Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


Winter Olympic of 2018 is being Targeted by Fileless Malware, Utilizing Advanced Branded Tools


The Forthcoming Winter Olympic is on target by hackers with a malware campaign coordinated at the organization that gives infrastructure and other help to the Games.


The campaign victimized various organizations associated with Olympic as well as Paralympic Winter Games, going to happen in South Korea's Pyeongchangin February. It utilizes a new and unique type of malware intended to hand control of the system of the victim, which they can manipulate.


McAfee stated, the known victims and the organizations who are giving infrastructure and support to the Olympic are all from South Korea. This attack is depending on PowerShell as other fileless malware attack to execute an in-memory attack that makes an indirect access. It's likewise arriving, in the same way as other attack, by means of email in noxious Word document as per the post on techrepublic.com on 08/01/2018.


Ryan Sherstobitoff, McAfee's analyst explained our sister website ZDNet, though the method is old, but a specific malware has been used which is the latest version of malware and is custom made by the attackers.


The attacks initiate with emails intend to look like originate from the South Korean National Counterterrorism Center and the email address look genuine. The hacker spoofed the emails in such a way so that the messages appear to be like an official, coming from NCTC. Emails are coming from the IP address of Singapore, as believed by analysts.


In the phishing message that is sent in Korea is discussing about the document from a South Korean government organization and also about Pyeongchang Olympics. The email points out the victim to an attached Word file, with a file name which interpret as 'Sorted out by the Ministry of Agriculture and Forestry and also the Pyeongchang Winter Olympics'.


After opening the file ask the users to click to open the content. If it's done, it permits the macros for introducing the malware to run through a concealed PowerShell content.


The best way to avoid attack by fileless malware, as they do not include any privately introduced documents or projects, is to take out attack vectors, most of which are virus containing emails and attachment.

» SPAMfighter News - 1/12/2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page