Close Menu
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
What's Hot

VUZ gets $12M for its immersive video experiences across emerging markets and the U.S.

May 19, 2025

Qualcomm to launch data center processors that link to Nvidia chips

May 19, 2025

Crypto elite increasingly worried about their personal safety

May 18, 2025
Facebook X (Twitter) Instagram
Trending
  • VUZ gets $12M for its immersive video experiences across emerging markets and the U.S.
  • Qualcomm to launch data center processors that link to Nvidia chips
  • Crypto elite increasingly worried about their personal safety
  • Grok says it’s ‘skeptical’ about Holocaust death toll, then blames ‘programming error’
  • Heybike’s Alpha step-through e-bike is an affordable, all-terrain dreamboat
  • U.S. lawmakers have concerns about Apple-Alibaba deal
  • Trump coin dinner to include mostly non-Americans based on top holders
  • How Silicon Valley’s influence in Washington benefits the tech elite
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
Facebook X (Twitter) Instagram
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech InnovationsRoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Monday, May 19
  • Home
  • AI
  • Crypto
  • Cybersecurity
  • IT
  • Energy
  • Robotics
  • TechCrunch
  • Technology
RoboNewsWire – Latest Insights on AI, Robotics, Crypto and Tech Innovations
Home » Squid Werewolf Mimic as Recruiters Attacking Job Seekers To Exfiltrate Personal Data

Squid Werewolf Mimic as Recruiters Attacking Job Seekers To Exfiltrate Personal Data

GTBy GTMarch 18, 2025 Cybersecurity 2 Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email


Squid Werewolf Mimic as Recruiters Attacking Job Seekers To Exfiltrate Personal Data

A sophisticated cyber espionage campaign has been uncovered where threat actors are masquerading as recruiters to target job seekers and employees of specific organizations.

The attackers send phishing emails disguised as job opportunities from legitimate industrial organizations, attaching malicious files that appear to be employment offers but actually deploy malware to steal sensitive information.

Phishing email sent by the threat actor (Source – Bi.Zone)

The campaign uses social engineering tactics centered around job recruitment, a particularly effective strategy as job seekers are more likely to open attachments related to potential employment opportunities.

The emails contain password-protected zip files with seemingly legitimate job descriptions that conceal malicious code.

BI.Zone Security researchers identified this campaign in December 2024, attributing it to a threat actor known as Squid Werewolf (also tracked as APT37 or Reaper Group).

Their analysis revealed the attack had been carefully designed to evade detection while establishing persistent access to victims’ systems.

The initial infection occurs when victims open what appears to be a PDF job description, but is actually a shortcut file (.lnk) with a double extension.

This file executes a sophisticated PowerShell command that extracts and deploys multiple components hidden within the attachment itself.

Once executed, the malware copies the legitimate Windows utility dfsvc.exe to the startup folder, ensuring it runs automatically when the system boots. It then creates supporting files necessary for the attack, including a configuration file and a malicious DLL.

Mechanics of the Attack

The PowerShell command executed by the LNK file reveals the sophisticated nature of this attack:

powershell.exe -nop -c $t=$env:appdata+’\Microsoft\Windows\Start Menu\Programs\Startup’;if(Get-ChildItem $env:temp -recurse ‘Предложение о работе.pdf.lnk’){$k=New-Object IO.FileStream ($env:temp+’\’+((Get-ChildItem $env:temp -recurse ‘Предложение о работе.pdf.lnk’).Directory).Name+’\’+’Предложение O работе.pdf.lnk’),’Open’,’Read’,’ReadWrite’}

The LNK file contains Base64-encoded payloads that the script extracts and deploys (Source – Bi.Zone)

The malware employs multiple evasion techniques, including time-based sandbox detection and internet connectivity checks.

It contacts a command-and-control server at hwsrv-1253398.hostwindsdns[.]com to download additional encrypted payloads, which are then decrypted using AES128 CBC encryption.

To protect against such threats, security experts recommend implementing email security solutions, avoiding opening attachments from unknown senders, and deploying endpoint detection and response tools capable of identifying suspicious PowerShell commands and activities in startup locations.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.



Source link

GT
  • Website

Keep Reading

Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024

Hackers Launching Cyber Attacks Targeting Multiple Schools & Universities in New Mexico

Over 90% of Cybersecurity Leaders Worldwide Encountered Cyberattacks Targeting Cloud Environments

China Reportedly Admits Their Role in Cyber Attacks Against U.S. Infrastructure

APT32 Hackers Weaponizing GitHub to Attack Cybersecurity Professionals & Enterprises

10 Best IT Asset Management Tools

View 2 Comments

2 Comments

  1. 🔓 + 1.754764 BTC.NEXT - https://graph.org/Message--0484-03-25?hs=c77ff47b5cafa82beb776ecb8fbb42a7& 🔓 on March 27, 2025 4:16 pm

    l877sl

    Reply
  2. 📜 + 1.815139 BTC.GET - https://graph.org/Message--04804-03-25?hs=c77ff47b5cafa82beb776ecb8fbb42a7& 📜 on March 28, 2025 1:29 pm

    gvnl9n

    Reply
Leave A Reply Cancel Reply

Editors Picks

Qualcomm to launch data center processors that link to Nvidia chips

May 19, 2025

Grok’s ‘white genocide’ responses show gen AI tampered with ‘at will’

May 17, 2025

Tech IPO market is finally showing signs of life

May 16, 2025

AI travel agents planning future trip far beyond ‘assistant’ status

May 16, 2025
Latest Posts

Healthcare Cyber Attacks – 276 Million Patient Records were Compromised In 2024

May 15, 2025

Hackers Launching Cyber Attacks Targeting Multiple Schools & Universities in New Mexico

May 6, 2025

Over 90% of Cybersecurity Leaders Worldwide Encountered Cyberattacks Targeting Cloud Environments

May 1, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Welcome to RoboNewsWire, your trusted source for cutting-edge news and insights in the world of technology. We are dedicated to providing timely and accurate information on the most important trends shaping the future across multiple sectors. Our mission is to keep you informed and ahead of the curve with deep dives, expert analysis, and the latest updates in key industries that are transforming the world.

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
© 2025 Robonewswire. Designed by robonewswire.

Type above and press Enter to search. Press Esc to cancel.

STEAM Education

At FutureBots, we believe the future belongs to creators, thinkers, and problem-solvers. That’s why we’ve made it our mission to provide high-quality STEM products designed to inspire curiosity, spark innovation, and empower learners of all ages to shape the world through robotics and technology.