A recent phishing campaign is employing decoy Microsoft Word documents to deliver a backdoor written in the Nim programming language. Nim-based malware is less common, putting security experts at a disadvantage due to their unfamiliarity with the language. The attack begins with a phishing email containing a Word document attachment that prompts the recipient to enable macros, initiating the deployment of the Nim malware. The backdoor then connects to a remote server mimicking a government domain from Nepal. Nim’s cross-compilation features allow attackers to create one malware variant that can be cross-compiled to target different platforms. This disclosure coincides with the revelation of a social engineering campaign distributing a new Python-based stealer malware called Editbot Stealer via social media platforms. Meanwhile, phishing campaigns continue to distribute known malware like DarkGate and NetSupport RAT, using various attack chains and social engineering techniques. The use of both email and fake update lures demonstrates cybercriminals’ creativity in attempting to install the final payload.
Newsflash
- Wentors 2.0: Revolutionizing Mentorship and Workforce Development for Women in Tech
- Google Brings Gemini AI to Smart TVs, The Future of Entertainment and Smart Homes
- Nvidia Unveils Groundbreaking AI, Gaming Chips, and Desktop PC at CES 2025
- Applications Open for the 2025 Africa SDGs Mentorship Program Empowering Future African Leaders
- Binance’s BNSOL Surpasses $1 Billion TVL: A New Milestone in Solana Staking
- Little Launches Little Pay PoS: Revolutionizing Kenya’s Payment Landscape
- Hydrobox Secures $9 Million to Expand Rural Electrification in Kenya
- IRIS² Europe’s Bold Satellite Internet Initiative
- 1Vault: Revolutionizing Nigerian MSMEs with an All-in-One Super App
- Seedstars Africa Ventures I Raises $42M to Empower African Startups