Home United States USA — IT Malware distributors switch to less suspicious file types

Malware distributors switch to less suspicious file types

1103
0
SHARE

NewsHubAfter aggressively using JavaScript email attachments to distribute malware for the past year, attackers are now switching to less suspicious file types to trick users.
Last week, researchers from the Microsoft Malware Protection Center warned about a new wave of spam emails that carried malicious. LNK files inside ZIP archives. Those files had malicious PowerShell scripts attached to them.
PowerShell is a scripting language for automating Windows system administration tasks. It has been abused to download malware in the past and there are even malware programs written entirely in PowerShell.
In the recent campaign seen by Microsoft, the malicious LNK files contained a PowerShell script that downloaded and installed the Kovter click fraud trojan. The same technique has been used in the past to distribute the Locky ransomware.
On Thursday researchers from Intel Security warned that PowerShell can also be used in so-called fileless attacks, where the malicious code is launched directly into memory and nothing is saved to disk for endpoint security products to detect.

Continue reading...