The domain of deception: Attackers deploy spyware under the guise of legal threats

After the user entered the archive password and clicked on the alleged legal document inside, a Trojan was installed on the device. The user saw a message displayed that read, “This document cannot be opened on this device.
Try opening it on another windows device,” and simultaneously the Tor Browser was covertly downloaded and installed in the background. Through it, the malware regularly sent snapshots of the user’s screen to the attackers over the Tor network. The malware also autostarts whenever the computer is restarted.
“This campaign is a sophisticated blend of psychological manipulation and technical deception, leveraging fear of legal action to coerce businesses into executing harmful files hidd en in attached archives.
Its rapid growth since June 11 underscores the urgency for organizations to bolster defenses. Victims face the risk of losing their private data. Robust email security, employee training, and swift incident reporting are essential to counter this evolving threat,” comments Anna Lazaricheva, spam analyst at Kaspersky.
Kaspersky recommends corporate and individual users:
- Be careful when interacting with attachments. Do not open any attached archives (including those that are password-protected) that look suspicious. Do not run executable files, as they may deploy malware.
- Try to verify sender authenticity, confirm the legitimacy of any legal claims or entities mentioned in unsolicited emails.
- Implement endpoint protection to detect and block attack attempts.
- Educate staff on recognizing attack tactics.
- Immediately notify IT or cybersecurity teams if any files that have been attached to suspected phishing emails have been opened.