Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Phishing Attack Mimic as Income Tax Department of India Delivers AsyncRAT

Posted on December 4, 2025December 4, 2025 By CWS

A complete phishing operation started concentrating on Indian firms in November 2025 by impersonating the Revenue Tax Division of India.

The marketing campaign employed remarkably genuine authorities communication templates, bilingual messaging in Hindi and English, and authorized references to sections of the Revenue Tax Act to create a way of legitimacy and urgency.

The emails warned recipients of alleged tax irregularities and demanded that they submit paperwork inside 72 hours, utilizing psychological strain as a main weapon to drive customers to open malicious attachments.

The assault delivered a classy two-stage malware chain that started with password-protected ZIP information containing shellcode loaders and later advanced to make use of Google Docs hyperlinks for secondary payload supply.

The ultimate payload was a Distant Entry Trojan designed to grant attackers full management over compromised programs, together with capabilities for display screen sharing, file switch, and distant command execution.

The marketing campaign particularly focused securities corporations, monetary firms, and non-banking monetary companies that frequently change regulatory paperwork with authorities businesses.

Raven safety analysts recognized the zero-day phishing marketing campaign by recognizing a number of layers of inconsistency inside the assault construction, in the end stopping widespread an infection throughout focused organizations.

An infection mechanism of this marketing campaign

The an infection mechanism of this marketing campaign reveals a rigorously engineered strategy to evasion.

Preliminary phishing emails originated from reliable QQ.com free e mail accounts that handed SPF, DKIM, and DMARC authentication checks, a important consider bypassing conventional e mail safety filters.

Phishing E-mail #1 (Supply – Raven)

The attachments used password safety to forestall antivirus engines from scanning their contents throughout transit.

Phishing E-mail #2 (Supply – Raven)

When customers extracted the ZIP information with passwords supplied within the emails, they encountered executable information named “NeededDocuments” that contained shellcode designed to execute by means of regsvr32 proxy loading.

This system, generally often known as fileless execution, allowed the malware to load a hidden DLL instantly into reminiscence with out writing detectable signatures to the disk.

The shellcode established persistence mechanisms, harvested saved credentials from the sufferer’s system, and opened communication channels to distant command servers related to AsyncRAT infrastructure.

Some variants used Google Docs as a trusted internet hosting platform for the second stage, exploiting the inherent belief positioned in reliable cloud companies by company safety filters.

The mix of fresh sender authentication, password-protected payloads, reliable cloud infrastructure, and regsvr32 proxy execution created a virtually invisible assault chain that rendered signature-based detection strategies ineffective.

Comply with us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:AsyncRAT, Attack, Delivers, Department, Income, India, Mimic, Phishing, Tax

Post navigation

Previous Post: PickleScan 0-Day Vulnerabilities Enable Arbitrary Code Execution via Malicious PyTorch Models
Next Post: Global Cyber Agencies Issue AI Security Guidance for Critical Infrastructure OT

Related Posts

Chrome High-Severity Vulnerabilities Allows Memory Manipulation and Arbitrary Code Execution Cyber Security News
APT36 Hackers Used Python-Based ELF Malware to Target Indian Government Entities Cyber Security News
Top 10 Best Mobile Application Penetration Testing Companies in 2025 Cyber Security News
Microsoft Releases Windows 11 Cumulative Updates (KB5063878, KB5063875) August 2025 with New Features Cyber Security News
How Adversary-In-The-Middle (AiTM) Attack Bypasses MFA and EDR? Cyber Security News
SafePay Ransomware Claiming Attacks Over 73 Victim Organizations in a Single Month Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark