A new report highlights a concerning trend of phishing campaigns specifically targeting Ukrainian government agencies. These attacks utilize Scalable Vector Graphics (SVG) files, crafted to deceive recipients into opening attachments that can compromise their systems. By leveraging this tactic, attackers can effectively bypass traditional security measures that may flag more common file types as suspicious.
The CountLoader malware, once delivered through these malicious emails, is designed to drop additional payloads, namely Amatera Stealer and PureMiner. This escalation of malware deployment poses significant risks, as these tools are capable of stealing sensitive information and conducting persistent surveillance on infected systems. The implications of such breaches extend beyond individual targets, potentially compromising national security given the sensitive nature of governmental data involved.
👉 Pročitaj original: The Hacker News