IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Check Point warns of resume-themed malware threat

Security firm claims resume-themed campaigns have doubled in the US in the past two months

RATDispenser evades nine in ten anti-virus engines

Check Point Software has warned that hackers are using fraudulent resume documents to spread Zloader malware.

Resume-themed campaigns in the last two months have doubled in the US, according to Check Point, with one in 450 malicious files being a resume-related scam.

Check Point has observed threat actors using infected resume documents to spread Zloader malware. Malicious .xls files with subjects such as “applying for a job” or “regarding job” were sent to unsuspecting users. 

Victims were then asked to enable content when opening the infected files. In doing so, a malicious macro began running in the background to download the final payload onto a user’s device. Once a user’s device was successfully infected, threat actors could use the malware to carry out financial transactions on the device.

The software company also discovered a campaign using medical leave forms that delivered the Icedid malware, another banking trojan designed to steal a user’s financial data. The emails were sent from different sender domains such as “medical-center.space” and used subjects citing the Family and Medical Leave Act (FMLA) to lure victims into opening malicious email attachments using file names like “COVID -19 FLMA CENTER.doc.”

A similar FMLA-themed campaign delivered banking trojan Trickbot. In this particular cyberattack, emails being sent from domains such as “covid-agency.space” sought to trick unsuspecting users into opening malicious email attachments.

To prevent themselves from falling victim to these resume and FMLA-themed attacks, Check Point Software reminds users to be aware of lookalike domains and unfamiliar email senders. Check Point Software also cautions users against opening file attachments from unknown senders, especially if the attachments prompt users to do something they wouldn’t.

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Recommended

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
Security

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

27 Jun 2022
Hackers use Linux backdoor on compromised e-commerce sites with software skimmer
malware

Hackers use Linux backdoor on compromised e-commerce sites with software skimmer

19 Nov 2021
Iranian hackers ramp up attacks against IT services sector
hacking

Iranian hackers ramp up attacks against IT services sector

19 Nov 2021
TikTok phishing campaign tried to scam over 125 influencer accounts
social media

TikTok phishing campaign tried to scam over 125 influencer accounts

18 Nov 2021

Most Popular

Former Uber security chief to face fraud charges over hack coverup
data breaches

Former Uber security chief to face fraud charges over hack coverup

29 Jun 2022
Macmillan Publishers hit by apparent cyber attack as systems are forced offline
Security

Macmillan Publishers hit by apparent cyber attack as systems are forced offline

30 Jun 2022
FCC commissioner urges Apple and Google to remove TikTok from app stores
data protection

FCC commissioner urges Apple and Google to remove TikTok from app stores

29 Jun 2022