Separ Malware Plucks Hundreds of Companies’ Credentials in Ongoing Phishing Attack
#1
Quote:An ongoing phishing campaign is using malicious PDF documents to spread Separ malware and ultimately steal victims’ browser and email credentials.

Since the attack started at the end of January, it has affected around 200 companies and over 1,000 individuals, located mainly in Southeast Asia, the Middle East, and North America – and the bad actors behind the attack continue to upload stolen data daily, researchers with Deep Instinct told Threatpost.

The campaign’s effectiveness stems from a simple but dangerous tactic used by the Separ credential-stealer for evading detection: Using a combination of legitimate executable files and short scripts.

“Although the attack mechanism used by this malware is very simple, and no attempt has been made by the attacker to evade analysis, the growth in the number of victims claimed by this malware shows that simple attacks can be very effective,” said Guy Propper with Deep Instinct in a Tuesday post.

SOURCE: https://threatpost.com/separ-malware-cre...ng/142009/
[-] The following 3 users say Thank You to silversurfer for this post:
  • darktwilight, Deep900, harlan4096
Reply


Messages In This Thread
Separ Malware Plucks Hundreds of Companies’ Credentials in Ongoing Phishing Attack - by silversurfer - 20 February 19, 20:58

Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AdGuard for Android 4.12.2
AdGuard for Androi...harlan4096 — 09:01
Brave Browser is testing agentic AI brow...
Brave Browser is t...harlan4096 — 08:27
Ventoy 1.1.09
Ventoy 1.1.09 ...harlan4096 — 08:25
What happens to data stolen using phishi...
We follow the trai...harlan4096 — 08:23
K-Lite Codec Pack 19.3.5 / 19.3.6 Update
Changes in 19.3.6:...harlan4096 — 11:55

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (43)ivyhuv

[-]
Online Staff
There are no staff members currently online.

>