Multiple malicious campaigns were observed with concealed LokiBot and Nanocore malware inside ISO image files small enough to fit into an email attachment.
Both LokiBot and Nanocore incorporate data-stealing capabilities. They target web browsers, email clients, remote admin tools (SSH, VNC, and RDP), and clipboard data. They can also collect information about documents present on the system and monitor user keystrokes to extract more sensitive details.
10 variants of these type of campaigns, with variations in the ISO images and messages delivered to potential victims. The endeavors appear to follow the “spray and pray” principle as they did not target specific individuals or businesses.
The emails delivers LokiBot or Nanocore RATs by luring users to open the financial document in the attachment.
Exposure of sensitive information