Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

TeamPCP backdoor LiteLLM versions 1.82.7 to 1.82.8 Likely due to Trivy CI/CD compromise

Tax search ads use Huawei drivers to deliver ScreenConnect malware that disables EDR

Hackers use fake resumes to steal corporate credentials and deploy Crypto Miner

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers use fake resumes to steal corporate credentials and deploy Crypto Miner
Identity

Hackers use fake resumes to steal corporate credentials and deploy Crypto Miner

By March 24, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 24, 2026Malware/Endpoint Security

An ongoing phishing campaign targets French-speaking corporate environments using fake resumes that lead to the introduction of cryptocurrency miners and information thieves.

“The campaign uses highly obfuscated VBScript files disguised as resumes/CV documents, delivered through phishing emails,” Securonix researchers Shikha Sangwan, Akshay Gaikwad, and Aaron Beardslee said in a report shared with The Hacker News.

“Once executed, the malware deploys a versatile toolkit that combines credential theft, data exfiltration, and mining of Monero cryptocurrency for maximum monetization.”

This activity has been codenamed “FAUX#ELEVATE” by the cybersecurity firm. This campaign is notable for its exploitation of legitimate services and infrastructure, including Dropbox for staging payloads and a WordPress site in Morocco to host command and control (C2) configurations and emails.[.]ru SMTP infrastructure for extracting stolen browser credentials and desktop files.

This is an example of a persistent attack that raises the bar on how attackers can trick defense mechanisms and sneak into targeted systems without attracting too much attention.

The first dropper file is a Visual Basic Script (VBScript) that, when opened, displays a fake French error message, making the message recipient think the file is corrupted. However, what happens behind the scenes is that the highly obfuscated script runs a series of checks to evade the sandbox, enters a persistent User Account Control (UAC) loop, and asks the user to run the script with administrator privileges.

In particular, of the 224,471 lines in the script, only 266 lines contain actual executable code. The rest of the script is filled with junk comments containing random English sentences, increasing the file size to 9.7 MB.

“Malware also uses domain join gates using WMI [Windows Management Instrumentation]”Ensure that the payload is only delivered on enterprise machines and completely excludes standalone home systems,” the researchers said.

Once the dropper gains administrative privileges, it immediately covers its tracks by disabling security controls, configuring Microsoft Defender exclusion paths for all primary drive letters (C through I), disabling UAC through Windows registry changes, and deleting itself.

The dropper is also responsible for retrieving two separate password-protected 7-Zip archives hosted on Dropbox.

gmail2.7z (contains various executables for stealing data and mining cryptocurrencies) gmail_ma.7z (contains utilities for persistence and cleanup)

Among the tools used to facilitate credential theft is a component that leverages the ChromElevator project to bypass App-Bound Encryption (ABE) protection and extract sensitive data from Chromium-based browsers. Other tools include:

mozilla.vbs, VBScript malware to steal Mozilla Firefox profiles and credentials Wall.vbs, VBScript payload for desktop file extraction mservice.exe, XMRig cryptocurrency miner launched after acquiring mining settings from compromised Moroccan WordPress site WinRing0x64.sys, genuine Windows kernel driver used to unlock CPU Full mining potential RuntimeHost.exe, Windows Persistent Trojan component that modifies firewall rules and periodically communicates with C2 servers

Only browser data is extracted using two separate emails[.]The ru sender accounts (‘olga.aitsaid@mail.ru’ and ‘3pw5nd9neeyn@mail.ru’) share the same password via SMTP with another email address operated by the threat actor (‘vladimirprolitovitch@duck.com’).

Once the credential theft and exfiltration activity is complete, the attack chain begins an aggressive cleanup of all dropped tools to minimize its forensic footprint, leaving behind only miners and Trojans.

“The FAUX#ELEVATE campaign demonstrates a well-orchestrated, multi-stage attack campaign that combines several notable techniques into a single infection chain,” Securonix said.

“What makes this campaign particularly dangerous to enterprise security teams is its speed of execution, with the complete infection chain from initial VBS execution to credential exfiltration completed in approximately 25 seconds, and selective targeting of domain-joined machines to ensure that all compromised hosts provide the most value through enterprise credential theft and persistent resource hijacking.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMeet the former Apple designers building new AI interfaces with Hark
Next Article Tax search ads use Huawei drivers to deliver ScreenConnect malware that disables EDR

Related Posts

TeamPCP backdoor LiteLLM versions 1.82.7 to 1.82.8 Likely due to Trivy CI/CD compromise

March 24, 2026

Tax search ads use Huawei drivers to deliver ScreenConnect malware that disables EDR

March 24, 2026

Ghost Campaign uses 7 npm packages to steal cryptocurrency wallets and credentials

March 24, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

TeamPCP backdoor LiteLLM versions 1.82.7 to 1.82.8 Likely due to Trivy CI/CD compromise

Tax search ads use Huawei drivers to deliver ScreenConnect malware that disables EDR

Hackers use fake resumes to steal corporate credentials and deploy Crypto Miner

Meet the former Apple designers building new AI interfaces with Hark

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.