Email spamming is increasing every single day. It is the most lucrative attack method used by threat actors to infect individuals or organizations without their knowledge. To provoke the recipients, usually, these emails include some enticing content or offer or gift. Once the victims are convinced, they are asked to click on an attachment(s) that comes with the email.
These attachments have been evolving over the years to make the users less suspicious. However, there are few file attachments that continue to be used by threat actors to hide their malware.
These files contained embedded macros that enable threat actors to download malware in the background of the affected system. Most often these attachments target office workers. They are disguised as contracts, bills, tax notifications or urgent messages.
Attackers have used disk images in the past months to deliver malware such as Agent Tesla, which specializes in stealing credentials.
Publisher