Hackers use fake NDAs to deliver malware to US manufacturers
黑客利用美国工业和科技公司的联系表单发送伪装成保密协议的恶意软件ZIP文件进行攻击。这些攻击持续数周,并针对多个行业的公司。恶意软件可能根据受害者信息选择性上传。攻击者使用真实注册企业的域名创建虚假网站,并与俄罗斯网络犯罪有关联。 2025-8-27 16:15:49 Author: therecord.media(查看原文) 阅读量:12 收藏

Hackers are targeting American industrial and tech firms by abusing their “Contact Us” forms to deliver malware disguised as non-disclosure agreement files, researchers said.

Unlike traditional phishing campaigns where attackers send malicious emails, the hackers behind these attacks first contacted victims through companies’ website forms, making the exchanges appear more credible, according to cybersecurity firm Check Point.

The hackers maintain the conversation for up to two weeks, posing as potential business partners and asking victims to sign non-disclosure agreements. Eventually, they send a contract in a ZIP archive hosted on Heroku, a legitimate cloud platform, which contains custom malware dubbed MixShell.

“The long-term engagement with the victim suggests that the attacker is willing to invest time … possibly tailoring their efforts based on perceived value or ease of compromise,” researchers said in a report on Tuesday.

Most of the victims are U.S. companies, including industrial manufacturers like machinery, metalwork and component producers. The campaign has also gone after firms in hardware, semiconductors, biotech, pharmaceuticals, aerospace, energy, and consumer goods. Some companies in Singapore, Japan, and Switzerland have been targeted as well.

Check Point said not all ZIP archives were malicious, with some containing harmless documents, suggesting the real malware may have been selectively uploaded from the Heroku site depending on a victim’s IP address, browser or other details.

To make the campaign more credible, the attackers used domains tied to real U.S.-registered businesses, some dating back to 2015. In reality, the websites were fake and all copied from the same template, with 'About Us' pages showing a stock photo of White House butlers presented as company founders. By using long-established domains, researchers said, the attackers were able to slip past security filters.

Check Point has not attributed the campaign to a specific threat actor but found that one of the servers used in the operation overlapped with infrastructure tied to a little-known cluster called UNK_GreenSec, which has previously shown links to Russia-aligned cybercriminals. The firm suggests the operation may be financially motivated.

Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

Recorded Future

No previous article

No new articles

Daryna Antoniuk

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.


文章来源: https://therecord.media/hackers-fake-ndas-malware
如有侵权请联系:admin#unsafe.sh