Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT

Posted on December 4, 2025December 4, 2025 By CWS

A complete phishing operation started concentrating on Indian firms in November 2025 by impersonating the Revenue Tax Division of India.

The marketing campaign employed remarkably genuine authorities communication templates, bilingual messaging in Hindi and English, and authorized references to sections of the Revenue Tax Act to create a way of legitimacy and urgency.

The emails warned recipients of alleged tax irregularities and demanded that they submit paperwork inside 72 hours, utilizing psychological strain as a main weapon to drive customers to open malicious attachments.

The assault delivered a classy two-stage malware chain that started with password-protected ZIP information containing shellcode loaders and later advanced to make use of Google Docs hyperlinks for secondary payload supply.

The ultimate payload was a Distant Entry Trojan designed to grant attackers full management over compromised programs, together with capabilities for display screen sharing, file switch, and distant command execution.

The marketing campaign particularly focused securities corporations, monetary firms, and non-banking monetary companies that frequently change regulatory paperwork with authorities businesses.

Raven safety analysts recognized the zero-day phishing marketing campaign by recognizing a number of layers of inconsistency inside the assault construction, in the end stopping widespread an infection throughout focused organizations.

An infection mechanism of this marketing campaign

The an infection mechanism of this marketing campaign reveals a rigorously engineered strategy to evasion.

Preliminary phishing emails originated from reliable QQ.com free e mail accounts that handed SPF, DKIM, and DMARC authentication checks, a important consider bypassing conventional e mail safety filters.

Phishing E-mail #1 (Supply – Raven)

The attachments used password safety to forestall antivirus engines from scanning their contents throughout transit.

Phishing E-mail #2 (Supply – Raven)

When customers extracted the ZIP information with passwords supplied within the emails, they encountered executable information named “NeededDocuments” that contained shellcode designed to execute by means of regsvr32 proxy loading.

This system, generally often known as fileless execution, allowed the malware to load a hidden DLL instantly into reminiscence with out writing detectable signatures to the disk.

The shellcode established persistence mechanisms, harvested saved credentials from the sufferer’s system, and opened communication channels to distant command servers related to AsyncRAT infrastructure.

Some variants used Google Docs as a trusted internet hosting platform for the second stage, exploiting the inherent belief positioned in reliable cloud companies by company safety filters.

The mix of fresh sender authentication, password-protected payloads, reliable cloud infrastructure, and regsvr32 proxy execution created a virtually invisible assault chain that rendered signature-based detection strategies ineffective.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:AsyncRAT, Attack, Delivers, Department, Income, India, Mimic, Phishing, Tax

Post navigation

Previous Post: PickleScan 0-Day Vulnerabilities Enable Arbitrary Code Execution via Malicious PyTorch Models
Next Post: Global Cyber Agencies Issue AI Security Guidance for Critical Infrastructure OT

Related Posts

Critical Teleport Vulnerability Let Attackers Remotely Bypass Authentication Controls Cyber Security News
Lessons Learned from Massive npm Supply Chain Attack Using “Shai-Hulud” Self-Replicating Malware Cyber Security News
Splunk Address Third Party Packages Vulnerabilities in Enterprise Versions Cyber Security News
Microsoft Azure API Management Flaw Enables Cross-Tenant Account Creation, Bypassing Admin Restrictions Cyber Security News
Hackers Leverage Google Forms Surveys to Trick Victims into Stealing Cryptocurrency Cyber Security News
Hackers Breaking Internet with 7.3 Tbps and 4.8 Billion Packets Per Second DDoS Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Researchers Uncovered LockBit’s 5.0 Latest Affiliate Panel and Encryption Variants
  • CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training
  • Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
  • Asymmetric Security Emerges From Stealth With $4.2 Million in Funding
  • ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Researchers Uncovered LockBit’s 5.0 Latest Affiliate Panel and Encryption Variants
  • CyberNut Closes $5M Growth Capital for K-12 Security Awareness Training
  • Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws
  • Asymmetric Security Emerges From Stealth With $4.2 Million in Funding
  • ErrTraffic Fueling ClickFix by Breaking the Page Visually and Turns Attack to GlitchFix

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark