Particle.news

Download on the App Store

FortiGuard Flags Fast-Growing Global Phishing Campaign Using UpCrypter to Seize Windows Systems

Personalized HTML lures on spoofed pages drop RATs for persistent control.

Overview

  • FortiGuard Labs says detections have doubled in roughly two weeks since early August as the operation spreads worldwide with notable activity in Austria, Belarus, Canada, Egypt, India and Pakistan.
  • Voicemail and purchase‑order emails carry HTML attachments (e.g., “VN0001210000200.html,” “採購訂單.html”) that redirect to fake landing pages tailored with the recipient’s domain and logo.
  • Victims are prompted to download a ZIP containing an obfuscated JavaScript dropper that invokes PowerShell, performs anti‑analysis and VM checks, and retrieves next‑stage payloads including via steganography.
  • UpCrypter acts as a loader for multiple remote access tools such as PureHVNC, DCRat (DarkCrystal RAT) and Babylon RAT, enabling attackers to gain full remote control and maintain persistence in memory and the registry.
  • Security teams are urged to tighten email filtering, train users, restrict unnecessary PowerShell access, apply controls like Microsoft’s Reject Direct Send or custom header stamping, and watch for in‑memory execution and registry-persistence indicators.