The campaigns have been part of the overall increase in coronavirus-related malware activity.

Dark Reading Staff, Dark Reading

June 5, 2020

1 Min Read

Criminals are using resumes to hide malicious payloads in a business climate that has seen hundreds of thousands of individuals searching for jobs. According to new research, the fake CVs disguise banking trojans and data stealers in macros within Microsoft Excel files.

Researchers at Check Point Software say that a new campaign of Zloader malware has been part of an overall doubling of recume-based subterfuge in the last two months. A similar campaign involving the TrickBot loader hides within an attachment labeled as a family leave request within the parameters of the Family and Medical Leave Act.

The researchers note that these campaigns are active in a context of greater malware activity connected with the coronavirus pandemic. They recommend that companies pay attention to training about using email and the Web safely while keeping software and anti-malware systems current and fully patched.

Read more here.

VIRTUALSUMMIT_DR20_320x50.jpg

 

 

 

 

 

 

Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really  bad day" in cybersecurity. Click for more information and to register

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights