Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

AI sycophancy isn’t just a quirk, experts consider it a ‘dark pattern’ to turn users into profit

UNC6384 deploys Plugx via captive portal hijacking and valid certificates targeted at diplomats

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Phishing campaigns deliver rat payloads using upcrypter with fake voicemail email
Identity

Phishing campaigns deliver rat payloads using upcrypter with fake voicemail email

userBy userAugust 25, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Cybersecurity researchers are flagging new phishing campaigns using fake voicemail and purchase orders to deliver malware loaders called Upcryptors.

The campaign “creates carefully crafted emails to deliver malicious URLs linked to persuasive phishing pages,” said Cara Lin, a researcher at Fortinet Fortiguard Labs. “These pages are designed to tempt you to download JavaScript files where Recipient acts as a dropper for Upcrypter.”

Malware propagation attacks have primarily targeted the manufacturing, technology, healthcare, construction, and retail/hospitality sectors around the world since their inception in August 2025. The majority of infections have been observed in Austria, Belarus, Canada, Egypt, India, Pakistan and others.

Upcrypter serves as a conduit for a variety of remote access tools (rats), including PureHVNC rats, DCRAT (aka DarkCrystal Rat), and Babylon rats.

The starting point for the infection chain is phishing emails using voicemail messages and themes related to purchases. Click on the link where the recipient faces a fake landing page directly and then click on the link where they are asked to download the voice message or PDF document.

Cybersecurity

“The lure page is designed to look convincing by not only displaying the victim’s domain string in the banner, but also by retrieving and embedding the domain’s logo within the page content to enhance reliability,” Fortinet says. “Its main purpose is to provide malicious downloads.”

The downloaded payload is a ZIP archive containing obfuscated JavaScript files, then contacting an external server to get the next stage of malware, but checking your internet connection and scanning the process of running your forensic tools, debuggers, or sandbox environment.

The loader contacts the same server to get the final payload either in plain text form or in a technique called steganography embedded in harmlessly-looking images.

Fortinet said Upcrypter is also being distributed as a Microsoft Intermediate Language (MSIL) Loader. It performs anti-analysis and prevention machine checks, similar to the JavaScript counterpart, then downloads three different payloads.

The attack embeds data from the DLL loader and embeds the payload while it is running, allowing malware to run without writing to the file system. This approach also has the advantage of minimizing forensic traces, which allows malware to fly under the radar.

“This combination of aggressively maintained loaders, layered obfuscation, and diverse rat delivery demonstrates an adaptive threat delivery ecosystem that can bypass defenses and maintain sustainability in a variety of environments,” Lynn said.

This disclosure comes as we detail a large-scale phishing campaign that has abused Google Classroom to distribute over 115,000 phishing emails between August 6th and 12th, 2025, targeting 13,500 organizations across multiple industries.

“The attackers misused this trust by sending fake invitations containing unrelated commercial offers, ranging from product resale pitches to SEO services,” the company said. “Each email instructed recipients to contact scammers via WhatsApp phone numbers, a tactic that is often linked to scam schemes.”

Attacks bypass the security system. This helps you bypass key email authentication protocols such as SPF, DKIM, DMARC, and place phishing emails in your user’s inbox by leveraging the trust and reputation of Google Classroom’s infrastructure.

These campaigns are part of a major trend in threat actors using legal services such as Microsoft 365 Direct Send and Onenote.[.]Co Link Shorter – An approach known as a life-long site (lot).

Identity Security Risk Assessment

“After the threat actors acquired M365 qualification for one user in their organization through a phishing attack, they created a OneNote file in the Personal Documents folder of the compromised user on Onedrive, and embed the lure URL for the next phishing stage.”

The misuse of Direct Send has encouraged organizations called “Reject Direct Send” to introduce options to address issues directly. Alternatively, customers could apply custom header stamping and quarantine policies to detect emails that they claim to be internal communication, but in reality they are not.

These developments involve attackers who are increasingly relying on client-side evasion techniques for phishing pages to stay ahead of both auto-detection systems and human analysts. This includes JavaScript-based blocking, using Browser in the Browser (BITB) templates, and hosting pages in a virtual desktop environment using NOVNC.

“A notable way of becoming more popular is the use of JavaScript-based anti-analysis scripts: small but effective bits of code embedded in phishing pages, fake tech support sites, and malicious redirects,” Doppel said. “When such activity is identified, the site will immediately redirect users to blank pages, or disable further interactions, blocking access before deeper inspections occur.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSilicon Valley is shaking the mid-term with attention to millions of PAC PACS
Next Article Thetruthspy phone spyware new security flaw puts victims at risk
user
  • Website

Related Posts

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

August 25, 2025

UNC6384 deploys Plugx via captive portal hijacking and valid certificates targeted at diplomats

August 25, 2025

Docker Fix CVE-2025-9074, Critical Container Escape Vulnerability with CVSS Score 9.3

August 25, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

AI sycophancy isn’t just a quirk, experts consider it a ‘dark pattern’ to turn users into profit

UNC6384 deploys Plugx via captive portal hijacking and valid certificates targeted at diplomats

Docker Fix CVE-2025-9074, Critical Container Escape Vulnerability with CVSS Score 9.3

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

TwinH’s Paves Way at Break The Gap 2025

Smarter Healthcare Starts Now: The Power of Integrated Medical Devices

The Genius of Frustration: Tim Berners-Lee on Creating the Internet We Know

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.