• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security data security Device security Latest Cybersecurity News Linux security Mac security Windows security

New phishing campaign drops two payloads in ‘Dali Masks’ threatening device security

William Marshal Posted On May 4, 2020
19



Lokibot and Jigsawa malware

One security researcher has identified a new phishing campaign that is distributing a LokiBot info-stealing malware and another payload called the Jigsaw Ransomware.

Hackers are now deploying more than one malware to ensure their attack is organized streamlined with better success rates. Hackers use this malware combo, to steal the usernames and passwords of different applications first, then they deploy the ransomware demanding ransom for the encryption.

This phishing campaign had attachments that had impersonated invoices, bank transfers, business inquiries, orders and more. Excel attachments such as Swift.xlsx, order.xlsx, Inquiry.xlsx and Invoice for payment.xlsx is used to lure the victims to download these attachments. A legitimate looking spreadsheets is the mere advantage for hackers, as most recipients will believe that those attachments are from the actual source itself.

Jame, a security researcher has identified this campaign, and mentioned that the attachment are weaponized with LCG kit, exploiting an old remote code execution vulnerability in Microsoft Office tracked as CVE-2017-11882 in Equation Editor.

How does this new phishing campaign work?

If the attachment is downloaded, the instructions in the file will download the malware from a remote site and starts executing its intended process. James had disclosed the cjjjjjjjjjjjjjjjjjjj.exe file, is the LokiBot and has the capabilities to steal credentials from mail, browsers, FTP, and other terminal applications. After stealing the details, it transfers the information through command and control server to the creators of the campaign.

Meanwhile, LokiBot also initiates the second attack vector by downloading and installing the Jigsaw Ransomware variant that has employed Salvadore Dali mask that was used in the popular Spanish series ‘Money Heist’.

Like any other ransomware, Jigsaw also encrypts the victims files and folders, and starts deleting the encrypted files until the ransom is paid. However, this ransomware can be decrypted easily compared to others.  

How to get rid of Jigsaw ransomware?

If you are infected by this ransomware, ensure you terminate drpbx.exe process from your Task Manager, and this will help you secure your files from deletion.

Additionally, updating your Microsoft Office to the latest versions, especially Excel could ensure you are protected against these twin payload deployments on your devices.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

Share the article with your friends


Jigsaw ransomwareNew double punch phishing campaignNew phishing campaignRansomware attack


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

You may also like
Toronto Zoo Faces Cyberattack – Investigation Ensues
January 9, 2024
Ohio Lottery Hit by DragonForce Ransomware Attack
December 28, 2023
LockBit Ransomware Group Exposes Boeing: 43GB of Stolen Data Released
November 12, 2023
19 Comments

Royal CBD
August 1, 2020 at 7:12 pm
Reply

This paragraph provides clear idea designed for the new visitors of blogging,
that in fact how to do running a blog.

Here is my web site … Royal CBD


recep ivedik
December 10, 2020 at 7:42 am
Reply

Howdy! I understand this is kind of off-topic however I needed to ask. Latia Terencio Berkly


full hd tek parça izle
January 17, 2021 at 8:54 pm
Reply

I am glad to be a visitor of this thoroughgoing web blog ! , regards for this rare information! . Averil Zedekiah Gibbon


Dorothy
January 17, 2021 at 10:04 pm
Reply

You made some really good points there. I checked on the net for
more information about the issue and found most individuals will go along
with your views on this web site.


full hd tek parça izle
January 18, 2021 at 12:51 am
Reply

Great post, you have pointed out some good points, I as well conceive this s a very fantastic website. Theressa Sayres Dietsche


Annis
January 18, 2021 at 2:24 am
Reply

Fantastic site you have here but I was curious about if
you knew of any community forums that cover the same topics talked about in this article?
I’d really love to be a part of community where I can get suggestions from
other experienced people that share the same interest.

If you have any recommendations, please let me know. Thanks a lot!


hd film izle
January 18, 2021 at 6:46 pm
Reply

Superb, what a webpage it is! This weblog gives valuable data to us, keep it up. Eachelle Verge Kucik


Taylah
January 18, 2021 at 9:58 pm
Reply

wonderful issues altogether, you just won a brand new reader.

What would you recommend about your submit that you made a few days ago?
Any positive?


free sex
January 21, 2021 at 7:42 pm
Reply

There is apparently a bunch to identify about this. I assume you made some good points in features also. Eulalie Richy Kasey


access
January 30, 2021 at 6:38 am
Reply

Pretty! This was an incredibly wonderful article. Many thanks for supplying this information. Agnesse Weber Belak


netflix
January 30, 2021 at 8:42 am
Reply

Hi there i am kavin, its my first occasion to commenting anyplace, when i read this post i thought i could also make comment due to this brilliant article. Inger Kip Owades


720p
January 30, 2021 at 6:24 pm
Reply

Pretty! This was a really wonderful article. Thanks for supplying these details. Greta Guglielmo Ursi


720p
January 31, 2021 at 2:38 am
Reply

Hi to every one, the contents present at this site are in fact remarkable for people knowledge, well, keep up the nice work fellows.| Darya Sasha Recha


720p
January 31, 2021 at 9:54 am
Reply

I want to get across my gratitude for your kind-heartedness for people who absolutely need help with that matter. Your very own dedication to passing the message all through has been particularly functional and have specifically made workers much like me to get to their objectives. Your new helpful help means this much a person like me and extremely more to my fellow workers. With thanks; from all of us. Ketti Jeramie Shriver


filmkovasi
January 31, 2021 at 4:44 pm
Reply

Thank you for any other fantastic post. The place else could anybody get that type of information in such a perfect means of writing? Calli Bren Magulac


123movies
January 31, 2021 at 6:44 pm
Reply

Appreciate you sharing, great blog article. Thanks Again. Want more. Muire Weidar O’Dell


altyazili
January 31, 2021 at 8:28 pm
Reply

free live cam sites fessel sex spiele free pron movies amateur mature swinger orgy standing poses for photos Simonne Lyle Bridwell


watch
February 1, 2021 at 9:03 am
Reply

Everyone loves it when individuals come together and share views. Great site, keep it up. Addie Wendel Profant


donmadan
February 4, 2021 at 12:43 pm
Reply

The condition of the person seeking medical care is the crucial element in your choice regarding a long-term care center. Prissie Christoffer Lombardy


Leave a Reply to Dorothy Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search