dane komentarzy.

Przycisk Powrót do góry