Get Help Now
CONTACT US

Get expert threat analysis weekly. Sign up to receive our Threat Briefing:

    RESOURCES  >   THREAT INTEL BRIEFINGS

    Date: 03/29/2023

    Fake W-9 Tax Forms Distribute Emotet Malware

    Overview

    A phishing campaign has been discovered targeting taxpayers by sending fake W-9 forms purporting to be sent from the IRS. Emotet campaigns typically have been known to align with holidays and other yearly occurrences. These emails often contain malicious attachments such as Office documents, OneNote (.one), or ZIP files. The subject for this email will likely be similar to “IRS Online Center.”

    Potential Impact

    Emotet is a paid platform for other threat actors to launch campaigns. Emotet allows threat actors to establish a foothold within a target environment and steal email content, contacts, and other browser-based information. Second stages of the attack could involve ransomware deployment.

    Recommended Actions

    In general, be aware of IRS-related emails. It is unusual for tax forms to be distributed via word documents. Block OneNote file extensions via email if there is no business need to send/receive them. Also, installing MS 365/MS Office group policy templates will allow the implementation of OneNote policies named “Disable embedded files” and “Embedded Files Blocked Extensions.” Lastly, ensure endpoints are monitored 24/7/365 using an Endpoint Detection & Response platform.

    Sources

    https://www.bleepingcomputer.com/news/security/emotet-malware-distributed-as-fake-w-9-tax-forms-from-the-irs/

    Urgent Security Updates for Apple Devices

    Overview

    Apple has released updates for older devices for a vulnerability that is being actively exploited. This vulnerability is tracked as CVE-2023-23529 and is related to a type of confusion bug in the WebKit browser engine that could lead to arbitrary code execution. Exploitation can take place when encountering specifically crafted web content.

    Potential Impact

    Exploitation could lead to device takeover, putting sensitive information stored on vulnerable devices at risk. In-depth details about exploitation are not yet known.

    Recommended Actions

    The update is available in versions iOS 15.7.4 and iPadOS 15.7.4 for iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation). In addition to this fix, other updates have been made available to fix various vulnerabilities.

    Request Consultation

    For more information, fill out the form below and we will be in touch shortly

      Number of Employees - select one:
      Industry - select one:

      Nexus Android Banking Trojan Campaign

      Overview

      A new Android-based banking trojan has been discovered by the Cleafy Threat Intelligence and Response Team. The researchers have recently published their findings on this malware, which has been active since early 2022. Dubbed as Nexus, this trojan is a subscription-based malware-as-a-service (MaaS) platform where threat actors can either purchase or rent access to the malware for carrying out various attacks. Although some experts suggest that Nexus is still in its early developmental stages, several attack campaigns have already been detected worldwide.

      Potential Impact

      With Nexus, threat actors can execute various Account Takeover (AOT) attacks against banking portals and cryptocurrency wallets. These attacks comprise stealing credentials, intercepting SMS messages, and implementing targeted social engineering tactics. Moreover, Nexus is believed to have over 400 distinct native injection attacks on financial applications. Although Nexus and similar malware mainly focus on banking attacks, there is a possibility that threat actors may extend or pivot these capabilities to attack organizational software or sensitive data.

      Recommended Actions

      It’s crucial for organizations to exercise caution regarding various mobile-focused malware campaigns. With the growing trend of businesses providing company-owned cellular devices to their staff, malware platforms like Nexus pose a severe threat to organizational data.

      To safeguard against such malware, companies can conduct robust security awareness training programs to educate users on the risks of downloading potentially harmful applications. Furthermore, implementing mobile device management (MDM) policies and application white-listing can prevent unauthorized downloads or installations of additional applications on corporate devices.

      Sources

      https://cyware.com/news/nexus-new-feature-rich-android-banking-trojan-8eac8ace

      https://www.cleafy.com/cleafy-labs/nexus-a-new-android-botnet

      For strategic clients, your vCISO will add this to your next Office Hours for further discussion. However, if you have an immediate need, concern, or question, please reach out to them directly.

      For non-strategic clients, please reach out to your Advisor for further discussion.

      For those not yet clients of GreyCastle Security, please click the “Contact Us” button below and we’ll be glad to provide assistance as well as answer any questions you might have.


      Let’s Discuss Your Cybersecurity Needs

      Contact Us  
      Privacy Settings
      We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
      Youtube
      Consent to display content from - Youtube
      Vimeo
      Consent to display content from - Vimeo
      Google Maps
      Consent to display content from - Google
      Spotify
      Consent to display content from - Spotify
      Sound Cloud
      Consent to display content from - Sound
      Contact Us