Late in March, we observed the Sphinx banking trojan, which is largely based on leaked source code for Zeus, began to aggressively spread via email with COVID-themed messages. In some cases, victims were enticed to complete a form related to receiving government assistance during the outbreak. The malicious document then proceeds to drop and execute a VBS script. This script establishes C2 communication channels and downloads additional executable payloads. Beyond the COVID-themed lures, the functionally is largely unchanged with regards to data inception via web injects. #Zeus Sphinx attempts to establish persistence via the registry (HKLMSoftwareMicrosoftWindowsCurrentVersionRun). The malware has also been known to self-sign its binaries, in an attempt to further evade traditional endpoint security controls. Watch how SentinelOne blocks this threat.
SentinelOne PartnerOne - America's 2025
⛳️ Last week in Pebble Beach the America's best cybersecurity partners came together for our annual PartnerOne summit. Check out…
Just a Sec: Cybersecurity Unfiltered—Fast, Frank, and From the Front Lines
Welcome to the first-ever Just A Sec, a no-holds-barred, quick-fire monthly livestream. It’s cybersecurity like you’ve never heard it before—unfiltered,…
Scopri cosa può fare la nostra piattaforma di sicurezza informatica autonoma intelligente per proteggere la tua azienda oggi e domani.