New Malware Spreads via Email, Disguised as Google App

Written by Camilla Jessen

Sep.03 - 2024 11:47 AM CET

Technology
Photo: Shutterstock.com
Photo: Shutterstock.com
A new malware is spreading through phishing emails.

Trending Now

A new malware dubbed "Voldemort" has been making waves in recent weeks, sending over 20,000 emails worldwide as it spreads through phishing attacks.

Discovered by IT security researchers at Proofpoint on August 5, this malware has proven to be particularly deceptive.

"Voldemort" employs a sophisticated tactic to evade detection: it disguises its network traffic as legitimate by using Google Sheets as an interface. This method allows the malware’s data transmissions to appear harmless, slipping past security programs unnoticed.

How It Spreads

The malware is being distributed via phishing emails that are designed to look like they come from tax authorities. These emails contain links to what appear to be important documents, tricking victims into downloading a disguised file. When the link is clicked, a ZIP file that looks like a PDF is automatically downloaded. This file then installs the "Voldemort" malware in the background.

Once activated, "Voldemort" can steal sensitive data, download additional malware, or even delete files.

According to T-Online and Proofpoint, the malware is primarily focused on data theft, which poses serious risks, particularly for businesses. The stolen data could potentially compromise national security.

The researchers believe that the "Voldemort" campaign may be linked to a government-affiliated group and could be intended for espionage. The combination of traditional phishing techniques with the unusual use of Google Sheets suggests that a well-organized group is behind this attack.

How to Protect Against "Voldemort"

To protect against this new threat, Proofpoint recommends several security measures:

  • Restrict Access: Limit access to external file-sharing services.

  • Block Connections: Block connections to TryCloudflare, a service from Cloudflare that can be exploited by attackers.

  • Monitor PowerShell Scripts: Keep an eye on suspicious PowerShell scripts, which can be used to automate and manage systems.

  • Employee Awareness: Regularly train employees to recognize phishing attempts.

  • Use Multi-Factor Authentication: Implement multi-factor authentication to add extra layers of security.

By following these steps, businesses and individuals can better protect themselves from the "Voldemort" malware and other similar threats.