Cybercriminals have targeted thousands of individuals across the U.S. by exploiting one of the most trusted government agencies: the Social Security Administration (SSA).
Security analysts at CyberArmor have recently tracked a sophisticated malware campaign that impersonated official SSA correspondence, resulting in more than 2,000 victims inadvertently downloading and executing malicious software.
The attack’s technical sophistication and use of reputable brand hosting highlight the growing threat posed by well-crafted phishing campaigns.
The campaign began with a barrage of phishing emails designed to appear as authentic SSA communications. Recipients were prompted with urgent language to review their Social Security statements.
Embedded within these emails was a link directing users to a phishing page hosted on Amazon Web Services (AWS), a choice likely intended to instill trust by leveraging the widely recognized and trusted Amazon brand.
The malicious URL, “hxxps://odertaoa[.]s3.us-east-1.amazonaws.com/ssa/US/index.html,” appeared legitimate at a glance, further increasing the likelihood of successful compromise.
Upon clicking the “Access The Statement” button on the phishing page, users were redirected to a second page that provided instructions for downloading a file purportedly containing their statement.
The download, however, contained a malicious executable named US_SocialStatmet_ID544124.exe, equipped with the following digital fingerprints:
Once executed, the malware functioned as a .NET loader, embedding and launching a secondary .NET application.
The loader specifically retrieved and ran components from a “FILES” folder, which are critical dependencies for installing ScreenConnect, a legitimate remote access tool often abused by attackers.
After dependencies were successfully loaded, the malware executed the “ENTRYPOINT” file, which acted as the backdoor to the compromised system.
Central to the malware’s operation was its configuration file, which contained a command-and-control (C2) endpoint: “secure.ratoscbom.com:8041.”
This allowed the perpetrators to establish covert remote access, potentially exfiltrating sensitive data or further compromising infected devices.
Scope and Recommendations
According to CyberArmor’s telemetry, over 2,000 individuals interacted with the phishing lure, with a significant portion successfully installing the malware.
The attack’s particular focus on trustworthy brand names and government agencies suggests a deliberate strategy to maximize infection rates.
By remaining vigilant and implementing robust security measures, organizations, particularly those in the finance and healthcare sectors, can better protect themselves against these increasingly sophisticated cyber threats.
CyberArmor continues to monitor the campaign and urges all users to remain cautious when interacting with unexpected official-looking communications.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…