skip to content
Decrypt LOL

Get Cyber-Smart in Just 5 Minutes a Week

Decrypt delivers quick and insightful updates on cybersecurity. No spam, no data sharing—just the info you need to stay secure.

Read the latest edition

Hackers Use Images to Distribute Malware in Phishing Attacks

/ 1 min read

🖼️💻 Hackers Conceal Malware in Images to Launch Sophisticated Attacks. Threat actors are using images to hide malicious code and deliver malware like VIP Keylogger and 0bj3ctivity Stealer through phishing campaigns. These attacks begin with deceptive emails that trick recipients into opening infected attachments, exploiting a known security flaw to download a PowerShell script. This script retrieves an image from archive.org, decodes it, and executes a .NET loader to install the malware. HP Wolf Security’s report highlights the increasing use of GenAI in crafting these attacks, making them more efficient and accessible to less skilled cybercriminals. The commodification of cybercrime is evident as malware kits become easier to obtain and use, posing a growing threat to cybersecurity.

Source
{entry.data.source.title}
Original