Ongoing phishing campaign targets Poland and Germany with advanced malware

Ongoing phishing campaign targets Poland and Germany with advanced malware

A financially motivated threat actor has been linked to a sophisticated phishing campaign targeting users in Poland and Germany, with the attacks ongoing since at least July 2024. The operation involves various malicious payloads, including well-known malware like Agent Tesla and Snake Keylogger, as well as a previously undocumented backdoor known as TorNet, delivered via a tool called PureCrypter.

The TorNet backdoor enables communication between the victim's machine and the threat actor over the Tor anonymity network. According to an analysis by Cisco Talos, the threat actor is leveraging multiple techniques to avoid detection by traditional security measures.

In some cases, the attacker runs the Windows scheduled tasks on victim machines, even those with low battery levels, to maintain persistent access. Additionally, the threat actor disconnects the victim's device from the network before dropping the malicious payload and reconnects it afterward, evading detection by cloud-based antivirus solutions.

The phishing emails typically contain fake money transfer confirmations or order receipts. Posing as financial institutions or manufacturing and logistics companies, the emails include compressed attachments with a ".tgz" file extension. This file type is likely used to bypass detection systems that may be trained to flag more common formats like .exe or .zip.

Once the victim opens the attachment and extracts its contents, a .NET loader is triggered. The loader downloads and runs the PureCrypter malware, which, in turn, deploys the TorNet backdoor. Before doing so, the malware performs various checks to ensure that it is not running in a virtual environment or being analyzed by security researchers.

Once the TorNet backdoor is active, it establishes a connection to the command-and-control (C2) server and allows the attacker to execute arbitrary .NET assemblies directly in the victim's memory. This greatly expands the attack surface, providing the attacker with more opportunities for further intrusions and data exfiltration.


Back to the list

Latest Posts

Cyber Security Week in Review: May 23, 2025

Cyber Security Week in Review: May 23, 2025

In brief: Several major malware operations disrupted,  hackers exploit Ivanti and Cityworks zero-days, and more.
23 May 2025
Russian GRU hackers accused of massive espionage campaign across NATO and allied nations

Russian GRU hackers accused of massive espionage campaign across NATO and allied nations

The cyber offensive reportedly struck dozens of entities, spanning both government and private sectors.
22 May 2025
Chinese-speaking threat actors exploit Cityworks zero-day to hack into US govt agencies

Chinese-speaking threat actors exploit Cityworks zero-day to hack into US govt agencies

The attacks have been ongoing since at least January 2025.
22 May 2025