article thumbnail

OneNote documents spread malware in several countries

Tech Republic Security

A new phishing campaign abuses OneNote documents to infect computers with the infamous AsyncRAT malware, targeting users in the U.K., The post OneNote documents spread malware in several countries appeared first on TechRepublic. Canada and the U.S.

Malware 147
article thumbnail

OfflRouter Virus: A Persistent Threat in Ukraine Exploiting Confidential Documents

Penetration Testing

Cisco Talos security researchers have uncovered a persistent, multi-component virus known as OfflRouter that has been quietly infecting Ukrainian systems and stealing sensitive documents since 2015.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

OneNote documents have emerged as a new malware infection vector

CyberSecurity Insiders

Intro In February 2022, Microsoft disabled VBA macros on documents due to their frequent use as a malware distribution method. This move prompted malware authors to seek out new ways to distribute their payloads, resulting in an increase in the use of other infection vectors, such as password-encrypted zip files and ISO files.

Malware 98
article thumbnail

Decoy Microsoft Word Documents Used to Deliver Nim-Based Malware

The Hacker News

A new phishing campaign is leveraging decoy Microsoft Word documents as bait to deliver a backdoor written in the Nim programming language.

Malware 88
article thumbnail

Ransomware Now Leaking Stolen Documents

Schneier on Security

Malware would encrypt the data on your computer, and demand a ransom for the encryption key. The company refused to pay, so the criminals leaked documents and data belonging to Visser Precision, Lockheed Martin, Boeing, SpaceX, the US Navy, and others. Originally, ransomware didn't involve any data theft.

article thumbnail

Escanor Malware delivered in Weaponized Microsoft Office Documents

Security Affairs

The threat actors offer Android-based and PC-based versions of RAT, along with HVNC module and exploit builder to weaponize Microsoft Office and Adobe PDF documents to deliver malicious code. The actors are using decoy documents imitating invoices and notifications from popular online-services. Pierluigi Paganini.

Malware 96
article thumbnail

Calendar Meeting Links Used to Spread Mac Malware

Krebs on Security

But clicking the meeting link provided by the scammers prompts the user to run a script that quietly installs malware on macOS systems. It didn’t dawn on Doug until days later that the missed meeting with Mr. Lee might have been a malware attack. MacOS computers include X-Protect , Apple’s built-in antivirus technology.

Malware 278