A new email campaign is piggybacking off a major ransomware attack.
What you need to know
- A malicious email campaign is targetting victims of the Kaseya ransomware attack.
- The email claims to have a Windows update that fixes addresses the Kaseya attack.
- Instead of a fix, its attachment includes Cobalt Strike software that can be used to break into people's systems and networks.
A malicious email campaign has been detailed by Malwarebytes' Threat Intelligence Team). It tries to trick people who have fallen victim to the Kaseya-REvil ransomware attack into handing over more control of their PC (via TechRadar). The new campaign pretends to have a fix for the Kaseya attacks in the form of a Windows update when in reality, all it has is an email attachment that breaks into people's computers and networks.
"Guys please install the update from Microsoft to protect against ransomware as soon as possible. This is fixing a vulnerability in Kaseya," the malicious email reads.
A #malspam campaign is taking advantage of Kaseya VSA #ransomware attack to drop #CobaltStrike.
— Malwarebytes Threat Intelligence (@MBThreatIntel) July 6, 2021
It contains an attachment named "SecurityUpdates.exe" as well as a link pretending to be security update from Microsoft to patch Kaseya vulnerability! pic.twitter.com/0nIAOX786i
If someone opens the attachment, it includes the penetration testing software Cobalt Strike. The software can then be used to break into networks or machines. The attachment is named "SecurityUpdates.exe."
As is the case with most security threats, it's important to look at the source of emails and consider what they're asking you to do. Microsoft does not send email attachments with Windows updates, so any email asking you to download such an attachment could put you at risk.
While the Kaseya ransomware attack has been attributed to a gang known as REvil, Malwarebytes hasn't speculated as to the identity of the group behind this new malspam campaign.
The Kaseya ransomware attack reportedly affected thousands of businesses, though that figure is a conservative estimate. This new campaign piggybacks off of that major ransomware attack and attempts to take advantage of people who have already been victimized.
No comments: