Cybersecurity experts uncovered an active phishing campaign. It targets users in India with fake tax notices. Attackers aim to install a powerful backdoor for spying and data theft.
Fake Tax Emails Start the Attack
Attackers send emails pretending to come from India’s tax department. They claim victims owe penalties. For example, the subject lines look official and urgent. Therefore, many people open the attached ZIP file.
The archive hides most files. However, one executable stands out with a convincing name. Victims run “Inspection Document Review.exe” thinking it is safe. This action kicks off the multi-stage infection.
Loading the First Malicious Layer
The executable sideloads a hidden DLL from the archive. This DLL checks for debuggers to avoid analysis. Next, it contacts a remote server for more instructions. It downloads shellcode quietly.
The shellcode uses a smart trick to bypass UAC prompts. It gains admin rights without asking the user. Additionally, it hides itself by mimicking a normal Windows process. Therefore, it stays under the radar.
Adapting to Antivirus Detection
Attackers prepare for common security software. If Avast antivirus runs, the malware acts cleverly. It simulates mouse clicks to open Avast’s settings. Then, it adds malicious files to the exclusion list.
This step avoids disabling the antivirus entirely. For instance, it keeps the engine active but ignores specific threats. Consequently, the attack proceeds without alerts. Experts link this DLL to a known banking trojan family.
Deploying the Main Espionage Tool
The excluded file launches a legitimate enterprise utility. Attackers repurpose this tool for harmful purposes. It installs a full remote monitoring system on the victim machine. This gives attackers strong control.
The tool allows screen recording and remote commands. Moreover, it helps steal sensitive data over time. Batch scripts create hidden folders and change permissions. They make cleanup easier for the attackers.
Advanced Features for Long-Term Access
Additional files support the operation. One executable manages services and logs activity. Others adjust desktop folder access for all users. A cleanup script removes traces after setup.
Attackers gain real-time monitoring capabilities. They control infected systems remotely. Therefore, they collect information persistently. This setup blends many evasion techniques together.
Signs of Sophisticated Intent
The campaign shows clear skill and planning. It uses anti-analysis checks and privilege tricks. Additionally, it abuses trusted tools for persistence. DLL sideloading hides the real payload.
Experts note the mix of methods. For example, commercial software becomes an espionage framework. This approach makes detection harder. Victims face ongoing risks to privacy and data.
Prevention Strategies
Users and organizations can block these threats effectively. First, avoid opening attachments from unexpected tax-related emails. Always verify sender details through official channels. Second, install and update strong endpoint protection that detects unusual process behaviors.
Moreover, enable strict application controls to limit unknown executables. Use continuous monitoring to spot remote access tools early. Regular scans and user awareness training reduce the chance of successful espionage infections significantly.
Sleep well, we got you covered.

