Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malware Targets Argentine Courts with Fake Documents

Malware Targets Argentine Courts with Fake Documents

Posted on March 18, 2026 By CWS

A recent cyber attack is exploiting Argentina’s judicial sector by using counterfeit court documents to distribute a dangerous malware. Legal professionals are being deceived into installing this harmful software, which is part of a campaign known as Operation Covert Access.

The attackers are utilizing spear-phishing emails that closely resemble authentic court communications. These emails distribute a Rust-based Remote Access Trojan, COVERT RAT, which grants attackers persistent access to compromised systems.

Targeting the Legal Landscape

The campaign specifically targets Argentina’s legal framework, impacting federal courts, law firms, government justice departments, academic bodies, and advocacy groups. By focusing on genuine court rulings related to preventive detention, the attackers exploit the inherent trust in legal documents, making the campaign exceptionally effective.

Point Wild analysts, expanding on research by Seqrite, have examined the operation in detail. They outlined the PowerShell execution flow and payload retrieval methods, highlighting the sophisticated, multi-layered approach aimed at remaining undetected within institutional networks.

Advanced Threat Capabilities

Beyond simple data surveillance, COVERT RAT connects to a command-and-control server at 181.231.253.69:4444. This connectivity allows attackers to execute various malicious activities, such as file theft and ransomware deployment.

The malware’s modular structure facilitates credential harvesting, privilege escalation, and encrypted file operations. Its ability to erase all traces post-operation complicates forensic investigations, adding to the threat’s severity.

Complex Delivery and Execution

Attackers employ a layered delivery system, starting with a phishing email that includes a ZIP file with a Windows shortcut, a batch loader script, and a fake judicial PDF. When executed, the malicious script operates in the background while the decoy PDF appears genuine.

Upon opening the shortcut, PowerShell is triggered in a concealed mode, launching a batch script that downloads the RAT from a GitHub repository. This use of GitHub enhances the attack’s perceived legitimacy, as traffic to the platform often bypasses security alerts.

Security measures are essential for legal and judicial professionals. Keeping antivirus software updated, avoiding suspicious email attachments, and monitoring system processes are critical steps to mitigate such threats.

Stay informed by following us on social media platforms like Google News, LinkedIn, and X for more updates.

Cyber Security News Tags:Argentina, COVERT RAT, cyber attack, Cybersecurity, fake documents, judicial system, legal sector, Malware, Phishing, remote access trojan

Post navigation

Previous Post: Boggy Serpens Intensifies Cyberattacks on Global Targets
Next Post: WhatsApp View Once Bypass Found, Meta Won’t Fix

Related Posts

IBM Urges Immediate Patch for Identity Access Vulnerabilities IBM Urges Immediate Patch for Identity Access Vulnerabilities Cyber Security News
Cloud Security Essentials – Protecting Multi-Cloud Environments Cloud Security Essentials – Protecting Multi-Cloud Environments Cyber Security News
Google Threat Intelligence Launches Actionable Technique To Hunt for Malicious .Desktop Files Google Threat Intelligence Launches Actionable Technique To Hunt for Malicious .Desktop Files Cyber Security News
Netwrix Password Manager Vulnerability Allows Authenticated Remote Code Execution Netwrix Password Manager Vulnerability Allows Authenticated Remote Code Execution Cyber Security News
Insider Threats in 2025 Detection and Prevention Strategies Insider Threats in 2025 Detection and Prevention Strategies Cyber Security News
Hackers Exploit AiTM to Misdirect Employee Salaries Hackers Exploit AiTM to Misdirect Employee Salaries Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark