Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT

New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT

Posted on December 4, 2025December 4, 2025 By CWS

A complete phishing operation started concentrating on Indian firms in November 2025 by impersonating the Revenue Tax Division of India.

The marketing campaign employed remarkably genuine authorities communication templates, bilingual messaging in Hindi and English, and authorized references to sections of the Revenue Tax Act to create a way of legitimacy and urgency.

The emails warned recipients of alleged tax irregularities and demanded that they submit paperwork inside 72 hours, utilizing psychological strain as a main weapon to drive customers to open malicious attachments.

The assault delivered a classy two-stage malware chain that started with password-protected ZIP information containing shellcode loaders and later advanced to make use of Google Docs hyperlinks for secondary payload supply.

The ultimate payload was a Distant Entry Trojan designed to grant attackers full management over compromised programs, together with capabilities for display screen sharing, file switch, and distant command execution.

The marketing campaign particularly focused securities corporations, monetary firms, and non-banking monetary companies that frequently change regulatory paperwork with authorities businesses.

Raven safety analysts recognized the zero-day phishing marketing campaign by recognizing a number of layers of inconsistency inside the assault construction, in the end stopping widespread an infection throughout focused organizations.

An infection mechanism of this marketing campaign

The an infection mechanism of this marketing campaign reveals a rigorously engineered strategy to evasion.

Preliminary phishing emails originated from reliable QQ.com free e mail accounts that handed SPF, DKIM, and DMARC authentication checks, a important consider bypassing conventional e mail safety filters.

Phishing E-mail #1 (Supply – Raven)

The attachments used password safety to forestall antivirus engines from scanning their contents throughout transit.

Phishing E-mail #2 (Supply – Raven)

When customers extracted the ZIP information with passwords supplied within the emails, they encountered executable information named “NeededDocuments” that contained shellcode designed to execute by means of regsvr32 proxy loading.

This system, generally often known as fileless execution, allowed the malware to load a hidden DLL instantly into reminiscence with out writing detectable signatures to the disk.

The shellcode established persistence mechanisms, harvested saved credentials from the sufferer’s system, and opened communication channels to distant command servers related to AsyncRAT infrastructure.

Some variants used Google Docs as a trusted internet hosting platform for the second stage, exploiting the inherent belief positioned in reliable cloud companies by company safety filters.

The mix of fresh sender authentication, password-protected payloads, reliable cloud infrastructure, and regsvr32 proxy execution created a virtually invisible assault chain that rendered signature-based detection strategies ineffective.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:AsyncRAT, Attack, Delivers, Department, Income, India, Mimic, Phishing, Tax

Post navigation

Previous Post: PickleScan 0-Day Vulnerabilities Enable Arbitrary Code Execution via Malicious PyTorch Models
Next Post: Global Cyber Agencies Issue AI Security Guidance for Critical Infrastructure OT

Related Posts

Free Decryptor Released for AI-Assisted FunkSec Ransomware Free Decryptor Released for AI-Assisted FunkSec Ransomware Cyber Security News
Hive0156 Hackers Attacking Government and Military Organizations to Deploy Remcos RAT Hive0156 Hackers Attacking Government and Military Organizations to Deploy Remcos RAT Cyber Security News
GhostContainer Malware Hacking Exchange Servers in the Wild Using N-day Vulnerability GhostContainer Malware Hacking Exchange Servers in the Wild Using N-day Vulnerability Cyber Security News
Fired Techie Admits Hacking Employer’s Network in Retaliation for Termination Fired Techie Admits Hacking Employer’s Network in Retaliation for Termination Cyber Security News
Former GCHQ Intern Jailed for Seven Years After Copying Top Secret Files to Mobile Phone Former GCHQ Intern Jailed for Seven Years After Copying Top Secret Files to Mobile Phone Cyber Security News
New Google Drive Desktop Feature adds AI-powered Ransomware Detection to Prevent Cyberattacks New Google Drive Desktop Feature adds AI-powered Ransomware Detection to Prevent Cyberattacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News