{"id":9427,"date":"2024-10-28T10:50:58","date_gmt":"2024-10-28T10:50:58","guid":{"rendered":"\/cybersecurity-blog\/?p=9427"},"modified":"2024-10-28T10:51:37","modified_gmt":"2024-10-28T10:51:37","slug":"cyber-attacks-october-2024","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/","title":{"rendered":"Recent Cyber Attacks Discovered by ANY.RUN: October 2024"},"content":{"rendered":"\n<p>Identifying new cyber threats is no simple task. They\u2019re always evolving, adapting, and finding new ways to slip through the defenses.&nbsp;&nbsp;<\/p>\n\n\n\n<p>But no stress\u2014<a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing_in_october_2024&amp;utm_term=281024&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> has you covered!&nbsp;<\/p>\n\n\n\n<p>Our team of researchers are always on the lookout, analyzing the latest attacks to keep you informed.&nbsp;&nbsp;<\/p>\n\n\n\n<p>In this article, we\u2019re sharing some of the most recent threats our team has uncovered over the past month. Let\u2019s dive in and see what\u2019s out there!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">APT-C-36, aka BlindEagle, Campaign in LATAM&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/x.com\/anyrun_app\/status\/1848335385660666334\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Original post on X<\/em><\/a><\/p>\n\n\n\n<p>APT-C-36, better known as <strong>BlindEagle<\/strong>, is a group that has been actively targeting the <strong>LATAM region<\/strong> for years. Their primary goal? To gain remote control of victims&#8217; devices through continuous phishing attacks, installing <a href=\"https:\/\/any.run\/malware-trends\/rat\" target=\"_blank\" rel=\"noreferrer noopener\">Remote Access Tools<\/a> <strong>(RATs)<\/strong> like <a href=\"https:\/\/any.run\/malware-trends\/remcos\" target=\"_blank\" rel=\"noreferrer noopener\">Remcos<\/a> and <a href=\"https:\/\/any.run\/malware-trends\/asyncrat\" target=\"_blank\" rel=\"noreferrer noopener\">AsyncRAT<\/a> for financial gain.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Attack details&nbsp;<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/apt36_intel-1024x576.jpeg\" alt=\"\" class=\"wp-image-9431\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/apt36_intel-1024x576.jpeg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/apt36_intel-300x169.jpeg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/apt36_intel-768x432.jpeg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/apt36_intel-1536x864.jpeg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/apt36_intel-2048x1152.jpeg 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/apt36_intel-370x208.jpeg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/apt36_intel-270x152.jpeg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/apt36_intel-740x416.jpeg 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Information on of the APT-C-36 attack<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>We discovered that in recent cases attackers invite victims to an online court hearing via email. This official-sounding invitation creates a sense of urgency, pushing the target to download the malicious payload.&nbsp;<\/p>\n\n\n\n<p>You can view <a href=\"https:\/\/app.any.run\/tasks\/c03dd430-2d34-424e-83ba-d9efda45a32a\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing_in_october_2024&amp;utm_term=281024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">analysis<\/a> of this attack inside ANY.RUN\u2019s sandbox.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/orig_email_phish-1024x576.jpeg\" alt=\"\" class=\"wp-image-9443\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/orig_email_phish-1024x576.jpeg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/orig_email_phish-300x169.jpeg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/orig_email_phish-768x432.jpeg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/orig_email_phish-370x208.jpeg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/orig_email_phish-270x152.jpeg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/orig_email_phish-740x416.jpeg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/orig_email_phish.jpeg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Phishing email with fake invitation in ANY.RUN\u2019s sandbox<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>To deliver their malware, BlindEagle often relies on well-known online services, such as:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Discord<\/li>\n\n\n\n<li>Google Drive<\/li>\n\n\n\n<li>Bitbucket&nbsp;&nbsp;<\/li>\n\n\n\n<li>Pastee&nbsp;&nbsp;<\/li>\n\n\n\n<li>YDRAY<\/li>\n<\/ul>\n\n\n\n<p>This tactic helps them bypass certain security filters since these services are typically trusted by users.&nbsp;<\/p>\n\n\n\n<p>The malicious payload is stored in the archive, which is usually protected by a password that can be found in the initial email. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"586\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image4-4-1024x586.png\" alt=\"\" class=\"wp-image-9430\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image4-4-1024x586.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image4-4-300x172.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image4-4-768x439.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image4-4-1536x878.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image4-4-2048x1171.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image4-4-370x212.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image4-4-270x154.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image4-4-740x423.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Thanks to ANY.RUN&#8217;s <a href=\"https:\/\/any.run\/cybersecurity-blog\/interactive-malware-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\">interactivity<\/a>, you can manually enter the password right inside the sandbox.<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nAnalyze malware and phishing threats <br>in <span class=\"highlight\">ANY.RUN sandbox<\/span> for free&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=phishing_in_october_2024&#038;utm_term=281024&#038;utm_content=linktoregistration#register\" rel=\"noopener\" target=\"_blank\">\nSet up free account \n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>As mentioned, BlindEagle use <strong>Remcos<\/strong> and <strong>AsyncRAT<\/strong> as their primary tools for remote access.&nbsp;The current attack involved Remcos distribution.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"312\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image5-4-1024x312.png\" alt=\"\" class=\"wp-image-9432\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image5-4-1024x312.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image5-4-300x91.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image5-4-768x234.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image5-4-370x113.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image5-4-270x82.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image5-4-740x225.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image5-4.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN provides helpful tags specifying the identified threats<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>In the current analysis session, we observed a Remcos RAT connection attempting communication with a Command and Control (C2) server.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"635\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image6-3-1024x635.png\" alt=\"\" class=\"wp-image-9433\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image6-3-1024x635.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image6-3-300x186.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image6-3-768x477.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image6-3-1536x953.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image6-3-370x230.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image6-3-270x168.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image6-3-740x459.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image6-3.png 1560w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Remcos command and control activity detected<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>This activity involves establishing TLS connection to an external server, which was immediately flagged by a Suricata IDS rule in the ANY.RUN sandbox.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Threat Intelligence on APT-C-36 attacks&nbsp;<\/h3>\n\n\n\n<p>To collect intel on other attacks belonging to BlindEagle&#8217;s campaigns, you can use ANY.RUN\u2019s <strong><a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a><\/strong>:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Specify the country from where the phishing sample originated:&nbsp;<br><strong>submissionCountry:&#8221;Co&#8221;<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Filter for sessions that involve an email client, like Outlook:&nbsp;<br><strong>commandLine:&#8221;OUTLOOK.EXE&#8221;<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Since the payload is often stored in an archive, filter for an archiving tool, such as WinRAR:&nbsp;<br><strong>commandLine:&#8221;WinRAR&#8221;<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Look for sessions flagged as suspicious or malicious:&nbsp;<br><strong>threatLevel:&#8221;malicious&#8221;<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>To find active RATs like Remcos, add a condition for Remote Access Tools:&nbsp;<br><strong>threatName:&#8221;rat&#8221;<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Here is the final query:<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-192\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"1\"\n           data-rows=\"1\"\n           data-wpID=\"192\"\n           data-responsive=\"0\"\n           data-has-header=\"0\">\n\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:100%;                    padding:10px;\n                    \"\n                    >\n                                        <a class=\"wpdt-link-content\" style=\"color: #009cff; text-decoration: underline\" href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing_in_october_2024&amp;utm_term=281024&amp;utm_content=linktolookup#%7B%2522query%2522:%2522submissionCountry:%255C%2522Co%255C%2522%2520AND%2520commandLine:%255C%2522OUTLOOK.EXE%255C%2522%2520AND%2520commandLine:%255C%2522WinRAR%255C%2522%2520AND%2520threatLevel:%255C%2522malicious%255C%2522%2520%2522,%2522dateRange%2522:180%7D\"  rel=\"\" target=\"_blank\" data-cell-id=\"00\" data-link-url=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing_in_october_2024&amp;utm_term=281024&amp;utm_content=linktolookup#%7B%2522query%2522:%2522submissionCountry:%255C%2522Co%255C%2522%2520AND%2520commandLine:%255C%2522OUTLOOK.EXE%255C%2522%2520AND%2520commandLine:%255C%2522WinRAR%255C%2522%2520AND%2520threatLevel:%255C%2522malicious%255C%2522%2520%2522,%2522dateRange%2522:180%7D\" data-link-text=\"submissionCountry:&quot;Co&quot; AND commandLine:&quot;OUTLOOK.EXE&quot; AND commandLine:&quot;WinRAR&quot; AND threatLevel:&quot;malicious&quot; \" data-link-target=\"true\" data-link-nofollow=\"0\" data-link-noreferrer=\"0\" data-link-sponsored=\"0\" data-link-btn-status=\"0\" data-link-btn-class=\"\" data-link-content=\"wpdt-link-content\">submissionCountry:&quot;Co&quot; AND commandLine:&quot;OUTLOOK.EXE&quot; AND commandLine:&quot;WinRAR&quot; AND threatLevel:&quot;malicious&quot; <\/a>                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-192'>\ntable#wpdtSimpleTable-192{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-192 td, table.wpdtSimpleTable192 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p>The search takes just a few seconds and reveals a wealth of information.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"601\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/results_for_outlook_query-1024x601.png\" alt=\"\" class=\"wp-image-9434\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/results_for_outlook_query-1024x601.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/results_for_outlook_query-300x176.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/results_for_outlook_query-768x451.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/results_for_outlook_query-1536x901.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/results_for_outlook_query-370x217.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/results_for_outlook_query-270x158.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/results_for_outlook_query-740x434.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/results_for_outlook_query.png 1841w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>The service returns a hundred samples of APT-C-36 and other similar attacks<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>TI Lookup offers a list of samples matching the query each with their corresponding sandbox analysis. You can navigate to any sandbox session of your interest to explore these threats further. <\/p>\n\n\n\n<!-- CTA Split START -->\n<div class=\"cta-split\">\n<div class=\"cta__split-left\">\n\n<!-- Image -->\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/mcusercontent.com\/663b94f19348582a8dc323efe\/images\/0d88188b-3e89-2314-5a60-cb87e8077326.png\" alt=\"ANY.RUN cloud interactive sandbox interface\" class=\"cta__split-icon\" \/>\n<\/div>\n\n<div class=\"cta__split-right\">\n<div>\n\n<!-- Heading -->\n<h3 class=\"cta__split-heading\"><br>Learn to Track Emerging Cyber Threats<\/h3>\n\n<!-- Text -->\n<p class=\"cta__split-text\">\nCheck out expert guide to collecting intelligence on emerging threats with <span class=\"highlight\">TI Lookup<\/span>\n<br \/>\n<br \/>\n<\/p>\n<\/div>\n<!-- CTA Link -->\n<a target=\"_blank\" rel=\"noopener\" id=\"article-banner-split\" href=\"https:\/\/any.run\/cybersecurity-blog\/emerging-threats\/\"><div class=\"cta__split-link\">Read full guide<\/div><\/a>\n<\/div>\n<\/div>\n<!-- CTA Split END -->\n<!-- CTA Split Styles START -->\n<style>\n.cta-split {\noverflow: hidden;\nmargin: 3rem 0;\ndisplay: grid;\njustify-items: center;\nborder-radius: 0.5rem;\nwidth: 100%;\nmin-height: 25rem;\ngrid-template-columns: repeat(2, 1fr);\nborder: 1px solid rgba(75, 174, 227, 0.32);\nfont-family: 'Catamaran Bold';\n}\n\n.cta__split-left {\ndisplay: flex;\nalign-items: center;\njustify-content: center;\nheight: 100%;\nwidth: 100%;\nbackground-color: #161c59;\nbackground-position: center center;\nbackground: rgba(32, 168, 241, 0.1);\n}\n\n.cta__split-icon { \nwidth: 100%;\nheight: auto;\nobject-fit: contain;\nmax-width: 100%;\n}\n\n.cta__split-right {\ndisplay: flex;\nflex-direction: column;\njustify-content: space-between;\npadding: 2rem;\n}\n\n.cta__split-heading { font-size: 1.5rem; }\n\n.cta__split-text {\nmargin-top: 1rem;\nfont-family: Lato, Roboto, sans-serif;\n}\n\n.cta__split-link {\npadding: 0.5rem 1rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: white;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\ndisplay: block;\nz-index: 1000;\nposition: relative;\ncursor: pointer !important;\n}\n\n.cta__split-link:hover {\nbackground-color: #68CBFF;\ncolor: white;\ncursor: pointer;\n}\n\n.highlight { color: #ea2526;}\n\n\n\/* Mobile styles START *\/\n@media only screen and (max-width: 768px) {\n\n.cta-split {\ngrid-template-columns: 1fr;\nmin-height: auto;\n}\n\n.cta__split-left {\nheight: auto;\nmin-height: 10rem;\n}\n\n\n.cta__split-left, .cta__split-right {\nheight: auto;\n}\n\n.cta__split-heading { font-size: 1.2rem; }\n\n.cta__split-text { font-size: 1rem; }\n.cta__split-icon {\nmax-height: auto;\nobject-fit: cover;\n}\n\n}\n\/* Mobile styles END *\/\n<\/style>\n<!-- CTA Split Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">Fake CAPTCHA Exploitation to Deliver Lumma&nbsp;<\/h2>\n\n\n\n<p><em><a href=\"https:\/\/x.com\/anyrun_app\/status\/1841433180324184342\" target=\"_blank\" rel=\"noreferrer noopener\">Original post on X<\/a><\/em><\/p>\n\n\n\n<p>Another phishing campaign discovered by ANY.RUN&#8217;s team exploited <strong>fake <a href=\"https:\/\/any.run\/cybersecurity-blog\/new-phishing-tactics\/\" target=\"_blank\" rel=\"noreferrer noopener\">CAPTCHA<\/a> prompts<\/strong> to execute malicious code, delivering <strong><a href=\"https:\/\/any.run\/malware-trends\/lumma\" target=\"_blank\" rel=\"noreferrer noopener\">Lumma<\/a> malware<\/strong> onto victims&#8217; systems.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Attack details<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_1-1024x1024.jpeg\" alt=\"\" class=\"wp-image-9435\" width=\"512\" height=\"512\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_1-1024x1024.jpeg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_1-300x300.jpeg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_1-150x150.jpeg 150w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_1-768x768.jpeg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_1-1536x1536.jpeg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_1-2048x2048.jpeg 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_1-70x70.jpeg 70w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_1-370x370.jpeg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_1-270x270.jpeg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_1-740x740.jpeg 740w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><figcaption class=\"wp-element-caption\"><em>Fake CAPTCHA attack<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>In this <a href=\"https:\/\/app.any.run\/tasks\/27e57e6b-53aa-4b2d-8870-72b48d1271f7\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing_in_october_2024&amp;utm_term=281024&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">phishing attack<\/a>, victims were lured to a compromised website and asked to complete a CAPTCHA. They either needed to verify their human identity or fix non-existent display errors on the page.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_2-1024x1024.jpeg\" alt=\"\" class=\"wp-image-9436\" width=\"512\" height=\"512\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_2-1024x1024.jpeg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_2-300x300.jpeg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_2-150x150.jpeg 150w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_2-768x768.jpeg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_2-1536x1536.jpeg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_2-2048x2048.jpeg 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_2-70x70.jpeg 70w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_2-370x370.jpeg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_2-270x270.jpeg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/phish_cam_2-740x740.jpeg 740w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><figcaption class=\"wp-element-caption\">The campaign included different fake messages<\/figcaption><\/figure><\/div>\n\n\n<p>Once the user clicked the fake CAPTCHA button, the attackers prompted them to copy and run a malicious <a href=\"https:\/\/any.run\/cybersecurity-blog\/powershell-script-tracer\/\" target=\"_blank\" rel=\"noreferrer noopener\">PowerShell script<\/a> through the Windows &#8220;Run&#8221; function (WIN+R).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"664\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image9-6-1024x664.png\" alt=\"\" class=\"wp-image-9437\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image9-6-1024x664.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image9-6-300x195.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image9-6-768x498.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image9-6-370x240.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image9-6-270x175.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image9-6-740x480.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/image9-6.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Malicious process execution via PowerShell<\/em> <em>shown in the ANY.RUN sandbox<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>The instruction deceived users into executing harmful code, leading to system infection with Lumma malware for further exploitation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">More samples of the campaign<\/h3>\n\n\n\n<p>For further investigation into attacks leveraging fake CAPTCHA prompts, you can use <strong>ANY.RUN\u2019s <a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a><\/strong> to locate additional samples and associated data. <\/p>\n\n\n\n<p>As part of your search query, you can use a domain involved in the attack:<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-193\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"1\"\n           data-rows=\"1\"\n           data-wpID=\"193\"\n           data-responsive=\"0\"\n           data-has-header=\"0\">\n\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-left\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:100%;                    padding:10px;\n                    \"\n                    >\n                                        <a class=\"wpdt-link-content\" style=\"color: #009cff; text-decoration: underline\" href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing_in_october_2024&amp;utm_term=281024&amp;utm_content=linktolookup#%7B%2522query%2522:%2522domainName:%255C%2522*verif*b-cdn.net%255C%2522%2522,%2522dateRange%2522:180%7D\"  rel=\"\" target=\"_blank\" data-cell-id=\"00\" data-link-url=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing_in_october_2024&amp;utm_term=281024&amp;utm_content=linktolookup#%7B%2522query%2522:%2522domainName:%255C%2522*verif*b-cdn.net%255C%2522%2522,%2522dateRange%2522:180%7D\" data-link-text=\"domainName:&quot;*verif*b-cdn.net&quot;\" data-link-target=\"true\" data-link-nofollow=\"0\" data-link-noreferrer=\"0\" data-link-sponsored=\"0\" data-link-btn-status=\"0\" data-link-btn-class=\"\" data-link-content=\"wpdt-link-content\">domainName:&quot;*verif*b-cdn.net&quot;<\/a>                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-193'>\ntable#wpdtSimpleTable-193{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-193 td, table.wpdtSimpleTable193 th { white-space: normal !important; }\n<\/style>\n\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"601\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/domain_query_fake-1-1024x601.png\" alt=\"\" class=\"wp-image-9439\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/domain_query_fake-1-1024x601.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/domain_query_fake-1-300x176.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/domain_query_fake-1-768x451.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/domain_query_fake-1-1536x902.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/domain_query_fake-1-370x217.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/domain_query_fake-1-270x159.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/domain_query_fake-1-740x435.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/domain_query_fake-1.png 1839w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>TI Lookup identifies the domain as malicious and offers additional threat context <\/em><\/figcaption><\/figure><\/div>\n\n\n<p>This query reveals multiple related domains, IP addresses, and sandbox sessions tied to the attacks outlined above.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Abuse of Encoded JavaScript<\/h2>\n\n\n\n<p><em><a href=\"https:\/\/x.com\/anyrun_app\/status\/1844353025382445519\" target=\"_blank\" rel=\"noreferrer noopener\">Original post on X<\/a><\/em><\/p>\n\n\n\n<p>We also identified a growing use of <strong>encoded JavaScript files<\/strong> for hidden script execution.<\/p>\n\n\n\n<p>Microsoft originally developed Script Encoder as a way for developers to obfuscate <a href=\"https:\/\/any.run\/cybersecurity-blog\/malicious-scripts\/\" target=\"_blank\" rel=\"noreferrer noopener\">JavaScript and VBScript<\/a>, making the code unreadable while remaining functional through interpreters like wscript. <\/p>\n\n\n\n<p>Intended as a protective measure, Script Encoder has also become a resource for attackers.&nbsp;By encoding harmful JavaScript in .jse files, cybercriminals can embed malware in scripts that look legitimate, tricking users into running the malicious code.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/decryption_js-1024x576.jpeg\" alt=\"\" class=\"wp-image-9442\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/decryption_js-1024x576.jpeg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/decryption_js-300x169.jpeg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/decryption_js-768x432.jpeg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/decryption_js-1536x864.jpeg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/decryption_js-2048x1152.jpeg 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/decryption_js-370x208.jpeg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/decryption_js-270x152.jpeg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/decryption_js-740x416.jpeg 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Steps for decoding a JS script <\/em><\/figcaption><\/figure><\/div>\n\n\n<p>This type of obfuscation not only conceals the code but also complicates detection, as security tools struggle to identify the harmful intent within encrypted data.&nbsp;<\/p>\n\n\n\n<p>Encoded .jse files are commonly delivered through <strong>phishing emails<\/strong> or <strong>drive-by-downloads<\/strong>.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/eb2575a2-ff57-4ec5-b74a-6a22f28847c4\/\" target=\"_blank\" rel=\"noreferrer noopener\">See analysis<\/a> of a .jse file disguised as a calculator software in the ANY.RUN sandbox. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/script_execution-1024x744.png\" alt=\"\" class=\"wp-image-9440\" width=\"650\" height=\"472\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/script_execution-1024x744.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/script_execution-300x218.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/script_execution-768x558.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/script_execution-370x269.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/script_execution-270x196.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/script_execution-740x538.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2024\/10\/script_execution.png 1437w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption class=\"wp-element-caption\"><em>The ANY.RUN sandbox lets you see how a script executes <\/em><\/figcaption><\/figure><\/div>\n\n\n<p>Using the built-in Script Tracer feature, you can view entire script execution process to avoid <a href=\"https:\/\/x.com\/anyrun_app\/status\/1844353025382445519\" target=\"_blank\" rel=\"noreferrer noopener\">manual decryption<\/a>. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Our analysts are constantly on the lookout for emerging phishing and malware attacks, as well as new malicious techniques used by cyber criminals. To stay updated on the latest research of ANY.RUN&#8217;s team, make sure to follow us on <a href=\"https:\/\/x.com\/anyrun_app\/\" target=\"_blank\" rel=\"noreferrer noopener\">X<\/a>, <a href=\"https:\/\/www.linkedin.com\/company\/any-run\/\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a>, <a href=\"https:\/\/www.youtube.com\/c\/ANYRUN\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>, <a href=\"https:\/\/www.facebook.com\/www.any.run\/\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a>, and other social media. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our&nbsp;<a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing_in_october_2024&amp;utm_term=281024&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">interactive sandbox<\/a>&nbsp;simplifies malware analysis of threats that target both Windows and&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/linux-malware-analysis-cases\/\" target=\"_blank\" rel=\"noreferrer noopener\">Linux<\/a>&nbsp;systems. Our threat intelligence products,&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/introducing-any-run-threat-intelligence-lookup\/\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>,&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA Search<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/ti-feeds-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\">Feeds<\/a>, help you find&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/indicators-of-compromise\/\" target=\"_blank\" rel=\"noreferrer noopener\">IOCs<\/a>&nbsp;or files to learn more about the threats and respond to incidents faster.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>With ANY.RUN you can:<\/strong>&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detect malware in seconds<\/li>\n\n\n\n<li>Interact with samples in real time<\/li>\n\n\n\n<li>Save time and money on sandbox setup and maintenance&nbsp;<\/li>\n\n\n\n<li>Record and study all aspects of malware behavior<\/li>\n\n\n\n<li>Collaborate with your team&nbsp;<\/li>\n\n\n\n<li>Scale as you need<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing_in_october_2024&amp;utm_term=281024&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Request free trial \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identifying new cyber threats is no simple task. They\u2019re always evolving, adapting, and finding new ways to slip through the defenses.&nbsp;&nbsp; But no stress\u2014ANY.RUN has you covered!&nbsp; Our team of researchers are always on the lookout, analyzing the latest attacks to keep you informed.&nbsp;&nbsp; In this article, we\u2019re sharing some of the most recent threats [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":9461,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,10,34,40],"class_list":["post-9427","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-cybersecurity","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Recent Cyber Attacks Discovered by ANY.RUN: October 2024 - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Discover the latest cyber attacks identified by researchers at ANY.RUN to see new phishing techniques and malware campaigns.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Recent Cyber Attacks Discovered by ANY.RUN: October 2024\",\"datePublished\":\"2024-10-28T10:50:58+00:00\",\"dateModified\":\"2024-10-28T10:51:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/\"},\"wordCount\":1132,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/\",\"name\":\"Recent Cyber Attacks Discovered by ANY.RUN: October 2024 - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-10-28T10:50:58+00:00\",\"dateModified\":\"2024-10-28T10:51:37+00:00\",\"description\":\"Discover the latest cyber attacks identified by researchers at ANY.RUN to see new phishing techniques and malware campaigns.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Recent Cyber Attacks Discovered by ANY.RUN: October 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Recent Cyber Attacks Discovered by ANY.RUN: October 2024 - ANY.RUN&#039;s Cybersecurity Blog","description":"Discover the latest cyber attacks identified by researchers at ANY.RUN to see new phishing techniques and malware campaigns.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Recent Cyber Attacks Discovered by ANY.RUN: October 2024","datePublished":"2024-10-28T10:50:58+00:00","dateModified":"2024-10-28T10:51:37+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/"},"wordCount":1132,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis","malware behavior"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/","url":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/","name":"Recent Cyber Attacks Discovered by ANY.RUN: October 2024 - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-10-28T10:50:58+00:00","dateModified":"2024-10-28T10:51:37+00:00","description":"Discover the latest cyber attacks identified by researchers at ANY.RUN to see new phishing techniques and malware campaigns.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-october-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"Recent Cyber Attacks Discovered by ANY.RUN: October 2024"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/9427"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=9427"}],"version-history":[{"count":18,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/9427\/revisions"}],"predecessor-version":[{"id":9463,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/9427\/revisions\/9463"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/9461"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=9427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=9427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=9427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}