Researchers spotted the never-before-seen LookBack malware being used in spearphishing campaigns against three U.S. utilities. The malware has the capabilities to view system data and reboot machines. The emails were sent to three utilities companies between July 19 and 25. Researchers believe the malware is the work of a nation-state actor, based on overlaps with historical campaigns and macros utilized, researchers said. The APT is unnamed at this time due to ongoing investigations, but researchers identified similarities between this malware campaign and previous APT campaigns that targeted Japanese corporations in 2018.
Source: https://threatpost.com/nation-state-apts-target-u-s-utilities-with-dangerous-malware/146910/

