A newly uncovered phishing campaign by Any.Run uses corrupted Word documents to evade email security filters. These documents are disguised as messages from payroll or HR departments and appear damaged upon opening, prompting Microsoft Word’s recovery feature to activate. When users attempt to recover the content, the document displays a QR code. Scanning the code redirects users to a fraudulent Microsoft login page designed to harvest login credentials. The attackers deliberately corrupt the documents in a way that allows Word to recover them while making them difficult for security tools to detect. As a result, when the files are scanned on platforms like VirusTotal, they often appear clean, as most security solutions fail to analyze the corrupted content correctly. The files also contain a base64-encoded string, "IyNURVhUTlVNUkFORE9NNDUjIw," which decodes to a placeholder text but serves no harmful purpose on its own. This campaign stands out due to its innovative use of corrupted documents rather than traditional malicious code. The Word recovery feature lures users into scanning the QR code, which takes them to a phishing site. Since the attachments lack malware, they can bypass detection and successfully deceive unsuspecting users. To defend against such phishing attempts, it’s crucial to be cautious when handling emails from unknown sources, especially those with attachments. Always verify questionable emails with your IT team or delete them without interacting with the content. Avoid scanning QR codes in unsolicited messages and never open attachments from unfamiliar senders.
An enormous, synchronized botnet attack is directly attacking Remote Desktop Protocol (RDP) services in the United States, at least, according to a GreyNoise report of October 8, 2...
A security researcher has found a critical flaw in the popular Worldline Yomani XR payment terminal, which could enable attackers to take complete control over the terminal within ...
In a coordinated global operation, international law enforcement agencies have seized the clearnet domain breachforums[.]hn, marking another major takedown of the notorious cybercr...