Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Malware Targets Argentine Courts with Fake Documents

Malware Targets Argentine Courts with Fake Documents

Posted on March 18, 2026 By CWS

A recent cyber attack is exploiting Argentina’s judicial sector by using counterfeit court documents to distribute a dangerous malware. Legal professionals are being deceived into installing this harmful software, which is part of a campaign known as Operation Covert Access.

The attackers are utilizing spear-phishing emails that closely resemble authentic court communications. These emails distribute a Rust-based Remote Access Trojan, COVERT RAT, which grants attackers persistent access to compromised systems.

Targeting the Legal Landscape

The campaign specifically targets Argentina’s legal framework, impacting federal courts, law firms, government justice departments, academic bodies, and advocacy groups. By focusing on genuine court rulings related to preventive detention, the attackers exploit the inherent trust in legal documents, making the campaign exceptionally effective.

Point Wild analysts, expanding on research by Seqrite, have examined the operation in detail. They outlined the PowerShell execution flow and payload retrieval methods, highlighting the sophisticated, multi-layered approach aimed at remaining undetected within institutional networks.

Advanced Threat Capabilities

Beyond simple data surveillance, COVERT RAT connects to a command-and-control server at 181.231.253.69:4444. This connectivity allows attackers to execute various malicious activities, such as file theft and ransomware deployment.

The malware’s modular structure facilitates credential harvesting, privilege escalation, and encrypted file operations. Its ability to erase all traces post-operation complicates forensic investigations, adding to the threat’s severity.

Complex Delivery and Execution

Attackers employ a layered delivery system, starting with a phishing email that includes a ZIP file with a Windows shortcut, a batch loader script, and a fake judicial PDF. When executed, the malicious script operates in the background while the decoy PDF appears genuine.

Upon opening the shortcut, PowerShell is triggered in a concealed mode, launching a batch script that downloads the RAT from a GitHub repository. This use of GitHub enhances the attack’s perceived legitimacy, as traffic to the platform often bypasses security alerts.

Security measures are essential for legal and judicial professionals. Keeping antivirus software updated, avoiding suspicious email attachments, and monitoring system processes are critical steps to mitigate such threats.

Stay informed by following us on social media platforms like Google News, LinkedIn, and X for more updates.

Cyber Security News Tags:Argentina, COVERT RAT, cyber attack, Cybersecurity, fake documents, judicial system, legal sector, Malware, Phishing, remote access trojan

Post navigation

Previous Post: Boggy Serpens Intensifies Cyberattacks on Global Targets
Next Post: WhatsApp View Once Bypass Found, Meta Won’t Fix

Related Posts

Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character Cyber Security News
Pyronut Package Exploits Telegram Bots via Hidden Backdoor Pyronut Package Exploits Telegram Bots via Hidden Backdoor Cyber Security News
Ericsson USA Reveals Third-Party Data Breach Ericsson USA Reveals Third-Party Data Breach Cyber Security News
A Milestone Powering Crypto’s Global Reach A Milestone Powering Crypto’s Global Reach Cyber Security News
Major Data Breach at India’s Leading Pharmacy Chain Major Data Breach at India’s Leading Pharmacy Chain Cyber Security News
Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges Microsoft Brokering File System Vulnerability Let Attackers Escalate Privileges Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing
  • AiTM Phishing Attacks Target SaaS Platforms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing
  • AiTM Phishing Attacks Target SaaS Platforms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark