Newly Uncovered Phishing Attack Uses Weaponized Excel File

October 19, 2021

A new phishing campaign is targeting financial services workers by using links to download a ‘weaponized’ Excel document.

The campaign, called MirrorBlast, was discovered in early September by security firm ET Labs. Another security firm, Morphisec, analyzed the malware and says the malicious Excel files are able to bypass malware detection systems because they contain “extremely lightweight” embedded macros, making them “particularly dangerous” for organizations that rely on detection-based security and sandboxing.

Macros have been used by government-sponsored hackers because they often work. Microsoft recently expanded its Antimalware Scan Interface (AMSI) for antivirus to counter the rise of macro malware, and a new trend by attackers to use legacy Excel 4.0 XLM macros (instead of newer VBA macros) to bypass anti-malware systems.

According to Morphisec, the chain of attack in MirrorBlast reflects the techniques of an established, financially motivated Russian cybercrime gang, known by researchers as TA505, which has been active since 2014 and known for variations in the tools they use.

Morphisec said that for compatibility with ActiveX objects, the macro code can only be executed on a 32-bit version of Office.

For more information, you may view the original story from ZDnet.

Top Stories

Related Articles

October 7, 2025 LinkedIn has filed a federal lawsuit accusing a data-scraping company of creating more than a million fake more...

October 7, 2025 North Korean hackers have stolen more than US $2 billion worth of cryptocurrency so far this year, more...

August 24, 2025 Every month or so I like to step back from the day-to-day news cycle and look at more...

August 18, 2025 The House of Commons has confirmed it was the target of a cyberattack that exposed personal and more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn