Keep your eyes on these

VERY IMPORTANT

Security Articles

RSS

Unmasking Cronus: How Fake PayPal Documents Execute Fileless Ransomware via PowerShell

released on 2024-08-07 @ 08:32:30 AM
The analysis reveals a sophisticated campaign employing fake PayPal receipts as lures to distribute a new variant of the Cronus ransomware. The infection chain begins with a malicious Word document containing an obfuscated VBA macro that downloads a PowerShell loader from a remote server. This loader employs reflective DLL loading to execute the fileless ransomware payload directly in memory, evading disk-based detection. The ransomware exhibits various malicious behaviors, such as enumerating and encrypting specific file types, terminating processes, establishing persistence, and manipulating clipboard data.