Digital attackers are using Netflix’s popular series “Squid Game” as a lure for their malware campaigns and phishing operations.

Two Trojan Downloaders Targeting Fans

Kaspersky uncovered dozens of different malicious files related to Squid Game between September and October 2021, reported PC Mag.

In one of those attack instances, a user came across an animated version of the first game depicted in Netflix’s series. What the user didn’t know is that the campaign downloaded a trojan in the background. Once launched, that threat stole the user’s data from their web browser and exfiltrated it to a server under the attackers’ control.

The attack operation also created a shortcut in one of the victim’s folders. This ensured that the trojan would launch every time the victim’s system started up.

Another attack discovered by the security firm arrived in the form of a mobile malware threat relying on unofficial app stores and other portals for distribution. It tantalized a user with the prospect of downloading an episode from Squid Game. In reality, the user downloaded a trojan onto their device.

Other Squid Game Malware Findings from the Community

Kaspersky isn’t the only security firm that’s observed malicious actors using Squid Game as a lure for their attack campaigns.

In mid-October, for instance, Forbes reported on the discovery of a malicious Squid Game-themed wallpaper app that infiltrated Google’s Play Store.

With 5,000 downloads at the time of its discovery and removal by Google, the malware turned out to be a sample of the Joker Android malware family. This threat targeted victims with ad fraud and/or signed them up for premium SMS-based text message services.

It was just a few weeks later when Proofpoint flagged a campaign targeting all industries in the United States. The attack emails arrived with a Squid Game-themed subject line like “Squid game new season commercials casting preview” and “Squid game scheduled season commercials talent cast schedule”.

All the emails instructed the victim to download an attached document for the purpose of either obtaining early access to the new season of the show or for auditioning to become part of the background cast.

Those attachments consisted of macro-laden Excel documents. If enabled, those spreadsheets downloaded samples of the Dridex banking trojan.

How to Defend Against Squid Game-Themed Malware

Organizations can protect themselves against Squid Game-themed digital threats by cultivating their employees’ security awareness.

Businesses can remind their employees of general best practices, including checking the authenticity of a website before submitting any personal information or downloading anything by double-checking URL formats and the spellings of company names.

They can also instruct employees to avoid downloading suspicious files and to avoid interacting with links that promise early access to web content.

More from News

Abuse of Privilege Enabled Long-Term DIB Organization Hack

From November 2021 through January 2022, the Cybersecurity and Infrastructure Security Agency (CISA) responded to an advanced cyberattack on a Defense Industrial Base (DIB) organization’s enterprise network. During that time frame, advanced persistent threat (APT) adversaries used an open-source toolkit called Impacket to breach the environment and further penetrate the organization’s network. Even worse, CISA reported that multiple APT groups may have hacked into the organization’s network. Data breaches such as these are almost always the result of compromised endpoints…

Costa Rica State of Emergency Declared After Ransomware Attacks

In late April, after weeks of major ransomware attacks, Costa Rica declared a state of emergency. Newly-elected President Rodrigo Chaves took this measure, usually reserved to deal with natural disasters, to free up the government to react more decisively to the incident. The Russian-based Conti gang has claimed they launched the attack. Meanwhile, the U.S. Department of State offered a $10 million reward for information that leads to finding anyone holding a key leadership role in the Conti gang. The…

Ransomware-as-a-Service Transforms Gangs Into Businesses

Malware-as-a-Service is getting easier and easier to access, according to a recent threat report. Self-named the ‘Eternity Project’, this cyber threat group offers services from a Tor website and on their Telegram channel. They sell a wide variety of malware in an organized fashion, including stealer, clipper, worm, miner, ransomware and distributed-denial-of-service bot services. This alarms many security professionals. With Eternity, even inexperienced cyber criminals can target victims with a customized threat offering. Eternity sells malware for $90 to $490.…

UK Health System Email Accounts Hijacked to Steal Microsoft Logins

Last summer, I noticed password reset notices in my email account that I didn’t send. I quickly realized that I was the victim of an account takeover. This happens when someone illegally gains access to your account, typically through compromised credentials. I changed my email password right away and learned that my passwords to other accounts had already been changed. To make cleanup even more fun, I found out that the attackers had created new accounts using my credentials. Account…