New Spear Phishing Attack Delivers VIP Keylogger via EMAIL Attachment

The decrypted payload is then injected into RegSvcs.exe using process hollowing techniques, allowing the VIP keylogger to execute within a legitimate Windows process and evade behavioral detection systems. These files serve distinct purposes in the infection chain, with leucoryx containing decryption keys while aveness houses the encrypted payload data. The malware employs a custom XOR decryption function identified as “KHIXTKVLO” to decrypt the payload directly in memory, avoiding disk-based detection mechanisms. Seqrite researchers identified this campaign through monitoring suspicious email traffic patterns and analyzing malicious attachments that appeared to be innocuous document files. This malware strain specifically targets web browsers including Chrome, Microsoft Edge, and Mozilla Firefox, systematically harvesting user credentials, monitoring clipboard activity, and logging keystrokes to capture sensitive information. This technique involves reading the encrypted content from leucoryx, applying the XOR decryption algorithm, and storing the resulting data in allocated memory structures. This latest iteration represents a significant evolution in the malware’s delivery mechanism, showcasing the threat actors’ adaptability and technical sophistication in bypassing modern security measures. The threat actors have refined their social engineering approach, using convincing financial document themes to lure victims into executing the malicious payload. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. The AutoIt script embedded within the initial executable immediately drops two encrypted files named “leucoryx” and “aveness” into the system’s temporary directory. A sophisticated new spear-phishing campaign has emerged, deploying the notorious VIP keylogger through carefully crafted email attachments that masquerade as legitimate payment receipts. The VIP keylogger, previously documented for its advanced data theft capabilities, has resurfaced with enhanced steganographic techniques and improved evasion tactics. The current campaign demonstrates a marked departure from earlier versions by incorporating an AutoIt-based injector system that significantly complicates detection and analysis efforts. This latest variant shows increased sophistication in its multi-stage deployment process and memory-resident execution techniques. Upon execution, the malware demonstrates remarkable technical complexity through its multi-layered infection process. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis.

This Cyber News was published on cybersecuritynews.com. Publication date: Thu, 31 Jul 2025 13:45:17 +0000


Cyber News related to New Spear Phishing Attack Delivers VIP Keylogger via EMAIL Attachment

10 Best Anti-Phishing Tools in 2025 - What is Good?What Could Be Better?Real-time email threat detection and response using AI and machine learning.Limited customer support optionsAutomates incident response to stop phishing attacks quickly.The training module is not entirely ...
2 months ago Cybersecuritynews.com
Spear Phishing vs Phishing: What Are The Main Differences? - Almost half of them used phishing to obtain the passwords of users. Highly targeted phishing campaigns against specific individuals or types of individuals are known as spear phishing. It's important to be able to spot phishing in general. For ...
1 year ago Techrepublic.com
New Spear Phishing Attack Delivers VIP Keylogger via EMAIL Attachment - The decrypted payload is then injected into RegSvcs.exe using process hollowing techniques, allowing the VIP keylogger to execute within a legitimate Windows process and evade behavioral detection systems. These files serve distinct purposes in the ...
2 months ago Cybersecuritynews.com
10 Best Email Security Gateways in 2025 - Barracuda Email Security Gateway is a solution that helps protect organizations from email-borne threats such as spam, viruses, phishing, and other malicious content. It uses various methods, including filtering, encryption, and sandboxing, to ...
7 months ago Cybersecuritynews.com
The 6 Best Email Security Software & Tools of 2024 - To guarantee full protection against email threats, important features to consider when picking an email security solution include email filtering and spam detection, sandboxing, mobile support, advanced machine learning, and data loss prevention. ...
1 year ago Esecurityplanet.com
What SOCs Need to Know About Water Dybbuk - According to the Federal Bureau of Investigation, BEC costs victims more money than ransomware, with an estimated US$2.4 billion being lost to BEC in the US in 2021. Recently, BEC scammers have been using stolen accounts from legitimate Simple Mail ...
2 years ago Trendmicro.com
Flipping the BEC funnel: Phishing in the age of GenAI - For years, phishing was just a numbers game: A malicious actor would slap together an extremely generic email and fire it out to thousands of recipients in the hope that a few might take the bait. Common among these new techniques was a shift towards ...
1 year ago Helpnetsecurity.com
Phishing kits now vet victims in real-time before stealing credentials - Even if they were allowed to use the real target's address, the analysts comment that some campaigns go a step further, sending a validation code or link to the victim's inbox after they enter a valid email on the phishing page. However, with this ...
5 months ago Bleepingcomputer.com
Combat Phishing Attacks With AI-Powered Threat Protection - According to statistics, 81% of organizations have seen an increase in phishing emails since 2020, with an estimated 3.4 billion emails sent every day. AI-generated phishing emails are a sophisticated and evolving cybersecurity threat. ...
1 year ago Gbhackers.com
One Phish, Two Phish, Red Phish, Blue Phish - I sat down for a chat with George Skouroupathis, our phishing expert at Resonance Security. Phishing is often the first step taken by hackers in a larger scam. There are lots of different kinds of phishing attacks, but one of the most prevalent is ...
1 year ago Hackread.com
Email Security Trends And Predictions in 2024 - One of the most critical aspects of this broad topic is email security. Email security refers to the collective measures used to secure the access and content of an email account or service. An email service provider implements email security to ...
1 year ago Cybersecuritynews.com
Star Blizzard increases sophistication and evasion in ongoing attacks - Microsoft Threat Intelligence continues to track and disrupt malicious activity attributed to a Russian state-sponsored actor we track as Star Blizzard. Star Blizzard has improved their detection evasion capabilities since 2022 while remaining ...
1 year ago Microsoft.com
The Future of Phishing Email Training for Employees in Cybersecurity - One common method they use is through phishing emails. To counter this changing threat, companies must give importance to providing phishing email training for employees on identifying and responding properly to phishing attempts. Standard training ...
1 year ago Hackread.com
Business Email Compromise Scams: Prevention and Response - We will also highlight red flags to watch out for in suspicious emails, emphasizing the importance of implementing robust email authentication methods and comprehensive employee training programs to enhance awareness and response capabilities. BEC ...
1 year ago Securityzap.com
AI Outperformed Elite Red Teams in Creating an Effective Spear Phishing Attack - By March 2025, their AI spear phishing agent (codenamed JKR) achieved a 23.8% higher success rate than human red teams across all user skill levels. Prompt Engineering for Task Execution: For novel attacks, JKR uses instructions like:- ...
6 months ago Cybersecuritynews.com
New Snake Keylogger Attacking Chrome, Edge, and Firefox Users - Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Security researchers at Proofpoint have uncovered a sophisticated web inject campaign targeting MacOS users with a new ...
7 months ago Cybersecuritynews.com
AI-Powered Phishing Detection - Does It Actually Work? - Unlike traditional methods that rely on identifying known threats, AI-powered systems analyze patterns and behaviors to detect anomalies indicative of phishing attempts. The rise of artificial intelligence (AI) has brought new hope to combating these ...
5 months ago Cybersecuritynews.com
Coinbase phishing email tricks users with fake wallet migration - A large-scale Coinbase phishing attack poses as a mandatory wallet migration, tricking recipients into setting up a new wallet with a pre-generated recovery phrase controlled by attackers. Instead, the phishing email includes a recovery phrase, which ...
6 months ago Bleepingcomputer.com
Beware: PayPal "New Address" feature abused to send phishing emails - The email includes the new address that was allegedly added to your PayPal account, including a message claiming to be a purchase confirmation for a MacBook M4, and to call the enclosed PayPal number if you did not authorize the purchase. The goal of ...
7 months ago Bleepingcomputer.com
Security Boulevard - With the rising volume of fraudulent emails and AI-enhanced phishing scams, industry giants such as Google, Yahoo, and Microsoft have doubled their email security efforts. DMARC builds on two existing email authentication technologies: Sender Policy ...
1 year ago Securityboulevard.com
Splunk: AI isn't making spear phishing more effective - Despite increased concerns, AI tools won't give adversaries an advantage when it comes to sending effective phishing emails, according to new research by Splunk's Surge security research team. In a blog post Thursday, Tamara Chacon, security ...
1 year ago Techtarget.com
Russian Cyberattackers Launch Multiphase PsyOps Campaign - Russia-linked threat actors employed both PysOps and spear-phishing to target users over several months at the end of 2023 in a multiwave campaign aimed at spreading misinformation in Ukraine and stealing Microsoft 365 credentials across Europe. The ...
1 year ago Darkreading.com
Honoring Cisco Designated VIPs at Cisco Live Amsterdam 2024 - Every Cisco Live, we have the opportunity to meet our esteemed Cisco Designated VIPs in person. It is one of the most significant highlights for the Cisco Learning Network's community managers and the Cisco Learning & Certifications organization's ...
1 year ago Feedpress.me
ACDS Unveils Tailored Email Security Essentials Package for SMBs to Protect from Malicious Communications - Email is the most common attack vector for cybercriminals, in fact the overwhelming majority of malware-related security incidents are delivered via email. It's no surprise that email security is at the forefront of many business leader's minds. In ...
1 year ago Itsecurityguru.org
ACDS Unveils Tailored Email Security Essentials Package for SMBs to Protect from Malicious Communications - Email is the most common attack vector for cybercriminals, in fact the overwhelming majority of malware-related security incidents are delivered via email. It's no surprise that email security is at the forefront of many business leader's minds. In ...
1 year ago Itsecurityguru.org

Cyber Trends (last 7 days)