{"id":28030,"date":"2024-11-04T09:40:57","date_gmt":"2024-11-04T09:40:57","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=28030"},"modified":"2024-11-04T09:40:57","modified_gmt":"2024-11-04T09:40:57","slug":"fake-copyright-emails-lumma-rhadamanthys","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/fake-copyright-emails-lumma-rhadamanthys\/","title":{"rendered":"Fake Copyright Emails Spread Lumma, Rhadamantys Stealers"},"content":{"rendered":"<p>Cyber attackers leverage copyright infringement claims to lure victims into <strong>downloading Lumma Stealer and Rhadamanthys malware<\/strong>, specifically targeting Taiwanese Facebook business and advertising accounts. Let&#8217;s break down how this works and what makes this attack so strategic.<\/p>\n<h2>Attack Overview<\/h2>\n<p>Since at least July 2024, <a href=\"https:\/\/blog.talosintelligence.com\/threat-actors-use-copyright-infringement-phishing-lure-to-deploy-infostealers\/\" rel=\"noopener noreferrer nofollow\" target=\"_blank\">this phishing attack<\/a> targets Taiwanese Facebook business users by sending emails impersonating companies&#8217; legal departments. <a href=\"https:\/\/gridinsoft.com\/blogs\/spear-phishing\/\">These emails<\/a> claim copyright infringement, pressuring users to download a fake PDF file allegedly containing infringement information.<\/p>\n<p>This fake file, disguised as a PDF but actually an executable (.exe), bears file names in traditional Chinese like \u201cCopyright Infringement Information\u201d and \u201cdeclare infringement,\u201d directly aimed at traditional Chinese speakers. By impersonating known Taiwanese and Hong Kong companies, the attackers build credibility and exploit trust.<\/p>\n<p>By trying to open the file, targeted users launched <strong>a loader module of Lumma Stealer<\/strong>, a rather new infostealer strain that emerged in early 2024. In some attack cases, it was coupled with <strong>Rhadamantys<\/strong>, another infostealer with similar functionality.<\/p>\n<h2>Phishing Mechanics<\/h2>\n<p>The emails warn that if users don\u2019t remove \u201cinfringing content\u201d within 24 hours, they could face legal actions. This urgency tactic, coupled with mentions of real company names, makes recipients feel compelled to click the links. Attackers swap out details like the company name and address to keep the email templates adaptable across different targets. Notably, this campaign even uses templates mimicking industrial and e-commerce companies, tailoring each for its target audience.<\/p>\n<figure id=\"attachment_28037\" aria-describedby=\"caption-attachment-28037\" style=\"width: 1218px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/11\/phishing-email.webp\" alt=\"Phishing email screenshot Lumma\" width=\"1218\" height=\"937\" class=\"size-full wp-image-28037\" title=\"\" srcset=\"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/11\/phishing-email.webp 1218w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/11\/phishing-email-300x231.webp 300w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/11\/phishing-email-1024x788.webp 1024w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/11\/phishing-email-768x591.webp 768w, https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/11\/phishing-email-860x662.webp 860w\" sizes=\"auto, (max-width: 1218px) 100vw, 1218px\" \/><figcaption id=\"caption-attachment-28037\" class=\"wp-caption-text\">Phishing email impersonating a well-known industrial motor manufacturer. (source: Talos)<\/figcaption><\/figure>\n<p>When a victim clicks the download link, it leads through a series of redirects\u2014from Google\u2019s Appspot.com (a hosting platform for web apps) to a short URL service and then to Dropbox, where the malware is hosted. This multi-step redirection, common in advanced phishing attacks, complicates detection by security systems, masking the final malicious download location. The malware file is password-protected, with a hidden EPS (Encapsulated PostScript) file inside, which loads once decrypted. This EPS file connects to <a href=\"https:\/\/gridinsoft.com\/command-and-control\">Command-and-Control (C2) domains<\/a>, signaling an ongoing campaign based on DNS records observed during analysis.<\/p>\n<h2>Types of Malware Used<\/h2>\n<p>Payloads delivered by the malicious pdf.exe files include two infostealers, LummaC2 and Rhadamanthys, known for their sophistication in stealing data. They are widely distributed on underground forums and target sensitive information like credentials, system data, cryptocurrency wallets, and browser-stored data. Let\u2019s have a closer look at each one<\/p>\n<h3>LummaC2 Infostealer<\/h3>\n<p>This malware, written in C, steals information through obfuscation techniques to evade detection. When activated, it uses API functions like CreateFileMappingA and VirtualAllocate to inject its code directly into memory, bypassing standard file-based detection. We have <a href=\"https:\/\/gridinsoft.com\/spyware\/lumma-stealer\">an advanced post<\/a> dedicated to this threat \u2013 go check it out.<\/p>\n<p>But overall, this threat is currently a pinnacle of infostealer viruses, as it includes all the latest trends in malware development. Aside from this, malware masters also appear quite inventive in terms of spreading campaigns. They initially used YouTube promotions and Google Search ads as spreading channels, and did not stop seeking more and more unpredictable angles on unsuspecting users.<\/p>\n<h3>Rhadamanthys Infostealer<\/h3>\n<p>Emerging in 2022, this stealer targets extensive system data while utilizing <strong>the .rsrc section<\/strong> in its binary (typically reserved for icons and menus) to conceal malicious code. The loader modifies the registry to ensure that it executes every time the system starts, adding a layer of persistence. It even increases the file size to evade detection based on file signatures, a common antivirus defense technique.<\/p>\n<p>The Rhadamanthys loader further complicates detection by injecting code into legitimate processes, such as &#8220;%Systemroot%\\system32\\dialer.exe&#8221;, making it appear as if a harmless system process is running. Mutex objects are employed to ensure only one instance of the malware is active, another common evasion method.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber attackers leverage copyright infringement claims to lure victims into downloading Lumma Stealer and Rhadamanthys malware, specifically targeting Taiwanese Facebook business and advertising accounts. Let&#8217;s break down how this works and what makes this attack so strategic. Attack Overview Since at least July 2024, this phishing attack targets Taiwanese Facebook business users by sending emails [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":28040,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[619,48,1360],"class_list":{"0":"post-28030","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-cybersecurity","9":"tag-spyware","10":"tag-stealer"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2024\/11\/Threat-actors-use-copyright-infringement-phishing-lure-to-deploy-infostealers.webp","author_info":{"display_name":"Stephanie Adlam","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/adlam\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/28030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=28030"}],"version-history":[{"count":13,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/28030\/revisions"}],"predecessor-version":[{"id":28072,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/28030\/revisions\/28072"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/28040"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=28030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=28030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=28030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}