Hackers Use Employee Reports to Spread Guloader Malware via Phishing Emails

Cybercriminals Exploit Employee Performance Reports to Deploy Guloader Malware

In a concerning development, cybercriminals are leveraging employee performance reports as a vector to distribute the Guloader malware, posing significant risks to organizational security. This sophisticated attack exploits the trust inherent in workplace communications, making it imperative for organizations to enhance their cybersecurity measures.

The Attack Mechanism

The attack initiates with a phishing email that appears to be an official communication regarding employee performance evaluations. The email typically carries a subject line such as October 2025 Employee Performance Report and includes an attachment purportedly containing detailed performance assessments. To heighten urgency and prompt immediate action, the email may suggest potential consequences like employee dismissals, thereby increasing the likelihood of the recipient opening the attachment.

Upon opening the attachment, which is a RAR compressed archive, the recipient finds an NSIS (Nullsoft Scriptable Install System) executable file disguised as a PDF document, named staff record pdf.exe. If the operating system is configured to hide file extensions—a common default setting—the file appears as a standard PDF, further deceiving the user.

Infection Process

Executing the disguised file triggers a multi-stage infection process:

1. Download of Encrypted Shellcode: The malware connects to a remote server to download encrypted shellcode from a Google Drive URL.

2. Memory Injection: The downloaded shellcode is injected directly into the system’s memory, allowing the malware to operate without creating files on the disk. This fileless execution method helps evade detection by traditional antivirus programs.

3. Deployment of Remcos RAT: The final payload is the Remcos Remote Access Trojan (RAT), which grants attackers extensive control over the infected system.

Capabilities of Remcos RAT

Once installed, Remcos RAT enables cybercriminals to:

– Keylogging: Record all keystrokes made by the user, capturing sensitive information such as passwords and confidential communications.

– Screen Capture: Take screenshots of the user’s activities, potentially exposing private data.

– Control of Peripherals: Access and control the system’s webcam and microphone, leading to unauthorized surveillance.

– Data Extraction: Retrieve browser histories and stored passwords, compromising personal and organizational security.

The malware establishes a persistent connection with command and control servers located at 196.251.116[.]219 on ports 2404 and 5000, facilitating ongoing unauthorized access.

Preventive Measures

To mitigate the risks associated with this type of attack, organizations should implement the following measures:

– Email Filtering: Deploy advanced email filtering solutions to detect and block phishing emails containing suspicious attachments.

– User Awareness Training: Educate employees about the dangers of phishing attacks and the importance of verifying the authenticity of unexpected emails, especially those requesting the opening of attachments.

– Disable Hidden File Extensions: Configure systems to display full file extensions, helping users identify potentially malicious files masquerading as legitimate documents.

– Endpoint Detection and Response (EDR): Utilize EDR solutions capable of identifying and mitigating threats that employ fileless execution techniques.

By adopting these strategies, organizations can enhance their defenses against sophisticated phishing campaigns and protect their systems from malware like Guloader.