In the magical world of Harry Potter, Voldemort stands as the primary antagonist and one of the most powerful dark wizards in history. But what if he transcended the pages of fantasy and leaped into reality, adopting a name of his own? As the embodiment of fear and ambition, this malevolent force now threatens our world, reminding us that some legends never truly die :)
Research from Proofpoint has revealed the emergence of a new malware campaign dubbed "Voldemort." Launched on August 5, 2024, this campaign has already affected over 70 organizations globally, inundating them with more than 20,000 malicious emails. The malware employs sophisticated tactics, including phishing schemes and social engineering, to infiltrate networks and compromise sensitive data. Experts warn that the rapid spread of Voldemort underscores a growing trend in cyber threats, as attackers become increasingly adept at exploiting vulnerabilities.
Starting on August 5, 2024, a wave of malicious activity linked to the “Voldemort” campaign unleashed over 20,000 messages targeting more than 70 organizations worldwide. Initially, the campaign sent out a few hundred messages daily, but a dramatic spike occurred on August 17, with nearly 6,000 messages sent in one day.
The emails were crafted to resemble communications from various tax authorities, misleading recipients into believing they were receiving notifications about changes to their tax filings. Throughout the campaign, the attackers impersonated tax agencies from multiple countries, including the U.S. (Internal Revenue Service), the UK (HM Revenue & Customs), France (Direction Générale des Finances Publiques), Germany (Bundeszentralamt für Steuern), and Italy (Agenzia delle Entrate). Starting August 19, the campaign expanded its reach to include agencies from India (Income Tax Department) and Japan (National Tax Agency). Each phishing attempt was meticulously tailored, featuring language and details specific to the respective authority, thereby enhancing its credibility and increasing the likelihood of victim engagement.
The malware operates as a custom backdoor, developed in C, specifically designed for data exfiltration and the deployment of additional malicious payloads. One notable aspect of this attack is its use of Google Sheets for command and control (C2) communications, enabling the attackers to issue commands while remaining under the radar. Additionally, the malware exploits files containing malicious Windows search protocol, further facilitating its malicious activities.
Upon downloading the malware, the victim unwittingly activates a legitimate version of WebEx software, which is manipulated to load a dynamic link library (DLL) that establishes communication with the C2 server. This clever disguise not only helps the malware evade detection but also allows it to maintain a persistent connection to the attackers.
Experts are concerned about this approach, as it highlights the evolving sophistication of cyber threats. The use of commonly trusted applications as vectors for malware underscores the need for organizations to enhance their cybersecurity measures, including implementing advanced threat detection systems and educating employees about the risks associated with seemingly innocuous downloads.