Summary: Cybersecurity researchers have uncovered a campaign utilizing MintsLoader malware, which targets sectors like electricity and legal services in the U.S. and Europe to spread secondary payloads, including the StealC information stealer. The campaign employs phishing techniques involving fake CAPTCHA prompts to trick users into executing malicious scripts. Additionally, the emergence of refined versions of related malware tools demonstrates the evolving landscape of cyber threats.
Affected: Electricity, oil and gas, and legal services sectors in the United States and Europe
Keypoints :
- MintsLoader is delivered through spam emails leading to malicious scripts and PowerShell commands.
- The attack chain can bypass sandboxes and utilizes Domain Generation Algorithms (DGA) for command-and-control communications.
- Related campaigns like GootLoader leverage SEO poisoning to redirect victims to compromised sites, complicating detection efforts.
Source: https://thehackernews.com/2025/01/mintsloader-delivers-stealc-malware-and.html