HomeCyber BalkansCaution: Phobos Ransomware Delivered via Office Document

Caution: Phobos Ransomware Delivered via Office Document

Published on

spot_img

A recent discovery by researchers has revealed that a VBA script hidden in an Office document is being used to spread the dreaded Phobos ransomware variant known as FAUST. This version of FAUST is notorious for being able to sustain persistence within a given environment and can generate multiple threads to ensure efficient execution of the ransomware.

Phobos ransomware, a well-known family of malicious malware, has been wreaking havoc since its introduction in 2019, participating in multiple cyberattacks. The ransomware is designed to encrypt files on a victim’s PC and then demands a cryptocurrency ransom for decryption.

In this particular case, the attackers utilized the Gitea service to store multiple files encoded in Base64, with each file containing a malicious binary. When these files are injected into the memory of a system, they initiate a file encryption attack.

Fortinet analysis revealed that the XLAM document found to contain the VBA script launches PowerShell when opened. The script then downloads data from Gitea in Base64 encoding, which can be decoded to create a clean XLSX file. This file is automatically opened and saved in the TEMP folder, tricking users into believing that the process is safe to use.

The attacker then creates a region of memory in the target process, adds malicious code, and makes a call to the entry point of the payload. The FAUST ransomware variant, a member of the Phobos family, appends the “.faust” extension to every encrypted file. Info.txt and info.hta files are also created within the directories containing the encrypted files, and these files are used as a means to negotiate the ransom with the attackers.

According to Fortinet, the FAUST ransomware initiates multiple threads to perform various tasks, including deploying encryption, scanning logical drives, searching for network/sharing resources, scanning files individually, and explicitly seeking database-related files, in line with typical Phobos behavior.

The threat actor also employed a fileless attack to deploy shellcode onto the victim’s machine, allowing the final FAUST payload to be delivered. FortiGuard Labs has discovered and documented other ransomware variants from the Phobos family, including EKING and 8Base.

In light of these developments, users are being urged to exercise caution and avoid opening document files from unknown sources to protect their devices from potential malware threats. This incident underscores the importance of cybersecurity measures and the need for heightened vigilance in the face of evolving cyber threats.

Source link

Latest articles

Bridewell Among the First to Attain Level 2 Defence Cyber Certification

Bridewell Becomes a Pioneer in Defence Cyber Certification: A Step Towards Enhanced Cyber Security...

Azure SRE Agent Vulnerability Enables Silent Eavesdropping on Enterprise Cloud Operations

Security Flaw Discovered in Azure SRE Agent Gateway SignalR Hub Recent investigations have brought to...

Cyber Briefing – April 21, 2026 – CyberMaterial

Cybersecurity Briefing: Emerging Threats and Corporate Developments In the ever-evolving landscape of cybersecurity, recent reports...

AI-Powered NGate Malware Successfully Evades Detection in NFC Payment Applications

Rising Threat of NGate Malware via HandyPay: A Detailed Exploration A new variant of the...

More like this

Bridewell Among the First to Attain Level 2 Defence Cyber Certification

Bridewell Becomes a Pioneer in Defence Cyber Certification: A Step Towards Enhanced Cyber Security...

Azure SRE Agent Vulnerability Enables Silent Eavesdropping on Enterprise Cloud Operations

Security Flaw Discovered in Azure SRE Agent Gateway SignalR Hub Recent investigations have brought to...

Cyber Briefing – April 21, 2026 – CyberMaterial

Cybersecurity Briefing: Emerging Threats and Corporate Developments In the ever-evolving landscape of cybersecurity, recent reports...