Proofpoint researchers recently discovered a small email-based campaign attacking a major financial services provider. This attack was notable for a few reasons: The attack was very narrow in scope - a small number of malicious emails appear to have been sent to users in a single organization The emails included a Microsoft Word attachment that used an embedded object rather than macros to avoid detection; the embedded object was also highly obfuscated The payload was an unidentified keylogger hardcoded to send logs from infected computers to two Gmail addresses. While the use of embedded objects instead of macros is not new, malicious macros remain the vector of choice for most threat actors at this time. However, we expect that this technique will become more popular in 2017.
Created: 2026-02-23
Indicatorsは見つかっていない。
このPulseに見つかったCVEはありません。