Threat Advisory

Phishing Campaign Uses Fake SSA Statements to Bypass Defenses

Threat: Phishing Campaign
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: High


EXECUTIVE SUMMARY:

A phishing campaign has been identified that leverages the guise of official Social Security Administration (SSA) communications to deceive victims. Over 2,000 individuals were targeted through a convincing email lure that mimicked legitimate SSA correspondence. Recipients were directed to a phishing site crafted to resemble an official government portal, increasing the likelihood of user interaction. The objective of the campaign was to trick users into downloading and executing a malicious file under the pretense of accessing their Social Security statement.

The phishing webpage prompted users to click on an ‘Access The Statement’ button, which redirected them to a follow-up page with instructions to download a malicious file. This malware is a .NET application loader that, once executed, extracts and runs a .NET application embedded within its resources. The loader performs two main tasks: first, it runs a .NET resolver that loads several auxiliary files located in a ‘FILES’ folder, required for launching ScreenConnect software. After loading these dependencies, the loader executes the ‘ENTRYPOINT’ backdoor component. This backdoor contains an embedded command-and-control (C2) address and silently establishes a remote connection to the attacker’s server via ScreenConnect, enabling ongoing unauthorized access.

This campaign demonstrates the ongoing trend of using highly credible phishing themes combined with trusted hosting platforms to deploy malware loaders. The use of .NET loaders embedding remote access tools such as ScreenConnect highlights the attackers’ capability to maintain persistent and stealthy access to victim systems. Organizations and individuals should remain vigilant against phishing attempts disguised as official government communications and implement robust defenses to detect and block such threats.

 

EXECUTIVE SUMMARY

 

A phishing campaign has been identified that leverages the guise of official Social Security Administration (SSA) communications to deceive victims. Over 2,000 individuals were targeted through a convincing email lure that mimicked legitimate SSA correspondence. Recipients were directed to a phishing site crafted to resemble an official government portal, increasing the likelihood of user interaction. The objective of the campaign was to trick users into downloading and executing a malicious file under the pretense of accessing their Social Security statement.

The phishing webpage prompted users to click on an ‘Access The Statement’ button, which redirected them to a follow-up page with instructions to download a malicious file. This malware is a .NET application loader that, once executed, extracts and runs a .NET application embedded within its resources. The loader performs two main tasks: first, it runs a .NET resolver that loads several auxiliary files located in a ‘FILES’ folder, required for launching ScreenConnect software. After loading these dependencies, the loader executes the ‘ENTRYPOINT’ backdoor component. This backdoor contains an embedded command-and-control (C2) address and silently establishes a remote connection to the attacker’s server via ScreenConnect, enabling ongoing unauthorized access.

This campaign demonstrates the ongoing trend of using highly credible phishing themes combined with trusted hosting platforms to deploy malware loaders. The use of .NET loaders embedding remote access tools such as ScreenConnect highlights the attackers’ capability to maintain persistent and stealthy access to victim systems. Organizations and individuals should remain vigilant against phishing attempts disguised as official government communications and implement robust defenses to detect and block such threats.

THREAT PROFILE:

Tactic Technique Id Technique Sub-technique
Initial Access T1566.002 Phishing Spearphishing Link
Execution T1204.002 User Execution Malicious File
Persistence T1053.005 Scheduled Task/Job Scheduled Task
Discovery T1082 System Information Discovery -
Collection T1113 Screen Capture -
Command and Control T1071.001 Application Layer Protocol Web Protocols

 

REFERENCES:

The following reports contain further technical details:

crossmenu