Get a Pentest and security assessment of your IT network.

Cyber Security

New Ursnif Malware Campaign Uses Fileless Infection to Avoid Detection

A new malware campaign spreading the Ursnif banking Trojan using PowerShell to achieve fileless persistence was detected by Cisco’s Advanced Malware Protection (AMP) Exploit Prevention engine. The malware is an offspring of the original Gozi banking Trojan that got its source code leaked online during 2014. It uses Microsoft Word documents containing a malicious VBA macro that will automatically run using AutoOpen if macros are already enabled. The VBA macros contain a single line designed to execute the next infection stage by accessing the AlternativeText property of the Shapes object ‘j6h1cf’

Source: https://www.bleepingcomputer.com/news/security/new-ursnif-malware-campaign-uses-fileless-infection-to-avoid-detection/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security