A recent phishing campaign is employing decoy Microsoft Word documents to deliver a backdoor written in the Nim programming language. Nim-based malware is less common, putting security experts at a disadvantage due to their unfamiliarity with the language. The attack begins with a phishing email containing a Word document attachment that prompts the recipient to enable macros, initiating the deployment of the Nim malware. The backdoor then connects to a remote server mimicking a government domain from Nepal. Nim’s cross-compilation features allow attackers to create one malware variant that can be cross-compiled to target different platforms. This disclosure coincides with the revelation of a social engineering campaign distributing a new Python-based stealer malware called Editbot Stealer via social media platforms. Meanwhile, phishing campaigns continue to distribute known malware like DarkGate and NetSupport RAT, using various attack chains and social engineering techniques. The use of both email and fake update lures demonstrates cybercriminals’ creativity in attempting to install the final payload.
Newsflash
- How a U.S. Law Change Could Impact the Global Internet and Online Freedom
- Telkom Kenya Lands KSh 570M Contract for Open RAN Expansion
- Nvidia CEO: The Future of AI Will Require 100x More Computing Power
- The AI Race Heats Up: Breakthrough Innovations from OpenAI, Google, and China’s Rising Tech Titans
- Google Offers Gemini Code Assist Free to Individual Developers
- Alibaba Unveils Wan 2.1 AI Model to Compete with OpenAI
- Internet Disruptions Hit Nairobi Amid Escalating Feud Between City Hall and Kenya Power
- Epson Appoints New President & CEO to Drive Global Innovation and Growth
- Ethiopian Airlines and Airbus Sign Flight Hour Services Agreement to Boost Fleet Efficiency
- Survey: 58% of Africans Fear Financial Losses from Cybercrime Amid Rising Digital Threats