Bitdefender uncovers Omicron malware campaign

By Dylan Bushell-Embling
Tuesday, 21 December, 2021

Bitdefender uncovers Omicron malware campaign

Bitdefender has announced it has uncovered a new malicious phishing campaign designed to take advantage of the attention being paid to the COVID-19 Omicron variant.

The new campaign resembles a request to revise shipment information found in a Proforma invoice attachment, and cites new government policies in response to the Omicron variant that the recipient must pay attention to.

An attachment to the phishing email contains GuLoader, a widely used remote access Trojan downloader best known for its anti-VM capabilities to evade detection. This RAT is used to spread FormBook, an information scraper previously detected in global phishing campaigns conducted in July and September.

Over 90% of the malicious emails originate from IP addresses in the US. While telemetry suggests attention on Asia–Pacific targets, the campaign has also spread to Europe, including the UK, Germany and the Netherlands.

“We expect more threat actors to piggyback on Omicron in coming weeks, as users travel or prepare for Christmas and New Years’ celebrations. Users are advised to stick to good cyber hygiene and install a security solution on their devices,” Bitdefender said in a threat advisory.

“Keep operating systems and apps up to date and never access attachments from unsolicited emails without being able to verify their validity.”

Image credit: ©

Related News

Aussie orgs still struggling to identify cyber risk

New research from Trend Micro has revealed that 48% of Australian organisations feel their cyber...

ANZ ITDMs failing to keep pace with security threats

Only a third of security professionals in ANZ believe that they have the right security strategy...

Claroty finds critical FileWave vulnerabilities

Claroty has uncovered two critical vulnerabilities in unpatched versions of the FileWave MDM...

  • All content Copyright © 2022 Westwick-Farrow Pty Ltd