The number of
The researchers have analyzed an attachment, named “CORONAVIRUS_COVID-19.vbs,” used in a new Coronavirus phishing campaign that was designed to deliver the Netwalker Ransomware.
“The new Netwalker phishing campaign is using an attachment named “CORONAVIRUS_COVID-19
Netwalker was recently employed is several attacks against businesses and government agencies, including Toll Group and the Champaign Urbana Public Health District (CHUPD) (Illinois) attacks.
Upon the execution of the script, the executable is saved to %Temp%\qeSw.exe and launched to start the encryption of the files.
The popular malware researcher Vitali Kremez who analyzed the ransomware revealed that this version of the ransomware was designed to avoid terminating the Fortinet endpoint protection client, likely to avoid detection.
The Netwalker ransom
Additional details are reported in the post published by BleepingComputer.
If you are interested in the recently discovered attacks, give a look at the timeline I have prepared:
[adrotate banner=”9″] | [adrotate banner=”12″] |
(
[adrotate banner=”5″]
[adrotate banner=”13″]