Faculty and students at several U.S. universities and colleges were targeted in phishing attacks, threat actors attempted to infect the victims’ systems with a remote access Trojan (RAT) previously used by Chinese state-sponsored hackers.
The campaign targeting the US universities uses adult dating lures.
“Messages arrive obfuscated as adult dating lures requesting the user to choose between one of two pictures to connect with by clicking the link under their picture,” reads the analysis published by Proofpoint.
Once the victim has clicked on one of the two links in the content of the message, the infection chain will start by downloading an executable used as a dropper for the Hupigon RAT.
The malware allows the attacker to take full control of the infected system, it could be used to steal sensitive personal information, to take screenshots, and audio recordings, and to control the webcam.
Most of the messages associated with this phishing campaign were observed between April 14 and April 15, Proofpoint researchers observed roughly 80,000 messages, coinciding with an observed rotation in payload.
Researchers believe this campaign is financially motivated, this opinion is based on the distribution methods and message volumes.
‘This campaign delivered over 150,000 messages to over 60 different industries, with 45% focused on education, colleges, and universities,” Proofpoint concluded.
“These attacks demonstrate the inverse relationship of commoditized RATs incorporated into criminal and state-sponsored campaigns over time. In this case, cybercriminals repurposed an attack tool leveraged by state-sponsored threat actors among other. In this particular case, this is a general crimeware-based campaign.”
Additional technical details were reported in the analysis published by Proofpoint, including indicators of compromise (IOCs).
Please give me your vote for European Cybersecurity Blogger Awards – VOTE FOR YOUR WINNERS
(SecurityAffairs – US universities, phishing)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.