Malware Campaign Hides in Resumes and Medical Leave Forms

The campaigns have been part of the overall increase in coronavirus-related malware activity.



Criminals are using resumes to hide malicious payloads in a business climate that has seen hundreds of thousands of individuals searching for jobs. According to new research, the fake CVs disguise banking trojans and data stealers in macros within Microsoft Excel files.

Researchers at Check Point Software say that a new campaign of Zloader malware has been part of an overall doubling of recume-based subterfuge in the last two months. A similar campaign involving the TrickBot loader hides within an attachment labeled as a family leave request within the parameters of the Family and Medical Leave Act.

The researchers note that these campaigns are active in a context of greater malware activity connected with the coronavirus pandemic. They recommend that companies pay attention to training about using email and the Web safely while keeping software and anti-malware systems current and fully patched.

Read more here.

 
 
 
 
 
 
Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really  bad day" in cybersecurity. Click for more information and to register
Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Email This  | 
Print  | 
RSS
More Insights
Copyright © 2020 UBM Electronics, A UBM company, All rights reserved. Privacy Policy | Terms of Service