BI.ZONE discovers new phishing campaign distributing White Snake stealer to Russian companies
Criminals send an archive with several files to corporate email addresses. The first document contains the allegedly official notification from the state authority. It reads that selective activity monitoring has revealed visits to prohibited internet resources (i.e., the recipient of the letter has violated Law No. FZ‑255 “On the control of activities of persons which are under foreign influence”).
In the same notification, the attackers demand to immediately check the attached materials and give an explanation within two working days. Otherwise, they threaten to involve administrative and law enforcement measures. This way, the victim is prompted to quickly open the second file, which is the White Snake stealer.
The White Snake malware is actively advertised on dark forums as a tool for targeted attacks. It allows attackers to retrieve stored passwords, copy files, record keystrokes, microphone, webcam, and gain remote access to compromised devices and corporate systems. As criminals tend to resell the collected information over time, it may take a while before companies size up the total damage done.
Threat actors can also use White Snake to download and run any malicious tool on the side. A monthly subscription to the stealer is just $140 while unlimited access is available for $1,950.
Phishing emails are one of the main ways to gain initial access in a targeted attack. To protect against this threat, we recommend using specialized solutions that block spam and malicious emails. One such solution is BI.ZONE CESP. If your company has already suffered a cyberattack, our team of experts can help you quickly respond to the incident and investigate it.
We cover the attack in more detail in the article.