Newly Uncovered Phishing Attack Uses Weaponized Excel File

October 19, 2021

A new phishing campaign is targeting financial services workers by using links to download a ‘weaponized’ Excel document.

The campaign, called MirrorBlast, was discovered in early September by security firm ET Labs. Another security firm, Morphisec, analyzed the malware and says the malicious Excel files are able to bypass malware detection systems because they contain “extremely lightweight” embedded macros, making them “particularly dangerous” for organizations that rely on detection-based security and sandboxing.

Macros have been used by government-sponsored hackers because they often work. Microsoft recently expanded its Antimalware Scan Interface (AMSI) for antivirus to counter the rise of macro malware, and a new trend by attackers to use legacy Excel 4.0 XLM macros (instead of newer VBA macros) to bypass anti-malware systems.

According to Morphisec, the chain of attack in MirrorBlast reflects the techniques of an established, financially motivated Russian cybercrime gang, known by researchers as TA505, which has been active since 2014 and known for variations in the tools they use.

Morphisec said that for compatibility with ActiveX objects, the macro code can only be executed on a 32-bit version of Office.

For more information, you may view the original story from ZDnet.

Top Stories

Related Articles

November 13, 2025 CrowdStrike’s 2025 Global Threat Report paints a clear picture of a threat landscape moving faster, operating more more...

November 13, 2025 The Washington Post has confirmed that nearly 10,000 current and former employees and contractors had personal information more...

November 13, 2025 Criminals are using a new phishing scheme to target people who have lost their iPhones, sending messages more...

November 12, 2025 Cybersecurity experts are warning of a sharp increase in investment scams powered by artificial intelligence, as criminals more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn