Military emails spread PHANTOM#SPIKE malware swiftly and efficiently

June 22, 2024
1 min read

TLDR:

  • A new phishing campaign dubbed PHANTOM#SPIKE is targeting people in Pakistan using military-themed email documents.
  • The campaign uses a ZIP file with a password-protected payload archive that contains a backdoor malware called RuntimeIndexer.exe.

Cybersecurity researchers have identified a new phishing campaign targeting people in Pakistan. The campaign, known as PHANTOM#SPIKE, involves using military-related phishing documents to infect users with malware. The threat actors behind the campaign have utilized ZIP files with a password-protected payload archive that contains a backdoor malware called RuntimeIndexer.exe. This malware is designed to establish connections with a remote server and execute commands on the compromised host. The backdoor allows the attacker to control the infected system, steal sensitive information, and execute additional malware payloads.

The email messages in this campaign come with a ZIP archive that pretends to contain meeting minutes related to the International Military-Technical Forum Army 2024. The ZIP file includes a Microsoft Compiled HTML Help file and the hidden executable RuntimeIndexer.exe. When the CHM file is opened, it displays meeting minutes and images but runs the bundled binary once the user clicks on the document. The malware runs commands remotely, relays results back to the server, gathers system information, and executes commands such as systeminfo, tasklist, curl, and schtasks.

This phishing campaign is notable for its lack of sophistication and use of simple payloads to achieve remote access to target machines. The researchers emphasize the importance of staying vigilant against such attacks and implementing strong email security measures to prevent malware infections.

Latest from Blog

Top 20 Linux Admin Tools for 2024

TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary

Bogus job tempts aerospace, energy workers

TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives