Dubbed by the name of MirrorBlast, the new phishing campaign weaponized Excel documents that are extremely hard to detect and compromise financial firms. One of the most notable features of MirrorBlast, the low detection rates of the malicious Excel documents of the campaign, put firms that solely detect tools at high risk.
The threat actors behind these malicious documents made considerable effort to obscure malicious code resulting in the achievement of zero detection on VirusTotal. But, these compromised files have pitfalls that the threat actors are willing to accept as trade-offs. For example, the macro code is only able to execute on a 32-bit version of Office.
To Read More: BleepingComputers
For more such updates follow us on Google News ITsecuritywire News