Digital attackers used more than a dozen web servers to host 10 malware families and distributed those threats using phishing emails.
Security researchers discovered an attack campaign targeting Japanese users with a new variant of Ursnif banking malware.
Researchers discovered Geodo botnets using a new spam campaign to deliver samples of Qakbot malware.
A weaponized document builder service known as LCG Kit added the ability to use Microsoft Word macros to load the necessary shellcode for installing malware.
A recent Hawkeye keylogger campaign leveraged an old Microsoft Office Equation Editor vulnerability to steal user credentials, passwords and clipboard content.
A new attack campaign is using Rich Text Format (RTF) files to distribute the Agent Tesla Trojan along with other malware.
A new attack group known as Gallmaker spied on military and government organizations by employing living-off-the-land tactics.
Latest Version of TrickBot Malware Uses Macro-Enabled Word Documents to Deliver New Stealth Code Injection
The latest version of TrickBot malware leverages malicious macros to deliver stealthy code injection, fool users and compromise computers.
Endpoint detection and antiphishing tools can help users filter basic spam email, but detecting malspam in PDF and Microsoft Office documents requires a more thorough investigation.
Fraudsters have used the MS Office Equation Editor cybersecurity vulnerability to craft an attack on financial institutions and users.