Researchers observed the HawkEye keylogger acting as the first-stage downloader for a cryptocurrency miner in a new phishing campaign.

As Cofense noted, the phishing campaign began by sending out generic attack emails leveraging fake job applications as a theme. Each of the emails arrived with what appeared at first glance to be a .zip archive containing a job applicant’s resume. When opened, the .zip archive delivered a sample of the HawkEye keylogger.

HawkEye is a piece of malware that’s capable of monitoring systems collecting sensitive information from infected machines and exfiltrating data to a command-and-control (C&C) server under the attacker’s control. These capabilities weren’t active in this campaign, however. Instead, malicious actors used HawkEye’s file installation feature to load a sample of CGMiner. This open-source cryptocurrency miner gave the attackers the ability to mine for different types of virtual currency across all operating systems.

Recent Attack History of the HawkEye Keylogger

This phishing campaign marks the latest development in a busy year for the HawkEye keylogger. Back in April 2019, Cisco Talos observed multiple malware campaigns distributing HawkEye Reborn v9, the keylogger’s most recent variant at the time, to steal information from targeted organizations. It was approximately a month later when My Online Security detected a HawkEye campaign that exfiltrated its data haul to spytector.com, a website that is known for selling another keylogger and information stealer.

Around that same time, in May 2019, IBM X-Force confirmed that the operators of the malware had stepped up their attacks against business users working for organizations in the transportation and logistics, healthcare, import and export, marketing, agriculture, and other sectors.

How to Keep Your Data Safe From a Keylogger

Security professionals can help protect enterprise data against the HawkEye keylogger by crafting an identity and access management (IAM) strategy that clearly aligns with the needs of the business. Doing so will help the security team more effectively orchestrate its data protection efforts. Simultaneously, companies should use artificial intelligence (AI)-driven tools and network monitoring solutions to achieve visibility across the network so they can thwart sophisticated threats before they access critical data.

More from

How Do You Plan to Celebrate National Computer Security Day?

In October 2022, the world marked the 19th Cybersecurity Awareness Month. October might be over, but employers can still talk about awareness of digital threats. We all have another chance before then: National Computer Security Day. The History of National Computer Security Day The origins of National Computer Security Day trace back to 1988 and the Washington, D.C. chapter of the Association for Computing Machinery’s Special Interest Group on Security, Audit and Control. As noted by National Today, those in…

Abuse of Privilege Enabled Long-Term DIB Organization Hack

From November 2021 through January 2022, the Cybersecurity and Infrastructure Security Agency (CISA) responded to an advanced cyberattack on a Defense Industrial Base (DIB) organization’s enterprise network. During that time frame, advanced persistent threat (APT) adversaries used an open-source toolkit called Impacket to breach the environment and further penetrate the organization’s network. Even worse, CISA reported that multiple APT groups may have hacked into the organization’s network. Data breaches such as these are almost always the result of compromised endpoints…

Deploying Security Automation to Your Endpoints

Globally, data is growing at an exponential rate. Due to factors like information explosion and the rising interconnectivity of endpoints, data growth will only become a more pressing issue. This enormous influx of data will invariably affect security teams. Faced with an enormous amount of data to sift through, analysts are feeling the crunch. Subsequently, alert fatigue is already a problem for analysts overwhelmed with security tasks. With the continued shortage of qualified staff, organizations are looking for automation to…

Worms of Wisdom: How WannaCry Shapes Cybersecurity Today

WannaCry wasn't a particularly complex or innovative ransomware attack. What made it unique, however, was its rapid spread. Using the EternalBlue exploit, malware could quickly move from device to device, leveraging a flaw in the Microsoft Windows Server Message Block (SMB) protocol. As a result, when the WannaCry "ransomworm" hit networks in 2017, it expanded to wreak havoc on high-profile systems worldwide. While the discovery of a "kill switch" in the code blunted the spread of the attack and newly…