Dharma Ransomware Attacks Italy in New Spam Campaign
#1
Bug 
Quote:Threat actors are distributing the Dharma Ransomware in a new spam campaign targeting Windows users in Italy.   
 
The Dharma Ransomware has been active for many years and is based on another ransomware family called Crysis. It is not common, though, to see this ransomware family distributed through malspam as it is more commonly installed via hacked remote desktop services.
 
Security researchers JAMESWTTG Soft, and reecDeep all noticed a new spam campaign today that is infecting users with the Ursniff keylogger or the Dharma Ransomware.
The spam emails use mail subjects like 'Fattura n. 637 del 14.01.20' and pretend to be a sent invoice. 
 
[Image: spam-email.jpg]
Spam Email

Read more: https://www.bleepingcomputer.com/news/se...-campaign/
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AMD DGF SuperCompression cuts geometry s...
AMD’s DGF SuperCom...harlan4096 — 07:21
uBOLite 2026.510.1607 (already available...
uBOLite 2026.510.1...harlan4096 — 07:19
Chrome for Android Adds Approximate Loca...
Google is introduc...harlan4096 — 07:18
AdGuard Browser Extension 5.4.2.0
AdGuard Browser Ex...harlan4096 — 11:45
Cracked in under a minute: (nearly) ever...
We’ve revisited ou...harlan4096 — 11:44

[-]
Birthdays
Today's Birthdays
avatar (41)axylisyb
avatar (44)tukrublape
Upcoming Birthdays
avatar (28)akiratoriyama
avatar (48)Jerrycix
avatar (40)awedoli
avatar (82)WinRARHowTo
avatar (38)owysykan
avatar (49)beautgok
avatar (39)axuben
avatar (40)ihijudu
avatar (45)tiojusop
avatar (42)Damiennug
avatar (40)acoraxe
avatar (49)contjrat
avatar (44)knigiJow
avatar (46)1stOnecal
avatar (50)Mirzojap
avatar (36)idilysaju
avatar (40)GregoryRog
avatar (45)mediumog
avatar (40)odukoromu
avatar (46)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>