{"id":78198,"date":"2025-07-02T14:13:25","date_gmt":"2025-07-02T11:13:25","guid":{"rendered":"https:\/\/gulftech-news.com\/en\/?p=78198"},"modified":"2025-07-02T14:13:26","modified_gmt":"2025-07-02T11:13:26","slug":"the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats","status":"publish","type":"post","link":"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/","title":{"rendered":"The domain of deception: Attackers deploy spyware under the guise of legal threats"},"content":{"rendered":"\n<p><a>Kaspersky has detected a rapidly escalating malicious campaign that has targeted over 1,100 corporate users since June 2025. The attackers pose as a legal firm and in their emails threaten recipients with lawsuits over alleged domain name patent violations, aiming to deploy malware. <\/a><\/p>\n\n\n\n<p><a>Victims who opened and launched the attached files \u2013 that mimicked legal documents \u2013 had a Trojan installed on their devices, and the attackers could spy on the content of their screens. Organizations across healthcare, finance, and education sectors have been targeted.<\/a><\/p>\n\n\n\n<p><a>The campaign began with 95 emails on June 11 and has since continued to escalate. Apart from claiming that the recipient\u2019s domain name violates patented combinations of a major brand and threatening litigation, in the email the fake legal bureau also expresses the patent holders\u2019 interest in acquiring the domain and offers getting acquainted with the details of the alleged violations by opening the attached archive with \u201cdocuments\u201d. <\/a><\/p>\n\n\n\n<p><a>It is worth noting that the attackers, likely to avoid detection, attach an archive that is not password protected, and inside it includes another archive that <em>is<\/em> password protected and a file containing the password along with it.<\/a><\/p>\n\n\n\n<p>After the user entered the archive password and clicked on the alleged legal document inside, a Trojan was installed on the device. The user saw a message displayed that read, \u201cThis document cannot be opened on this device. <\/p>\n\n\n\n<p>Try opening it on another windows device,\u201d and simultaneously the Tor Browser was covertly downloaded and installed in the background. Through it, the malware regularly sent snapshots of the user\u2019s screen to the attackers over the Tor network. The malware also autostarts whenever the computer is restarted.<\/p>\n\n\n\n<p>\u201cThis campaign is a sophisticated blend of psychological manipulation and technical deception, leveraging fear of legal action to coerce businesses into executing harmful files hidd\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 en in attached archives. <\/p>\n\n\n\n<p>Its rapid growth since June 11 underscores the urgency for organizations to bolster defenses. Victims face the risk of losing their private data. Robust email security, employee training, and swift incident reporting are essential to counter this evolving threat,\u201d comments Anna Lazaricheva, spam analyst at Kaspersky.<\/p>\n\n\n\n<p>Kaspersky recommends corporate and individual users:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Be careful when interacting with attachments. Do not open any attached archives (including those that are password-protected) that look suspicious. Do not run executable files, as they may deploy malware.<\/li>\n\n\n\n<li>Try to verify sender authenticity, confirm the legitimacy of any legal claims or entities mentioned in unsolicited emails.<\/li>\n\n\n\n<li>Implement <a href=\"https:\/\/kaspersky.com\/premium\">endpoint protection<\/a> to detect and block attack attempts.<\/li>\n\n\n\n<li>Educate staff on recognizing attack tactics.<\/li>\n\n\n\n<li>Immediately notify IT or cybersecurity teams if any files that have been attached to suspected phishing emails have been opened.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky has detected a rapidly escalating malicious campaign that has targeted over 1,100 corporate users since June 2025. The attackers pose as a legal firm and in their emails threaten recipients with lawsuits over alleged domain name patent violations, aiming to deploy malware. Victims who opened and launched the attached files \u2013 that mimicked legal &hellip;<\/p>\n","protected":false},"author":2,"featured_media":78200,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[644],"tags":[1088],"class_list":["post-78198","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-communications-technology","tag-kaspersky-4"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The domain of deception: Attackers deploy spyware under the guise of legal threats - Gulf Tech News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The domain of deception: Attackers deploy spyware under the guise of legal threats - Gulf Tech News\" \/>\n<meta property=\"og:description\" content=\"Kaspersky has detected a rapidly escalating malicious campaign that has targeted over 1,100 corporate users since June 2025. The attackers pose as a legal firm and in their emails threaten recipients with lawsuits over alleged domain name patent violations, aiming to deploy malware. Victims who opened and launched the attached files \u2013 that mimicked legal &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Gulf Tech News\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-02T11:13:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-02T11:13:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/Kaspersky-New-Logo.png?v=1751454785\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"405\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"bessan helmi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"bessan helmi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/\",\"url\":\"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/\",\"name\":\"The domain of deception: Attackers deploy spyware under the guise of legal threats - Gulf Tech News\",\"isPartOf\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/Kaspersky-New-Logo.png?v=1751454785\",\"datePublished\":\"2025-07-02T11:13:25+00:00\",\"dateModified\":\"2025-07-02T11:13:26+00:00\",\"author\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c\"},\"breadcrumb\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/#primaryimage\",\"url\":\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/Kaspersky-New-Logo.png?v=1751454785\",\"contentUrl\":\"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/Kaspersky-New-Logo.png?v=1751454785\",\"width\":780,\"height\":405,\"caption\":\"The domain of deception: Attackers deploy spyware under the guise of legal threats\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gulftech-news.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The domain of deception: Attackers deploy spyware under the guise of legal threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#website\",\"url\":\"https:\/\/gulftech-news.com\/en\/\",\"name\":\"Gulf Tech News\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gulftech-news.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c\",\"name\":\"bessan helmi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g\",\"caption\":\"bessan helmi\"},\"url\":\"https:\/\/gulftech-news.com\/en\/author\/bessan-helmi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The domain of deception: Attackers deploy spyware under the guise of legal threats - Gulf Tech News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/","og_locale":"en_US","og_type":"article","og_title":"The domain of deception: Attackers deploy spyware under the guise of legal threats - Gulf Tech News","og_description":"Kaspersky has detected a rapidly escalating malicious campaign that has targeted over 1,100 corporate users since June 2025. The attackers pose as a legal firm and in their emails threaten recipients with lawsuits over alleged domain name patent violations, aiming to deploy malware. Victims who opened and launched the attached files \u2013 that mimicked legal &hellip;","og_url":"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/","og_site_name":"Gulf Tech News","article_published_time":"2025-07-02T11:13:25+00:00","article_modified_time":"2025-07-02T11:13:26+00:00","og_image":[{"width":780,"height":405,"url":"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/Kaspersky-New-Logo.png?v=1751454785","type":"image\/png"}],"author":"bessan helmi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"bessan helmi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/","url":"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/","name":"The domain of deception: Attackers deploy spyware under the guise of legal threats - Gulf Tech News","isPartOf":{"@id":"https:\/\/gulftech-news.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/#primaryimage"},"image":{"@id":"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/Kaspersky-New-Logo.png?v=1751454785","datePublished":"2025-07-02T11:13:25+00:00","dateModified":"2025-07-02T11:13:26+00:00","author":{"@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c"},"breadcrumb":{"@id":"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/#primaryimage","url":"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/Kaspersky-New-Logo.png?v=1751454785","contentUrl":"https:\/\/gulftech-news.com\/en\/wp-content\/uploads\/2025\/07\/Kaspersky-New-Logo.png?v=1751454785","width":780,"height":405,"caption":"The domain of deception: Attackers deploy spyware under the guise of legal threats"},{"@type":"BreadcrumbList","@id":"https:\/\/gulftech-news.com\/en\/2025\/07\/02\/the-domain-of-deception-attackers-deploy-spyware-under-the-guise-of-legal-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gulftech-news.com\/en\/"},{"@type":"ListItem","position":2,"name":"The domain of deception: Attackers deploy spyware under the guise of legal threats"}]},{"@type":"WebSite","@id":"https:\/\/gulftech-news.com\/en\/#website","url":"https:\/\/gulftech-news.com\/en\/","name":"Gulf Tech News","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gulftech-news.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c","name":"bessan helmi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g","caption":"bessan helmi"},"url":"https:\/\/gulftech-news.com\/en\/author\/bessan-helmi\/"}]}},"_links":{"self":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/78198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/comments?post=78198"}],"version-history":[{"count":1,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/78198\/revisions"}],"predecessor-version":[{"id":78201,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/78198\/revisions\/78201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/media\/78200"}],"wp:attachment":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/media?parent=78198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/categories?post=78198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/tags?post=78198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}