{"id":7552,"date":"2022-03-08T11:21:03","date_gmt":"2022-03-08T19:21:03","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=7552"},"modified":"2024-04-26T13:20:07","modified_gmt":"2024-04-26T20:20:07","slug":"ukraine-war-malspam-delivers-remcos","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/","title":{"rendered":"\u201cUkraine war\u201d Malspam Delivers Remcos"},"content":{"rendered":"<h3><strong>Author: Nick Sundvall<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<h3>1. Overview<\/h3>\n<p>On 2 and 3 March, Infoblox observed a malspam campaign that used messages related to Russia\u2019s invasion of Ukraine. This malspam campaign was attempting to lure users into opening an attached .xlsx file that downloads the Remcos remote access trojan (RAT). Infoblox has previously reported on malspam campaigns distributing Remcos.<sup>1,2<\/sup><\/p>\n<p>We observed multiple Ukraine-related malspam campaigns within the first week after the invasion. Some of them distribute donation or cryptocurrency scams; others distribute malware, such as Remcos.<\/p>\n<h3>2. Customer impact<\/h3>\n<p>A German company called Breaking Security has been offering Remcos since 2016.<sup>3<\/sup> One of the versions offered is free and has a limited number of features, and the other version is paid and starts at 58 Euros. Although Remcos is marketed as a legitimate remote administration tool, it is frequently abused by threat actors and used for malicious purposes.<br \/>\nBreaking Security actively maintains and updates Remcos, with the latest update released on 10 February. The capabilities of Remcos include remotely controlling infected computers, logging keystrokes, and taking screenshots.<\/p>\n<h3>3. Campaign analysis<\/h3>\n<p>In this campaign, the threat actor(s) send messages with a variety of different subjects, including Re: Ukraine war || Order SUCT220002. The body section is always empty. The attached file is named SUCT220002.xlsx.<\/p>\n<h3>4. Attack chain<\/h3>\n<p>When a user opens the attachment, the file exploits a vulnerability in Microsoft Office\u2019s Equation Editor, CVE-2017-11882. The exploit downloads and runs an executable, Oqifkf.exe, from http:\/\/136[.]144[.]41[.]109\/HRC.exe. This executable then downloads and executes the final payload, remcos.exe, from http:\/\/136[.]144[.]41[.]109\/file\/Oqifkf.png. From here, Remcos reaches out to newremc22.ddns[.]net, a legitimate Dynamic DNS (DDNS) service, to get the IP address of the command and control (C&amp;C) server, 212[.]192[.]246[.]175.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7543\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-blog-ukraine-remcos-attack-chain.jpg\" alt=\"\" width=\"540\" height=\"782\" \/><\/p>\n<h3>5. Vulnerabilities and mitigation<\/h3>\n<p>Infoblox strongly recommends that businesses consider the following security measures:<\/p>\n<ul>\n<li>To block known vulnerabilities that could be targeted by threat actors, keep computers and all endpoints up to date with the latest security patches. A patch for the CVE exploited in this attack was released in 2017.<\/li>\n<li>Always be suspicious of vague or empty emails, especially those with prompts to open attachments or click links.<\/li>\n<li>Scan downloaded files with antivirus software.<\/li>\n<\/ul>\n<p><strong>Endnotes<\/strong><\/p>\n<ol>\n<li><strong><a href=\"\/cyber-threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/\">https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-campaign-briefs\/remcosrat-malspam-campaign-spoofs-uae-machinery-company-correspondence\/<\/a><\/strong><\/li>\n<li><a href=\"\/cyber-threat-intelligence\/cyber-campaign-briefs\/guloader-delivers-remcos-rat\/\">https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-campaign-briefs\/guloader-delivers-remcos-rat\/<\/a><\/li>\n<li><a href=\"https:\/\/any.run\/malware-trends\/remcos\" target=\"_blank\" rel=\"noopener\">https:\/\/any.run\/malware-trends\/remcos<\/a><\/li>\n<\/ol>\n<h3>Appendix (downloadable list <a href=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/ukraine-war-malspam-delivers-remcos.csv\" target=\"_blank\" rel=\"noopener\">here<\/a>)<\/h3>\n<table width=\"665\">\n<tbody>\n<tr>\n<td width=\"543\"><strong>Representative Indicators of Compromise<\/strong><\/td>\n<td width=\"122\"><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"543\">Re: Ukraine war || Order SUCT220002<\/p>\n<p>Re: Outstanding payment<\/p>\n<p>OCEAN PILGRIM-PORT CHARGE PAYMENT ADVICE<\/p>\n<p>Blocked Transaction &#8211; SWIFT Message Ref: 2092022<\/td>\n<td width=\"122\">Email subject<\/td>\n<\/tr>\n<tr>\n<td width=\"543\">SUCT220002.xlsx<\/td>\n<td width=\"122\">File attachment name<\/td>\n<\/tr>\n<tr>\n<td width=\"543\">4907309437e12932d437f8c3ae03fbfde7d4e196b6f1dc7f2d98e3a388ce585c<\/p>\n<p>32b2815cdaadfdd47448673d44b03d480939162234234bf09e74aa8ab936755c<\/td>\n<td width=\"122\">File attachment SHA256<\/td>\n<\/tr>\n<tr>\n<td width=\"543\">http:\/\/136[.]144[.]41[.]109\/HRC.exe<\/p>\n<p>http:\/\/136[.]144[.]41[.]109\/file\/Oqifkf.png<\/td>\n<td width=\"122\">Remcos download URL<\/td>\n<\/tr>\n<tr>\n<td width=\"543\">Oqifkf.exe<\/p>\n<p>remcos.exe<\/td>\n<td width=\"122\">Remcos file name<\/td>\n<\/tr>\n<tr>\n<td width=\"543\">537288ba6b141a9e76bbd1f77348494c4b3b82bb0c1f0c08afeeb544ccea85e8<\/p>\n<p>706f40859cd3de0725c0c1795e98277d54bbc37ff90fc1e251e2eb99d0e713f0<\/td>\n<td width=\"122\">Remcos file SHA256<\/td>\n<\/tr>\n<tr>\n<td width=\"543\">newremc22.ddns[.]net<\/td>\n<td width=\"122\">DDNS domain<\/td>\n<\/tr>\n<tr>\n<td width=\"543\">212[.]192[.]246[.]175<\/td>\n<td width=\"122\">C&amp;C server IP<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Author: Nick Sundvall &nbsp; 1. Overview On 2 and 3 March, Infoblox observed a malspam campaign that used messages related to Russia\u2019s invasion of Ukraine. This malspam campaign was attempting to lure users into opening an attached .xlsx file that downloads the Remcos remote access trojan (RAT). Infoblox has previously reported on malspam campaigns distributing [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":6727,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[553],"tags":[479,657,488,294,40],"class_list":{"0":"post-7552","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-campaign-briefs","8":"tag-cyber-security","9":"tag-cyber-threat-intelligence","10":"tag-cyberthreat-intelligence-report","11":"tag-malspam","12":"tag-threat-intelligence","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Malspam Campaign Related To Russian Invasion Downloading Remcos Rat | Infoblox<\/title>\n<meta name=\"description\" content=\"Among the Ukraine related malspam campaigns that are occurring are some distributing the remote access trojan know as Remcos. Learn what to look for here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u201cUkraine war\u201d Malspam Delivers Remcos\" \/>\n<meta property=\"og:description\" content=\"Among the Ukraine related malspam campaigns that are occurring are some distributing the remote access trojan know as Remcos. Learn what to look for here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-08T19:21:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:20:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"343\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/ukraine-war-malspam-delivers-remcos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/ukraine-war-malspam-delivers-remcos\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"\u201cUkraine war\u201d Malspam Delivers Remcos\",\"datePublished\":\"2022-03-08T19:21:03+00:00\",\"dateModified\":\"2024-04-26T20:20:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/ukraine-war-malspam-delivers-remcos\\\/\"},\"wordCount\":508,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/ukraine-war-malspam-delivers-remcos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-21.jpg\",\"keywords\":[\"Cyber security\",\"Cyber Threat Intelligence\",\"Cyberthreat intelligence report\",\"Malspam\",\"Threat Intelligence\"],\"articleSection\":[\"Cyber Campaign Briefs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/ukraine-war-malspam-delivers-remcos\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/ukraine-war-malspam-delivers-remcos\\\/\",\"name\":\"Malspam Campaign Related To Russian Invasion Downloading Remcos Rat | Infoblox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/ukraine-war-malspam-delivers-remcos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/ukraine-war-malspam-delivers-remcos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-21.jpg\",\"datePublished\":\"2022-03-08T19:21:03+00:00\",\"dateModified\":\"2024-04-26T20:20:07+00:00\",\"description\":\"Among the Ukraine related malspam campaigns that are occurring are some distributing the remote access trojan know as Remcos. Learn what to look for here.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/ukraine-war-malspam-delivers-remcos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/ukraine-war-malspam-delivers-remcos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/ukraine-war-malspam-delivers-remcos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-21.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-21.jpg\",\"width\":612,\"height\":343,\"caption\":\"Cyber crime abstract concept. 3D shape and contour of skull icon on digital background. Computer attack and digital pirate symbol animation.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/ukraine-war-malspam-delivers-remcos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Campaign Briefs\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/cyber-campaign-briefs\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"\u201cUkraine war\u201d Malspam Delivers Remcos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Malspam Campaign Related To Russian Invasion Downloading Remcos Rat | Infoblox","description":"Among the Ukraine related malspam campaigns that are occurring are some distributing the remote access trojan know as Remcos. Learn what to look for here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/","og_locale":"en_US","og_type":"article","og_title":"\u201cUkraine war\u201d Malspam Delivers Remcos","og_description":"Among the Ukraine related malspam campaigns that are occurring are some distributing the remote access trojan know as Remcos. Learn what to look for here.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/","og_site_name":"Infoblox Blog","article_published_time":"2022-03-08T19:21:03+00:00","article_modified_time":"2024-04-26T20:20:07+00:00","og_image":[{"width":612,"height":343,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"\u201cUkraine war\u201d Malspam Delivers Remcos","datePublished":"2022-03-08T19:21:03+00:00","dateModified":"2024-04-26T20:20:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/"},"wordCount":508,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg","keywords":["Cyber security","Cyber Threat Intelligence","Cyberthreat intelligence report","Malspam","Threat Intelligence"],"articleSection":["Cyber Campaign Briefs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/","name":"Malspam Campaign Related To Russian Invasion Downloading Remcos Rat | Infoblox","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg","datePublished":"2022-03-08T19:21:03+00:00","dateModified":"2024-04-26T20:20:07+00:00","description":"Among the Ukraine related malspam campaigns that are occurring are some distributing the remote access trojan know as Remcos. Learn what to look for here.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-21.jpg","width":612,"height":343,"caption":"Cyber crime abstract concept. 3D shape and contour of skull icon on digital background. Computer attack and digital pirate symbol animation."},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-campaign-briefs\/ukraine-war-malspam-delivers-remcos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Campaign Briefs","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/cyber-campaign-briefs\/"},{"@type":"ListItem","position":4,"name":"\u201cUkraine war\u201d Malspam Delivers Remcos"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=7552"}],"version-history":[{"count":6,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7552\/revisions"}],"predecessor-version":[{"id":7561,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/7552\/revisions\/7561"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6727"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=7552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=7552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=7552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}