Close Menu
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
What's Hot

Investors trust Google more than Meta when comes to spending on AI

April 30, 2026

Paragon is not collaborating with Italian authorities probing spyware attacks, report says

April 28, 2026

Microsoft cuts OpenAI revenue share as their AI alliance loosens

April 28, 2026
Facebook X (Twitter) Instagram
Trending
  • Investors trust Google more than Meta when comes to spending on AI
  • Paragon is not collaborating with Italian authorities probing spyware attacks, report says
  • Microsoft cuts OpenAI revenue share as their AI alliance loosens
  • Robotically assembled building blocks could make construction more efficient and sustainable | MIT News
  • AI showdown: Musk and Altman go to trial in fight over OpenAI’s beginnings
  • U.S., Iran seize ships as war evolves into standoff over Strait of Hormuz
  • Google launches training and inference TPUs in latest shot at Nvidia
  • Zoom teams up with World to verify humans in meetings
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech InnovationsRoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Thursday, May 7
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Home » Squid Werewolf Mimic as Recruiters Attacking Job Seekers To Exfiltrate Personal Data

Squid Werewolf Mimic as Recruiters Attacking Job Seekers To Exfiltrate Personal Data

GTBy GTMarch 18, 2025 Cybersecurity 2 Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email


Squid Werewolf Mimic as Recruiters Attacking Job Seekers To Exfiltrate Personal Data

A sophisticated cyber espionage campaign has been uncovered where threat actors are masquerading as recruiters to target job seekers and employees of specific organizations.

The attackers send phishing emails disguised as job opportunities from legitimate industrial organizations, attaching malicious files that appear to be employment offers but actually deploy malware to steal sensitive information.

Phishing email sent by the threat actor (Source – Bi.Zone)

The campaign uses social engineering tactics centered around job recruitment, a particularly effective strategy as job seekers are more likely to open attachments related to potential employment opportunities.

The emails contain password-protected zip files with seemingly legitimate job descriptions that conceal malicious code.

BI.Zone Security researchers identified this campaign in December 2024, attributing it to a threat actor known as Squid Werewolf (also tracked as APT37 or Reaper Group).

Their analysis revealed the attack had been carefully designed to evade detection while establishing persistent access to victims’ systems.

The initial infection occurs when victims open what appears to be a PDF job description, but is actually a shortcut file (.lnk) with a double extension.

This file executes a sophisticated PowerShell command that extracts and deploys multiple components hidden within the attachment itself.

Once executed, the malware copies the legitimate Windows utility dfsvc.exe to the startup folder, ensuring it runs automatically when the system boots. It then creates supporting files necessary for the attack, including a configuration file and a malicious DLL.

Mechanics of the Attack

The PowerShell command executed by the LNK file reveals the sophisticated nature of this attack:

powershell.exe -nop -c $t=$env:appdata+’\Microsoft\Windows\Start Menu\Programs\Startup’;if(Get-ChildItem $env:temp -recurse ‘Предложение о работе.pdf.lnk’){$k=New-Object IO.FileStream ($env:temp+’\’+((Get-ChildItem $env:temp -recurse ‘Предложение о работе.pdf.lnk’).Directory).Name+’\’+’Предложение O работе.pdf.lnk’),’Open’,’Read’,’ReadWrite’}

The LNK file contains Base64-encoded payloads that the script extracts and deploys (Source – Bi.Zone)

The malware employs multiple evasion techniques, including time-based sandbox detection and internet connectivity checks.

It contacts a command-and-control server at hwsrv-1253398.hostwindsdns[.]com to download additional encrypted payloads, which are then decrypted using AES128 CBC encryption.

To protect against such threats, security experts recommend implementing email security solutions, avoiding opening attachments from unknown senders, and deploying endpoint detection and response tools capable of identifying suspicious PowerShell commands and activities in startup locations.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.



Source link

GT
  • Website

Keep Reading

Malicious Chrome Extension Steal ChatGPT and DeepSeek Conversations from 900K Users

Top 10 Best Server Monitoring Tools

10 Best Cybersecurity Risk Management Tools

Best DDoS Protection Tools & Services in 2026 (Reviewed)

20 Best Malware Protection Solutions In 2026

10 Most Notable Cyber Attacks of 2026

View 2 Comments

2 Comments

  1. 🔓 + 1.754764 BTC.NEXT - https://graph.org/Message--0484-03-25?hs=c77ff47b5cafa82beb776ecb8fbb42a7& 🔓 on March 27, 2025 4:16 pm

    l877sl

    Reply
  2. 📜 + 1.815139 BTC.GET - https://graph.org/Message--04804-03-25?hs=c77ff47b5cafa82beb776ecb8fbb42a7& 📜 on March 28, 2025 1:29 pm

    gvnl9n

    Reply
Leave A Reply Cancel Reply

Editors Picks

Investors trust Google more than Meta when comes to spending on AI

April 30, 2026

Google launches training and inference TPUs in latest shot at Nvidia

April 27, 2026

Meta tracks employee usage on Google, LinkedIn AI training project

April 25, 2026

Meta will cut 10% of workforce as company pushes deeper into AI

April 24, 2026
Latest Posts

Malicious Chrome Extension Steal ChatGPT and DeepSeek Conversations from 900K Users

April 1, 2026

Top 10 Best Server Monitoring Tools

April 1, 2026

10 Best Cybersecurity Risk Management Tools

March 31, 2026

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Welcome to RoboNewsWire, your trusted source for cutting-edge news and insights in the world of technology. We are dedicated to providing timely and accurate information on the most important trends shaping the future across multiple sectors. Our mission is to keep you informed and ahead of the curve with deep dives, expert analysis, and the latest updates in key industries that are transforming the world.

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2026 Robonewswire. Designed by robonewswire.

Type above and press Enter to search. Press Esc to cancel.