Zscaler, creator of the Zero Trust Exchange platform, is keeping close watch on a new advanced persistent threat (APT) actor known as Evilnum.
Since the start of 2022, Zscaler’s ThreatLabz research team identified several instances of Evilnum’s low-volume targeted attack campaigns launched against its customers in the UK and Europe.
Microsoft Office the Preferred Target
Evilnum targeted Windows Shortcut files (LNK) sent inside malicious archive files (ZIP) as attachments in spear phishing emails during earlier campaigns observed in 2021, Zscaler reports. Now, the threat actor is infecting MS Office documents by way of document template injection to deliver its malicious payload to victims’ machines.
ThreatLabz has identified several domains associated with Evilnum, having flown under the radar and staying undetected for an extended period, according to Zscaler.