• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Week 7 – In the News: Phishing emails lure victims with inside info on Trump’s health

October 11, 2020 by Anthony Messina Leave a Comment

A new phishing campaign has been discovered that will install a backdoor on the victim’s computer.  The phishing campaign is utilizing President Trump’s recent contraction of the Corona Virus.  With the presidential election just weeks away, people on both sides of the election have become obsessed with President Trump’s health due to the Corona Virus.

The phishing email which has been spotted by cybersescurity firm ProofPoint, is using a slew of different email subjects which include:

  • Recent materials pertaining to the president’s illness
  • Newest information about the president’s condition
  • Newest info pertaining to President’s illness

The emails claim to have insider information on the president’s health, requiring the user to download a document using an embedded link.  Once the link is clicked, the victim is brought to a Google Doc claiming that Google has scanned the file and is safe, prompting the user to download the document.  Instead of downloading the doc, a BazarLoader executable will be downloaded instead.

A BazarLoader is a backdoor created by the TrickBot gang.  This backdoor allows attackers to remotely access the computer which will be used to compromise the network.  Generally this leads to the installation or the Ryuk ransomware.  Ryuk is a form of ransomware that targets enterprise environments.

 

https://www.bleepingcomputer.com/news/security/phishing-emails-lure-victims-with-inside-info-on-trumps-health/

Filed Under: Week 07: Social Engineering Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in