Description
Hackers are leveraging a trojanized Minesweeper clone to target finance organizations. The malicious game is used to deploy malware and steal sensitive data, posing a significant security threat.
Details
The attack commences with a phishing email from “support@patient-docs-mail.com,” masquerading as a medical center under the subject “Personal Web Archive of Medical Documents.” Recipients are lured into downloading a 33MB .SCR file via a Dropbox link. This file deceptively blends innocuous code from a Python-based Minesweeper clone with harmful Python scripts that fetch further malicious components from anotepad.com.
The Minesweeper code includes a function, “create_license_ver,” repurposed to decode and run the concealed malicious script. This script, a 28MB base64-encoded string, decodes to form a ZIP file containing an MSI installer for SuperOps RMM. This installer is then executed using a static password, granting attackers unauthorized remote access to the victim’s computer.
Indicators of Compromise (IoCs)
Organizations should be vigilant for the following indicators of compromise:
Remediation
Organizations can mitigate the risk by:
PDF Download: Hackers Phish Finance Orgs Using Trojanized Minesweeper Clone
References: