Cyber attackers by no means cease inventing new methods to compromise their targets. That is why organizations should keep up to date on the most recent threats.
This is a fast rundown of the present malware and phishing assaults you’ll want to find out about to safeguard your infrastructure earlier than they attain you.
Zero-day Assault: Corrupted Malicious Recordsdata Evade Detection by Most Safety Techniques
The analyst staff at ANY.RUN lately shared their evaluation of an ongoing zero-day assault. It has been lively since no less than August and nonetheless stays unaddressed by most detection software program to at the present time.
The assault entails the usage of deliberately corrupted Phrase paperwork and ZIP archives with malicious recordsdata inside.
![]() |
VirusTotal reveals 0 detections for one of many corrupted recordsdata |
On account of corruption, safety techniques can not correctly establish the kind of these recordsdata and run evaluation on them, which leads to zero risk detections.

As soon as these recordsdata are delivered to a system and opened with their native purposes (Phrase for docx and WinRAR for zip) they get restored, presenting the sufferer with malicious contents.
The ANY.RUN sandbox is likely one of the few instruments that detect this risk. It permits customers to manually open corrupted malicious recordsdata inside a totally interactive cloud VM with their corresponding apps and restore them. This lets you see what sort of payload the file comprises.

Take a look at this sandbox session that includes a corrupted Phrase doc. After restoration, we will see that there’s a QR code with an embedded phishing hyperlink.

The sandbox routinely identifies malicious exercise and notifies you about this.
Strive ANY.RUN’s Interactive Sandbox to see the way it can velocity up and enhance your malware evaluation.
Get a 14-day trial to check all of its superior options without spending a dime →
Fileless Malware Assault by way of PowerShell Script Distributes Quasar RAT
One other notable current assault entails the usage of a fileless loader referred to as Psloramyra, which drops Quasar RAT onto contaminated units.

This sandbox session reveals how, after taking preliminary foothold on the system, Psloramyra loader employs a LoLBaS (Residing off the Land Binaries and Scripts) approach to launch a PowerShell script.

The script masses a malicious payload dynamically into reminiscence, identifies and makes use of the Execute methodology from the loaded .NET meeting, and at last injects Quasar right into a professional course of like RegSvcs.exe.

The malware capabilities totally throughout the system’s reminiscence, making certain it leaves no traces on the bodily disk. To take care of its presence, it creates a scheduled process that runs each two minutes.
Abuse of Azure Blob Storage in Phishing Assaults
Cybercriminals are actually internet hosting phishing pages on Azure’s cloud storage resolution, leveraging the *.blob[.]core[.]home windows[.]web subdomain.
Attackers use a script to fetch details about the sufferer’s software program, such because the OS and browser, which is on the web page to make it seem extra reliable. See instance.

The target of the assault is to trick the sufferer into coming into their login credentials right into a pretend kind, that are then collected and exfiltrated.
Emmenhtal Loader Makes use of Scripts to Ship Lumma, Amadey, and Different Malware
Emmenhtal is an rising risk that has been concerned in a number of campaigns over the previous yr. In one of many newest assaults, criminals make the most of scripts to facilitate the execution chain that entails the next steps:
- LNK file initiates Forfiles
- Forfiles locates HelpPane
- PowerShell launches Mshta with the AES-encrypted first-stage payload
- Mshta decrypts and executes the downloaded payload
- PowerShell runs an AES-encrypted command to decrypt Emmenhtal

The Emmenhtal loader, which is the ultimate PowerShell script, executes a payload — usually Updater.exe — through the use of a binary file with a generated identify as an argument.
This results in an infection by malware households like Lumma, Amadey, Hijackloader, or Arechclient2.
Analyze Newest Cyber Assaults with ANY.RUN
Equip your self with ANY.RUN’s Interactive Sandbox for superior malware and phishing evaluation. The cloud-based service supplies you with a protected and fully-functional VM atmosphere, letting you freely have interaction with malicious recordsdata and URLs you submit.
It additionally routinely detects malicious conduct in actual time throughout community and system actions.
- Establish threats in < 40 seconds
- Save assets on setup and upkeep
- Log and study all malicious actions
- Work in non-public mode along with your staff
Get a 14-day free trial of ANY.RUN to check all of the options it gives →