Threat actors exploit Microsoft’s digital signature authenticity to steal user information and other sensitive information by introducing a malicious ZLoader computer program, which was previously used to distribute Ryuk and Conti ransomware, researchers found.
Investigators at Check Point Research (CPR) found the Malsmoke cybercrime group launching the campaign, which they have received since November 2021, according to a report posted online on Wednesday.
The phishing scam using the malware program ZLoader – formerly used to bring Ryuk and Conti ransomware – has already targeted more than 2,000 victims in 111 countries.
Read More: Threatpost
For more such updates follow us on Google News ITsecuritywire News