Particle.news

Download on the App Store

FortiGuard Warns of Global Phishing Surge Using UpCrypter to Take Over Windows Systems

Emails posing as voicemails or purchase orders push downloads to loaders built to evade inspection via anti-analysis, steganography, in‑memory execution.

Overview

  • FortiGuard Labs says detections doubled in two weeks, with activity hitting manufacturing, technology, healthcare, construction, and retail/hospitality across countries including Austria, Belarus, Canada, Egypt, India, and Pakistan.
  • Phishing emails use HTML attachments or links to convincing landing pages that display the victim’s domain string and logo before prompting a ZIP download containing an obfuscated JavaScript dropper.
  • The JavaScript dropper installs UpCrypter, which retrieves Remote Access Tools such as DCRat/DarkCrystal, PureHVNC, and Babylon to enable full remote control of infected hosts.
  • UpCrypter is also delivered as an MSIL loader that performs anti-VM and anti-analysis checks, can fetch payloads as plain text or hidden in images, executes largely in memory, and adds registry persistence to minimize traces.
  • Researchers recommend stronger email filtering, targeted user training, limiting unnecessary PowerShell access, and applying vendor mitigations as attackers expand “living off trusted sites” tactics, including Google Classroom abuse and Microsoft 365 Direct Send misuse.