Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

CarnavalHeist Malware Steals Credentials

May 31, 2024
Reading Time: 3 mins read
in Alerts
CarnavalHeist Malware Steals Credentials

Hackers have weaponized Word documents to steal login credentials using a malware dubbed “CarnavalHeist.” According to cybersecurity researchers at Cisco Talos, CarnavalHeist specifically targets Brazilian users, leveraging the widespread use and trust of Word documents to deceive victims into opening them. The malware is distributed through invoice-themed emails containing shortened URLs that redirect users to fake invoice websites. These websites download a malicious LNK file via WebDAV, which runs the next stage payload.

CarnavalHeist employs advanced social engineering techniques by extensively using Portuguese terms and targeting Brazilian financial institutions. The malware shows a false PDF document to mislead users while executing malicious code in the background. It utilizes obscured Python scripts, dynamically generated domains, and DLL injections to load a banking Trojan payload. This Trojan captures credentials, screenshots, videos, and enables remote access, with capabilities such as generating QR codes to steal transactions.

The malware campaign has been active since at least November 2023, with increased activity noted from February 2024. The command and control infrastructure is hosted in Microsoft Azure’s BrazilSouth region, and the malware uses a domain generation algorithm (DGA) to create subdomains for downloading payloads and communications. CarnavalHeist’s activities highlight the evolving threat landscape and the persistent efforts of attackers to develop sophisticated methods for compromising victims’ systems and stealing sensitive data.

Cisco Talos continues to identify new samples of CarnavalHeist, emphasizing the need for organizations and individuals to remain vigilant and implement robust cybersecurity measures to protect against such threats. Users are advised to be cautious when opening unsolicited emails and to keep their systems updated with the latest security patches to mitigate the risk of malware infections.

Reference:

  • CarnavalHeist Malware Uses Word Documents to Target Brazilian Financial Data

Tags: BrazilCarnavalHeistCisco TalosCyber AlertCyber Alerts 2024Cyber RiskCyber threatMay 2024Social EngineeringWord
ADVERTISEMENT

Related Posts

Russian APT28 Deploys Outlook Backdoor

SAP S4hana Exploited Vulnerability

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Virustotal Finds Undetected SVG Files

September 5, 2025
Russian APT28 Deploys Outlook Backdoor

Russian APT28 Deploys Outlook Backdoor

September 5, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Lazarus Hackers Exploit ZeroDay, Deploy Rats

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

CISA Flags TP Link Router Flaws

September 4, 2025
Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

September 4, 2025

Latest Alerts

SAP S4hana Exploited Vulnerability

Virustotal Finds Undetected SVG Files

Russian APT28 Deploys Outlook Backdoor

CISA Flags TP Link Router Flaws

Lazarus Hackers Exploit ZeroDay, Deploy Rats

Google Patches 120 Flaws In Android

Subscribe to our newsletter

    Latest Incidents

    North Korean Hackers Fake Interviews

    Bridgestone Confirms Cyberattack

    Cybersecurity Firms Hit By Breach

    Salesloft Drift Attacks Hits Vendors

    Jaguar Land Rover Hit By Cyber Incident

    Hackers Use Grok Ai To Spread Malware

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial