This new phishing attack uses a sneaky infostealer to cause maximum damage
published 15 August 2024
Researchers find an infostealer that even grabs PDF files

Security researchers have observed a new infostealing malware campaign that grabs an unusually large and diverse set of files.
In its report, Barracuda noted the infostealer is rather unusual since it grabs more files than other infostealers go for. Besides the regular browser information, cookies, saved passwords, credit card information, download history, and autofill information, the infostealer also tries to collect all .PDF files found on Desktop, Downloads, Documents, and the Recent folder in %AppData% and %Temp%Browser.
Finally, it also steals any cryptocurrency-related browser extension folders, such as MetaMask, BNB Chain Wallet, Coinbase Wallet and Ronin Wallet.
Unusual infostealer
Barracuda explained how the unnamed threat actors launched a phishing campaign that distributes an .ISO file, masquerading as a purchase order.
All of the emails are sent from the same address – ‘yunkun[@]saadelbin[.]com’, claiming to be a company account. However, the company name and all contact details are fake.
If the victim still runs the attachment, they will see an HTA file – an HTML application that uses web technologies, but runs on the desktop instead of a web browser. This allows the malware to work around any security features built into the web browser, Barracuda added.
This HTA file will download and run an obfuscated JavaScript file which, in turn, downloads and runs a PowerShell file. The PowerShell file, ultimately, downloads a .ZIP file which holds the final payload, the infostealing Python script.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
“The amount of information collected is extensive and sensitive,” the researchers explained. “The stolen saved passwords and cookies could help an attacker to move laterally in the organization, while credit card information and bitcoin wallet information could be used to steal money.”
As usual, the best way to defend against phishing attacks is to be mindful of incoming emails and to be careful when downloading and running attachments.
More from TechRadar Pro
- FedEx and UPS phishing scams are becoming more widespread – here’s what to know
- Here’s a list of the best malware removal tools around today
- These are the best endpoint security tools right now
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Cybercriminals linked to China are going after Russian targets

Microsoft fixes security bug that kept booting PCs into recovery mode

Businesses are struggling to prepare for deepfake attacks
Most Popular











-
1Businesses are struggling to prepare for deepfake attacks
-
2Kingdom Come: Deliverance 2 has been delayed until 2025
-
3This new phishing attack uses a sneaky infostealer to cause maximum damage
-
4There’s a new Dyson Airwrap in town – and this one pairs with your smartphone to personalize your style
-
5T-Mobile fined $60 million over unauthorized data access