Trustwave SpiderLabs researchers have cited an increased prevalence of HTML smuggling activity whereby cybercriminal groups abuse the versatility of HTML in combination with social engineering to distribute malware. The firm has detailed four recent HTML smuggling campaigns attempting to lure users into saving and opening malicious payloads, impersonating well-known brands such as Adobe Acrobat, Google Drive, and the US Postal Service to increase the chances of users falling victim.
HTML smuggling uses HTML5 attributes that can work offline by storing a binary in an immutable blob of data (or embedded payload) within JavaScript code, which is decoded into a file object when opened via a web browser. It is not a new attack method, but it has grown in popularity since Microsoft started blocking macros in documents from the internet by default, Trustwave SpiderLabs wrote. The four malware strains that have recently been detected using HTML smuggling in their infection chain are Cobalt Strike, Qakbot, IcedID, and Xworm RAT, the firm added.
More Stories
Remediation Times Drop Sharply as Cyber Hygiene Take Up Surges
CISA claims US critical infrastructure providers are improving cyber hygiene and remediation activities Read More
UK Registry Nominet Breached Via Ivanti Zero-Day
The .uk registry Nominet has been breached by a recently disclosed zero-day vulnerability in Ivanti products Read More
Critical Infrastructure Urged to Scrutinize Product Security During Procurement
A joint government advisory has set out steps critical infrastructure firms should take to ensure any OT products they purchase...
Pastor’s “dream” crypto scheme alleged to be a multi-million dollar scam
Imagine trusting your pastor with your savings, only to find out he's running a crypto scam. Read more in my...
Russian Malware Campaign Hits Central Asian Diplomatic Files
Diplomatic entities in Kazakhstan and Central Asia have been targeted by UAC-0063 using weaponized Word docs deploying HATVIBE malware Read...
How Hackers Steal Your Password
Password Crackers – How Hackers Get Passwords In today’s digital business environment, passwords are often the keys to your organization’s...