Cisco uncovers malware campaign targeting high profile industries

Security

by CBR Staff Writer| 01 July 2014

Malware campaign attacked users through malicious e-mails.

Cisco has uncovered a malware campaign called String of Paerls attacks, which targets high profile industries such as television, oil, jewelry, and baking.

The attacks were launched through e-mails containing invoice, purchase order, or receipts specifically designed for the victim.

Cisco researchers stated that: "When the victim opens the Word document, an On-Open macro fires, which results in downloading an executable and launching it on the victim's machine." The attacker used Dropbox to host four distinct pieces of payload to exploit the file sharing service.

Cisco threw some light on the domains named londonpaerl.co.uk and selombiznet. In. Londonpaerl is a twisted version of the original Londonpearl that deals with pearl jewellery. However, the attacker's domain showed an employment agency.

The Networking giant also discovered the hidden content written into the browser and reveled that it has been operating since 2007.

During the investigation they found out that there were other campaigns associated with the threat actor, but they used other piece of malware.

Cisco also discovered that many of the domains were already suspended because of their malicious activities.

In an attempt to reduce the impact the Dropbox security team disabled the file sharing links after the attacks were reported. And Cisco has also blocked all the domains associated with the threat to ensure the security of their customers.

Comments
Post a comment

Comments may be moderated for spam, obscenities or defamation.

Join our network

742 people like this.
0 people follow this.

Security Intelligence

Privcy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.