Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Wikipedia says AI search summaries and social videos are causing traffic decline

This top VC bets nearly 20% of its money on teenagers – here’s why

YouTubers are no longer dependent on ad revenue — how some YouTubers are diversifying

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » comicform and sectorJ149 hacker deploys form book malware in Eurasian cyberattack
Identity

comicform and sectorJ149 hacker deploys form book malware in Eurasian cyberattack

userBy userSeptember 22, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Organizations in Belarus, Kazakhstan and Russia have emerged since at least April 2025 as targets for phishing campaigns carried out by previously undocumented hacking groups called Comicform.

Cybersecurity company F6 focuses primarily on activities targeting the industry, finance, tourism, biotechnology, research and trade sectors.

The attack chain will send an email with subjects such as “Waiting for Signed Document”, “Payment Invoice”, “Signing Settlement Act”, and encourage recipients to open the RR archive. Messages written in Russian or English will be sent from email addresses registered in the top-level domains of .ru, .by and .kz.

The executable is an obfuscated .NET loader designed to launch a malicious dll (“mechmatrix pro.dll”), then runs another DLL named “Montero.dll” which acts as a dropper for form book malware, but runs another dll named “Montero.dll” before creating a scheduled task and setting up Microsoft DefendEdions Extection.

DFIR Retainer Service

Interestingly, we also know that this binary contains Tumblr links that point to completely harmless GIFs of comic book superheroes like Batman, giving the name to threat actors. “These images were not used in the attacks, but they were just part of the malware code,” said F6 researcher Vladislav Kugan.

An analysis of Comicform’s infrastructure revealed signs that phishing emails were also being directed to unspecified companies operating in Kazakhstan in June 2025 and to the Bank of Belarus in April 2025.

F6 also said it detected and blocked phishing emails sent to Russian manufacturers on July 25, 2025 from the email address of the Kazakhstan-based industrial company. These digital miscives have urged future targets to click on the embedded link to verify their accounts and avoid potential blocks.

Users who click on the link are redirected to a fake landing page that mimics the login page of domestic document management services to promote their credentials by sending the entered information to the attacker-controlled domain in the form of an HTTP POST request.

“In addition, in the body of the page, the JavaScript code extracts the email address from the URL parameter, enters ID = “Email” in the input field, extracts the domain from the email address, and sets the screenshot of the website for that domain (sets it via Screenshotapi).[.]Net API) as a background to the phishing page,” Kugan explained.

The attack targeting Belarusian banks involves sending phishing emails with invoice-themed lures, where users enter their email address and phone number on the form, captured and sent to an external domain.

“The group has attacked companies in Russia, Belarus and Kazakhs in various fields, and the use of English email suggests that attackers are also targeting organizations from other countries,” F6 said. “Attackers employ both phishing emails that distribute Formbook malware and phishing resources, as well as phishing resources disguised as web services to harvest access qualifications.”

Pro-Russian Group targets Korea with its Formbook

The disclosure comes when the NSHC Thraretrecon team reveals details of the pro-Lucia cybercriminal group targeting the South Korean manufacturing, energy and semiconductor sectors. This activity is due to a cluster called SectorJ149 (aka UAC-0050).

The attack observed in November 2024 begins with spear phishing emails targeting executives and employees using lures associated with purchasing or requesting quotations for production facilities, leading to the execution of product malware families like Lumma Stealer, Formbook, and Remcos Rat, using visual basic scripts distributed as Microsoft Cabinet (CAB) Archives.

CIS Build Kit

Visual Basic Script is designed to run PowerShell commands that reach for a BitBucket or GitHub repository to retrieve JPG image files. This hides the loader executable that is responsible for launching the final steeler and rat payload.

“PE malware that runs directly in memory area is a loader-type malware that downloads additional malicious data that is disguised as a text file (.txt) via the URL (.txt) contained in the provided parameter values, then decrypts it before generating and running PE malware.”

“In the past, the SectorJ149 group was run primarily for economic benefits, but recent hacking activities targeting Korean companies are believed to have the strong hackitivist nature of using hacking techniques to convey political, social, or ideological messages.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEU Cyber ​​Agency has confirmed ransomware attacks causing airport disruption
Next Article Blue Origin wins NASA deals and goes from Viper Rover to Lunar South Pole
user
  • Website

Related Posts

New .NET CAPI backdoor targets Russian car and e-commerce companies via phishing ZIPs

October 18, 2025

Silver Fox spreads Winos 4.0 attack to Japan and Malaysia via HoldingHands RAT

October 18, 2025

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

October 17, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Wikipedia says AI search summaries and social videos are causing traffic decline

This top VC bets nearly 20% of its money on teenagers – here’s why

YouTubers are no longer dependent on ad revenue — how some YouTubers are diversifying

Too burnt out to travel? This new app will fake your summer vacation photos

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.