vulnerability

Stories From An IT Security Professional

Observed Malware Campaigns – October 2020

An output of my most recent script (see my post “Malicious Attachment Analysis Script“), is the ability to create statistics and the data-set to understand what kind of malware campaigns are being delivered by email attachments.

In October 2020 I received a total of 76,888 emails (2,480 per day) to my spam traps. Obviously not all of the emails contained a malicious attachment, as the emails also fall into the categories phishing emails, general spam (e.g. drugs, prizes won), others.
From all emails received, a total of 221 unique malicious attachments have been identified. There have been far more malicious files, but they are either not identified or a duplicate by file hash and thus not reported here. Also, if a malware campaign consisted of links to downloads, they are also not included in this list.

The vast majority (over 50%) is being identified as malware family “AgentTesla” by MalwareBazaar signatures.

MalwareCount
AgentTesla120
Heodo23
Loki11
Dridex7
Formbook7
RemcosRAT7
MassLogger6
NanoCore6
NetWire6
AZORult5
Top 10 malware families observed in October 2020
Overview of all malware samples observed

The largest sector receiving those emails is legal services. That is something I have observed for a while and now I got the data set that clearly confirms my assumption.

The top 10 sectors in my spam trap targeted by malware this month are:

SectorCount
legal137
electronics / import21
non-profit13
free service12
banking7
electronics7
newspaper5
recruitment3
sport marketing3
advertising agencies2
Top 10 sectors receiving malicious email attachments

Also interesting observation, legal services are mostly targeted by “AgentTesla” malware, followed by “Loki” and “Formbook” and “NetWire“. All tools used to steal sensitive information and documents or remotely control an infected computer.

If you have any questions, please post a comment or send me a message on Twitter @cocaman.

One thought on “Observed Malware Campaigns – October 2020

  1. Have you tried to identify malware in docx/xlsx with VBA with analyzing malformed zip-file? (using Mr. Stevens “zipfile.py” extended to a scanner, checking the Date, “macro” in [content.xlm] etc)

Leave a Reply

Your email address will not be published. Required fields are marked *