Category | Details |
---|---|
Threat Actors | Unknown, likely using the Prince ransomware builder from GitHub. |
Campaign Overview | Ransomware campaign impersonating Royal Mail, distributing Prince ransomware via email and contact forms. |
Target Regions (Or Victims) | UK and U.S., targeting organizations through email and contact form submissions. |
Methodology | Use of social engineering via email lures, multiple stages of malware delivery (ZIP files, PowerShell, JavaScript). |
Product Targeted | Ransomware targeting files on infected systems, encrypting them and displaying ransom note. |
Malware Reference | Prince ransomware, utilizing a freely available builder from GitHub. |
Tools Used | Proton Mail, Dropbox (for file hosting), PowerShell, obfuscated JavaScript, AMSI Bypass, ConfuserEx obfuscator. |
Vulnerabilities Exploited | Use of social engineering to bypass security, exploitation of public contact forms. |
TTPs | Email lures, use of multi-stage ZIP and password-protected files, PowerShell scripting, scheduled task creation. |
Attribution | No specific attribution, malware builder (Prince) openly available on GitHub. |
Recommendations | Train users to recognize suspicious emails, enforce strong email security practices, report suspicious activity. |
Source | Proofpoint |
Read full article: https://www.proofpoint.com/us/blog/threat-insight/security-brief-royal-mail-lures-deliver-open-source-prince-ransomware
The above summary has been generated by an AI language model
Leave a Reply