![]() ![]() When the receiver opens any of these RTF documents, a keylogger component is dropped on the computer, which then does rest of the job. These documents are loaded with codes that exploit the CVE-RTF-2012-0158 vulnerability. The attack uses spear phishing emails with attachments of malicious Microsoft Office documents (RTF). In May 2016, Quick Heal detected an attack related to this campaign, on the computers of multiple users. These software are easily available on the Internet and can be used for keylogging, stealing passwords and capturing screenshots. ![]() ![]() The campaign has been noticed to make use of three keyloggers (malicious software that records information entered by a user on their computer keyboard) iSpy logger, Predator logger and Knight Logger. Quick Heal Threat Research Lab has recently observed an active cybercrime campaign designed to steal user info. Infostealer Campaign detected in the wild ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |