Expert Advise To New Phishing Campaign Using Bazar Trojan

Security researchers at Fortinet have discovered a new phishing campaign that uses a variant of the Bazar trojan which uses anti-analysis techniques to make it more difficult for antivirus software to detect. The anti-analysis techniques use different techniques such as hiding malicious APIs in the code, extra code obfuscation, and encrypting part of the code to make it difficult to analyze.

Experts Comments

February 16, 2021
Jake Moore
Cybersecurity Specialist
ESET

Phishing emails will always continue to target people due to their relatively high click rate, as many victims feel compelled to click on links and attachments due to the increasingly clever luring techniques used by threat actors. With motivating factors such as a believable sounding prize, it can only take the victim one momentary lapse in concentration to click through, and then the harm is done.

 

Trojans can be extremely damaging once inside a network, and if undetected the damage can be

.....Read More

Phishing emails will always continue to target people due to their relatively high click rate, as many victims feel compelled to click on links and attachments due to the increasingly clever luring techniques used by threat actors. With motivating factors such as a believable sounding prize, it can only take the victim one momentary lapse in concentration to click through, and then the harm is done.

 

Trojans can be extremely damaging once inside a network, and if undetected the damage can be costly. Constant quality training is a strong defence when it comes to mitigating such attacks and teaching people to spend a moment before being too quick to click. Updating is another key line of defence for all organisations, as leaving systems unpatched even for a moment could be all it takes for a malicious actor to jump on a new vulnerability and attack.

  Read Less

Submit Your Expert Comments

What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.

Write Your Expert Comments *
Your Registered Email *
Notification Email (If different from your registered email)
* By using this form you agree with the storage and handling of your data by this web site.