A new phishing campaign named MULTI#STORM has emerged, targeting both India and the United States. Researchers from Securonix have identified the attack chain, which involves leveraging JavaScript files to deliver remote access trojans (RATs) on compromised systems. The campaign begins with an email containing a link to a password-protected ZIP file on Microsoft OneDrive.
Upon extraction, a heavily obfuscated JavaScript file is revealed, activating the infection through PowerShell commands. The attack involves a multi-stage process, including the execution of a Python-based executable as a dropper and the deployment of Warzone RAT, a commercially available malware. The researchers emphasize the need for vigilance against phishing emails, particularly those emphasizing urgency. The phishing attack employs a multi-stage approach, starting with a password-protected ZIP file hosted on OneDrive. The victim, upon clicking an embedded link, extracts and activates a JavaScript file, initiating the infection process. The attackers use decoy PDF documents and Python-based executables to deceive and run malicious payloads in the background. Notably, the campaign utilizes various techniques, such as Windows Registry modification and privilege escalation, to ensure persistence and avoid detection.
The final stage involves deploying Warzone RAT, a commercially available malware with extensive capabilities for data harvesting and downloading additional malware like Quasar RAT. Securonix researchers caution users to remain vigilant against phishing emails, especially those creating a sense of urgency. They highlight that this particular lure is activated by executing a JavaScript file directly, suggesting that employing shortcut files or files with double extensions could enhance the success rate of such attacks. The researchers’ insights underscore the evolving sophistication of phishing tactics and the importance of continuous awareness and cybersecurity measures to mitigate the risks associated with such campaigns.