December 14, 2021 By David Bisson 2 min read

Digital attackers are using Netflix’s popular series “Squid Game” as a lure for their malware campaigns and phishing operations.

Two Trojan Downloaders Targeting Fans

Kaspersky uncovered dozens of different malicious files related to Squid Game between September and October 2021, reported PC Mag.

In one of those attack instances, a user came across an animated version of the first game depicted in Netflix’s series. What the user didn’t know is that the campaign downloaded a trojan in the background. Once launched, that threat stole the user’s data from their web browser and exfiltrated it to a server under the attackers’ control.

The attack operation also created a shortcut in one of the victim’s folders. This ensured that the trojan would launch every time the victim’s system started up.

Another attack discovered by the security firm arrived in the form of a mobile malware threat relying on unofficial app stores and other portals for distribution. It tantalized a user with the prospect of downloading an episode from Squid Game. In reality, the user downloaded a trojan onto their device.

Other Squid Game Malware Findings from the Community

Kaspersky isn’t the only security firm that’s observed malicious actors using Squid Game as a lure for their attack campaigns.

In mid-October, for instance, Forbes reported on the discovery of a malicious Squid Game-themed wallpaper app that infiltrated Google’s Play Store.

With 5,000 downloads at the time of its discovery and removal by Google, the malware turned out to be a sample of the Joker Android malware family. This threat targeted victims with ad fraud and/or signed them up for premium SMS-based text message services.

It was just a few weeks later when Proofpoint flagged a campaign targeting all industries in the United States. The attack emails arrived with a Squid Game-themed subject line like “Squid game new season commercials casting preview” and “Squid game scheduled season commercials talent cast schedule”.

All the emails instructed the victim to download an attached document for the purpose of either obtaining early access to the new season of the show or for auditioning to become part of the background cast.

Those attachments consisted of macro-laden Excel documents. If enabled, those spreadsheets downloaded samples of the Dridex banking trojan.

How to Defend Against Squid Game-Themed Malware

Organizations can protect themselves against Squid Game-themed digital threats by cultivating their employees’ security awareness.

Businesses can remind their employees of general best practices, including checking the authenticity of a website before submitting any personal information or downloading anything by double-checking URL formats and the spellings of company names.

They can also instruct employees to avoid downloading suspicious files and to avoid interacting with links that promise early access to web content.

More from News

Zero-day exploits underscore rising risks for internet-facing interfaces

3 min read - Recent reports confirm the active exploitation of a critical zero-day vulnerability targeting Palo Alto Networks’ Next-Generation Firewalls (NGFW) management interfaces. While Palo Alto’s swift advisories and mitigation guidance offer a starting point for remediation, the broader implications of such vulnerabilities demand attention from organizations globally.The surge in attacks on internet-facing management interfaces highlights an evolving threat landscape and necessitates rethinking how organizations secure critical assets.Who is exploiting the NGFW zero-day?As of now, little is known about the actors behind the…

Will arresting the National Public Data threat actor make a difference?

3 min read - The arrest of USDoD, the mastermind behind the colossal National Public Data breach, was a victory for law enforcement. It also raises some fundamental questions. Do arrests and takedowns truly deter cyberattacks? Or do they merely mark the end of one criminal’s chapter while others rise to take their place? As authorities continue to crack down on cyber criminals, the arrest of high-profile threat actors like USDoD reveals a deeper, more complex reality about the state of global cyber crime.…

CISA adds Microsoft SharePoint vulnerability to the KEV Catalog

3 min read - In late October, the United States Cybersecurity & Infrastructure Security Agency (CISA) added a new threat to its Known Exploited Vulnerability (KEV) Catalog. Cyber criminals used remote code execution vulnerability in Microsoft SharePoint to gain access to organizations’ networks. The CISA press release states that “these types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.” However, Microsoft identified and released a patch for this vulnerability in July 2024. Cybersecurity experts…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today