Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Spear Phishing Attack Leveraging Argentine Federal Court Rulings to Covert RAT for Remote Access

Posted on January 20, 2026January 21, 2026 By CWS

A classy spear-phishing marketing campaign has emerged concentrating on Argentina’s judicial sector, exploiting belief in authentic courtroom communications to ship a harmful Distant Entry Trojan.

The marketing campaign makes use of authentic-looking federal courtroom paperwork about preventive detention evaluations to trick authorized professionals into downloading malware.

Safety specialists have labeled this assault as extremely focused, using multi-stage an infection methods to achieve long-term entry to delicate authorized and institutional techniques.

The assault begins when recipients obtain emails containing a ZIP archive that seems to be an official judicial discover.

Contained in the archive, attackers have planted a weaponized Home windows shortcut file disguised as a PDF, together with a batch script loader and a legitimate-looking courtroom decision doc.

As soon as the sufferer clicks on what seems to be a regular PDF file, the malicious execution chain prompts whereas concurrently displaying a convincing decoy doc to keep away from suspicion.

This social engineering method makes the assault notably efficient in opposition to judicial personnel who routinely deal with court-related paperwork.

Seqrite analysts recognized this marketing campaign and uncovered its subtle multi-stage supply mechanism.

The analysis staff found that the malware particularly targets Argentina’s authorized sector, together with judicial establishments, authorized professionals, and authorities our bodies related to the justice system.

Decoy (Supply – Seqrite)

The decoy doc mimics genuine Argentine federal courtroom resolutions with exceptional precision, that includes formal authorized Spanish, correct case numbering, judicial signatures, and references to actual establishments just like the Tribunal Oral en lo Legal y Correccional.

This stage of element considerably will increase the marketing campaign’s success price amongst its meant victims.

An infection Mechanism: From Shortcut to RAT Deployment

The assault makes use of a three-stage an infection course of designed to evade detection. The weaponized LNK file launches PowerShell in hidden mode, bypassing execution insurance policies to run a batch script that connects to GitHub-hosted infrastructure.

Malware execution (Supply – Seqrite)

This script downloads a second-stage payload disguised as “msedge_proxy.exe,” saved within the Microsoft Edge consumer information listing to seem authentic.

The ultimate payload is a Rust-based Distant Entry Trojan outfitted with intensive anti-analysis capabilities.

An infection Chain (Supply – Seqrite)

The RAT performs complete surroundings checks earlier than execution, scanning for digital machines, sandboxes, and debugging instruments. If evaluation instruments are detected, the malware instantly terminates to keep away from investigation.

As soon as operational, it establishes encrypted command-and-control communication, providing attackers capabilities together with file exfiltration, persistence set up, credential harvesting, and even ransomware deployment by way of modular DLL parts.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Access, Argentine, Attack, Court, Covert, Federal, Leveraging, Phishing, RAT, Remote, Rulings, Spear

Post navigation

Previous Post: New Study Shows GPT-5.2 Can Reliably Develop Zero-Day Exploits at Scale
Next Post: Scanner Tool to Detect WhisperPair Flaw in Google’s Fast Pair Protocol

Related Posts

D-Link 0-click Vulnerability Allows Remote Attackers to Crash the Server Cyber Security News
Threat Actors Widely Abuse .COM TLD to Host Credential Phishing Website Cyber Security News
SpyCloud Launches Supply Chain Identity Protection Cyber Security News
New APT28 Attack Via Signal Messenger Delivers BeardShell and Covenant Malware Cyber Security News
Windows Remote Assistance Vulnerability Allow Attacker to Bypass Security Features Cyber Security News
Corporate Users 3x More Likely Targeted by Phishing Than Malware – SpyCloud Report Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • aiFWall Emerges from Stealth With an AI Firewall
  • LastPass Users Targeted With Backup-Themed Phishing Emails
  • AI Phishing Is Your Company’s Biggest Security Risk in 2026
  • NVIDIA NSIGHT Graphics for Linux Vulnerability Allows Code Execution Attacks
  • Why Identity Security Must Move Beyond MFA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • aiFWall Emerges from Stealth With an AI Firewall
  • LastPass Users Targeted With Backup-Themed Phishing Emails
  • AI Phishing Is Your Company’s Biggest Security Risk in 2026
  • NVIDIA NSIGHT Graphics for Linux Vulnerability Allows Code Execution Attacks
  • Why Identity Security Must Move Beyond MFA

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark