• MENU
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar

SecNews In Depth IT Security News

  • MANIFESTA Blog
  • Inet
  • Security
  • Investigations
  • tweaks
  • Views
  • TV
  • Search
  • MANIFESTA Blog
  • Inet
  • Security
  • Investigations
  • tweaks
  • Views
  • TV
  • Search
Home / security / Hackers infect systems using Metasploit and malicious Word documents

Hackers infect systems using Metasploit and malicious Word documents

15 November, 2019, 11: 54 am by Absent Mia Leave a Comment

hackers

Some researchers have recently discovered one new hacking club, whose name is TA2101 and it does attacks into a German and Italian Companies For the purpose of install malware backdoor on network their. TA2101 hackers use legal penetration testing tools and backdoor framework, such as Cobalt Strike and Metasploit to exploit victims' systems.

Usually, these tools are used by companies to identify vulnerabilities and protect their systems. However, we have seen other hacking teams as well Cobalt Group, APT32 and APT19 use them to develop malware.

Attackers usually begin their attacks with Phishing techniques and social engineering and continue with banking Trojans and ransomware.

The researchers also discovered that the new hacking team TA2101 used the ransomware Maze to attack an Italian company, as well as his social engineering technique.

Exploit Windows via malicious Word documents

The attacks by the TA2101 team were discovered by its researchers Proofpoint. The malicious campaign took place between 16 October and 12 November 2019. The hackers were sending maliciously emails to companies in Germany, Italy and the United States. Their main goals were IT services, construction companies and healthcare organizations.

According to researchers, most emails contained malicious Word documents.

The message urged victims to open the malicious attachment. If users clicked on the document, they would be enabled running the PowerShell script.

The Powershell script, in turn, downloaded and installed it Maze of ransomware to the victim's device.

The hackers were sending different emails to the victims. In some of them, he seemed like the sender of it German Federal Ministry of Finance. The victims they should open the malicious document to find information on how to avoid further taxation and penalties.

Recently, Proofpoint researchers found another email campaign containing maliciously Word documents that infected victims' systems with IcedID banking Trojan.

And in that campaign, the malicious document led to the installation of malware, payload IcedID, into the corporate systems. The main objective of the campaign was health care organizations. The system contamination process was the same as the recent TA2101 campaign.

The techniques used by this hacking team are very sophisticated and show that hackers are very experienced and ready for many more attacks.

How useful was this post?

Average rating / 5. Vote count:

No votes so far! Be the first to rate this post.

Hackers infect systems using Metasploit and malicious Word documents was last modified: November 15, 2019, 11: 54 by Absent Mia

Share
Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on 15 November | 11: 54 by Absent Mia

Competition: securityTag: hackers, metasploit, phishing emails, ransomware, word, Germany, Italy, malicious documents

Absent Mia

About Absent Mia

Being your self, in a world that constantly tries to change you, is your greatest achievement

Previous Post: « GitHub: The new 'Security Lab' program enhances the security of the open-source ecosystem
Next Post: Alpha Bank: Four awards for the new Bonus app at the Mobile Excellence Awards 2019 »

Reader Interactions

Comment Policy:

SecNews.gr does not immediately post comments. Malicious comments, comments that include ads, or comments with insults are deleted without any warning. We do not endorse the views expressed by our readers.


Leave a reply Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

Primary Sidebar

  • Base64 encoded image 35,641 Happy fans
  • Base64 encoded image 3,656 Followers

trending


Find out how much damage your SSD drive has to Windows 10
Lidl Black Friday deals: Maybe we get the Xbox One S at a low price?
Zorin OS 15 Lite to replace Windows 7
Windows 7 hack to continue with support
Windows 10 Version 1909 installation keys
Bliss OS run the latest Android on your computer
Windows 7 Too hard to die
SecNews MX Linux 19 x64 custom ISO release for Windows
Kickass Torrents: LOC 15 alternatively site for free movies and games!
Remove viruses from Windows with Ubuntu Live USB

tweaks

Enable Tab Freeze in Google Chrome

Windows 7 Disable notification for upgrade

FBI: Beware! Connect your IoT devices to a separate network!

Microsoft: Spear-phishing is growing rapidly - How is it treated?

Comparium: Try your site in different browsers and OS

Find out how much damage your SSD drive has to Windows 10

SecNews MX Linux 19 x64 custom ISO release for Windows

7 pronunciation dictionaries to improve your English

Display the version of Windows on the desktop

Fido: easily download Windows ISO

Copyright © 2010 - 2019 · SecNews | ToS | SiteMap | Contact

el Greek
ar Arabiczh-CN Chinese (Simplified)en Englishfr Frenchde Germanel Greekit Italianru Russian