A new campaign has been discovered which is leveraging Excel files encrypted using the default password “VelvetSweatshop” to infect machines with LimeRAT. The technique of setting an Excel file to “read-only” using the default password to encrypt an Excel file was frequently used to disguise malicious files between 2012 and 2015 but had not been observed recently until this campaign. Using the default password allows an encrypted file to be opened automatically, without the recipient having to type in a password. LimeRAT is a Remote Access Trojan (RAT) that is designed to exploit Windows machines. LimeRAT is capable of installing backdoors, encrypting files, adding infected machines to botnets, stealing data, and installing crypto-miners. The RAT is also able to spread through connected USB drives, and uninstall itself when it detects a virtual machine.
12 Essentials for a Successful SOC Partnership
As cyber threats continue to impact businesses of all sizes, the need for round-the-clock security