A newly uncovered phishing campaign by Any.Run uses corrupted Word documents to evade email security filters. These documents are disguised as messages from payroll or HR departments and appear damaged upon opening, prompting Microsoft Word’s recovery feature to activate. When users attempt to recover the content, the document displays a QR code. Scanning the code redirects users to a fraudulent Microsoft login page designed to harvest login credentials. The attackers deliberately corrupt the documents in a way that allows Word to recover them while making them difficult for security tools to detect. As a result, when the files are scanned on platforms like VirusTotal, they often appear clean, as most security solutions fail to analyze the corrupted content correctly. The files also contain a base64-encoded string, "IyNURVhUTlVNUkFORE9NNDUjIw," which decodes to a placeholder text but serves no harmful purpose on its own. This campaign stands out due to its innovative use of corrupted documents rather than traditional malicious code. The Word recovery feature lures users into scanning the QR code, which takes them to a phishing site. Since the attachments lack malware, they can bypass detection and successfully deceive unsuspecting users. To defend against such phishing attempts, it’s crucial to be cautious when handling emails from unknown sources, especially those with attachments. Always verify questionable emails with your IT team or delete them without interacting with the content. Avoid scanning QR codes in unsolicited messages and never open attachments from unfamiliar senders.
A recently found Python-based Remote Access Trojan (RAT) having the SHA256 hash 7173e20e7ec217f6a1591f1fc9be6d0a4496d78615cc5ccdf7b9a3a37e3ecc3c on VirusTotal exhibits sophisticate...
A severe security flaw, designated CVE-2024-49600, has been discovered in Dell Power Manager (DPM), a widely used software utility for controlling power configurations on Dell comp...
A security researcher has found a critical flaw in the popular Worldline Yomani XR payment terminal, which could enable attackers to take complete control over the terminal within ...