Oasis Ticket Sales Scams: How to Stay Safe
During our weekly meetings with the banking industry and Police Scotland, we continue to see a significant increase in ticket scams over the last three…
The DarkGate malware family, a persistent threat since 2018, has recently resurfaced in a sophisticated global campaign. This Remote Access Trojan (RAT), built using the Borland Delphi programming language, is designed to steal sensitive information and provide attackers with remote control and access over infected systems.
The current DarkGate campaign employs a deceptive phishing tactic. Victims receive HTML files disguised as legitimate documents, often Microsoft Word files. Upon opening the HTML file, users are prompted to use a mode like ‘Cloud View’ to access the content. This interaction triggers a series of actions:
Once DarkGate has successfully infected a system, it has the potential to:
To reduce the risk of falling victim to a DarkGate attack, follow these essential cyber security practices:
The DarkGate malware family poses a substantial threat to individuals and businesses globally. By following these guidelines and staying up-to-date on emerging cyber threats, you can significantly reduce your risk of compromise.
A comprehensive breakdown of the attack can be found at: https://www.mcafee.com/blogs/other-blogs/mcafee-labs/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen/
Further information available at: