Malware News Hackers Hijack Ongoing Email Conversations to Insert Malicious Documents

frogboy

In memoriam 1961-2018
Thread author
Verified
Top Poster
Well-known
Jun 9, 2013
6,720
pXkoVuE.jpg


A group of hackers is using a sophisticated technique of hijacking ongoing email conversations to insert malicious documents that appear to be coming from a legitimate source and infect other targets participating in the same conversational thread.

This type of attack relies on hackers compromising one of the two or more persons involved in an email exchange.

The attackers silently take over the initial victim's email account, study in-progress conversations, and send a new message in an ongoing thread, carrying boobytrapped documents.

This tactic, albeit not new, has been recently spotted in the wild earlier this year, in May.

Hacker group believed to be operating out of North Korea
These highly sophisticated spear-phishing attacks were detected by US security firm Palo Alto Networks, and have targeted a bank based in the Middle East, a trademark and intellectual property service companies based in Europe, an international sporting organization, and even lone individuals with indirect ties to a country in North East Asia.

"The conversations were in a combination of English and the targets' native languages," Palo Alto's Christopher Budd told Bleeping Computer via email, highlighting the group's sophistication and ability to intertwine itself even in non-English discussions.

Read More. Hackers Hijack Ongoing Email Conversations to Insert Malicious Documents
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top