![]() ![]() Proofpoint has observed over 700 unique domains being used in the English-language campaign alone, which is almost exclusively hitting UK users. The campaigns now encompass the UK, Germany, Hungary, Italy, Poland, and Spain with new recipients, including the U.S., likely to be added. The FluBot threat actors have substantially branched out beyond their initial target of Spain, which originally accounted for the vast majority of infections since the malware’s discovery in late 2020. Proofpoint researchers have reverse engineered samples of FluBot versions 3.7 and 4.0 used with FedEx, DHL, and Correos lures and detail our findings below. ![]() Its latest victims include Android users in the United Kingdom, Germany, Hungary, Italy, Poland, and Spain, based on Proofpoint and opensource information, and it may be on the cusp of spreading among US users. ![]() After a brief dip in activity in early March 2021, which is attributed to arrests made by Spanish authorities, the FluBot Android malware has picked back up, spreading throughout various countries in Europe via its SMS package delivery scheme. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |