News

Cyberattackers Exploit Google Sheets for Malware Control

Giulio Saggin
Giulio Saggin
Monday 2 September 2024
Cyberattackers Exploit Google Sheets for Malware Control
Google-16x9

In August 2024, cybersecurity researchers at Proofpoint uncovered a sophisticated malware campaign that has raised significant concerns. Named "Voldemort," this custom malware is believed to be linked to advanced persistent threat (APT) actors with a primary focus on espionage.

The campaign has targeted over 70 organizations worldwide, employing a novel attack chain that leverages social engineering tactics and unconventional command and control (C2) methods.

The Voldemort malware campaign is characterized by its unusual approach to delivering malicious payloads, disseminating over 20,000 phishing emails impersonating tax authorities from various countries, including the United States, United Kingdom, France, Germany, Italy, India, and Japan.

The emails were designed to appear legitimate, notifying recipients of changes to their tax filings, which made them more likely to be opened and acted upon. One of the most striking aspects of the Voldemort campaign is the level of customization involved in the phishing attempts.

The attackers tailored their messages to the language and context of the targeted organizations, using public information to enhance the credibility of their lures. This approach highlights the attackers' meticulous planning and their understanding of their targets.

The Voldemort malware employs a unique command and control mechanism that sets it apart from other malware families, using Google Sheets as a means of communication with the infected machines.

This unconventional approach allows the malware to receive commands and transmit stolen data in a manner that is less likely to be detected by security systems. The emergence of the Voldemort malware campaign underscores the need for organizations to bolster their cybersecurity measures, particularly in sectors such as finance, healthcare, and technology, which often handle valuable data.

To mitigate the risks associated with such sophisticated threats, organizations should implement a multi-layered security strategy that includes employee training, email filtering, endpoint protection, and continuous monitoring and response protocols.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203