top of page
Foto del escritorJavier Conejo del Cerro

Voldemort Malware: he who must not be named has access to your data tamed



Hogwarts tax authority


A new malware campaign known as “Voldemort” has recently been unshrouded, posing a significant threat to global cybersecurity. This advanced malware, named after the infamous villain from the “Harry Potter” series, uses state-of-the-art processes to conduct cyberespionage while laying low. Its red flags include its ability to impersonate tax authorities—such as Spain’s “Hacienda”—and its use of “Google Sheets” to secretly transfer stolen data. These features give it and edge for data theft and surveillance, targeting both individuals and businesses in over 70 firms worldwide spanning aerospace, education, insurance and transportation in a multisector Avada Kedavra.


The tip of the magic wand


Voldemort’s onslaught begins by sending emails that appear to be from tax agencies. Putting one over its victims, believing these emails to be official and opening the malicious attachments, allowing the malware to infiltrate their systems. Once inside, the malware starts to monitor the victim’s activity, stealing data such as login credentials, financial details, and private communications.


A particularly novel aspect of Voldemort’s operation is its use of “Google Sheets” to exfiltrate the stolen information. Instead of relying on traditional command-and-control (C2) servers, which are often monitored and blocked by cybersecurity defenses, the malware leverages a widely trusted cloud service like Google Sheets to transfer data. This allows it to bypass detection, as traffic to Google services is legitimately greenlit and goes unnoticed by security filters.


Magic spell, thousands fell. The campaign has issued the likes of 20.000 phishing emails.

Voldemort targets businesses and organizations alike. The malware’s ability to spread within corporate networks and steal vast amounts of information makes it a potent tool for cyberespionage. Whether it’s used by cybercriminals or nation-state actors, Voldemort's techniques make it a significant threat to corporate security, intellectual property, and personal data.


Expecto Patronum


To defend against sophisticated malware like Voldemort, a fully-fledged security approach is paramount:


1. Beware of phishing emails as these remain the primary way the malware compromises systems. Users should be cautious when receiving unsolicited emails, especially those claiming to be from government agencies. Verifying the sender’s authenticity before interacting with attachments or links is critical.


2. Implementation of comprehensive threat detection systems capable of identifying suspicious behaviors is essential as the malware uses legitimate services like Google Sheets to mask its activity.


3. Updating all systems and applications up to date with the latest security patches helps protect against known vulnerabilities leveraged by Voldemort.


4. Training employees to recognize phishing attempts and suspicious attachments is crucial for preventing compromises. Cybersecurity awareness at all levels reduces the risk of falling victim to such attacks.


5. It is important to keep an eye on cloud services and their usage within networks. Suspicious or unusual activity could be a sign of a cyberattack in progress.


6. Utilizing a Secure DNS: A critical yet often overlooked measure is to use a secure DNS (Domain Name System). By employing a secure DNS, organizations can prevent malware from connecting to its command-and-control (C2) servers. A secure DNS can block communication attempts to malicious domains and prevent the malware from retrieving commands or transmitting stolen data, significantly disrupting the attack.



18 visualizaciones0 comentarios

Entradas recientes

Ver todo

Comments


bottom of page