
Mobile Malware Alert: Anatsa Targets Travel Firms for Financial Fraud
Overview A sophisticated strain of mobile banking malware known as Anatsa has resurfaced, now targeting travel firms and their customers for financial fraud. Anatsa differs…
The DarkGate malware family, a persistent threat since 2018, has recently resurfaced in a sophisticated global campaign. This Remote Access Trojan (RAT), built using the Borland Delphi programming language, is designed to steal sensitive information and provide attackers with remote control and access over infected systems.
The current DarkGate campaign employs a deceptive phishing tactic. Victims receive HTML files disguised as legitimate documents, often Microsoft Word files. Upon opening the HTML file, users are prompted to use a mode like ‘Cloud View’ to access the content. This interaction triggers a series of actions:
Once DarkGate has successfully infected a system, it has the potential to:
To reduce the risk of falling victim to a DarkGate attack, follow these essential cyber security practices:
The DarkGate malware family poses a substantial threat to individuals and businesses globally. By following these guidelines and staying up-to-date on emerging cyber threats, you can significantly reduce your risk of compromise.
A comprehensive breakdown of the attack can be found at: https://www.mcafee.com/blogs/other-blogs/mcafee-labs/the-darkgate-menace-leveraging-autohotkey-attempt-to-evade-smartscreen/
Further information available at: