Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: New SambaSpy Malware Decides Italy’s the Only Place to Party
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: New SambaSpy Malware Decides Italy’s the Only Place to Party
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » New SambaSpy Malware Decides Italy’s the Only Place to Party

Security

New SambaSpy Malware Decides Italy’s the Only Place to Party

Threat actors launch a rare Italy-only malware campaign, with SambaSpy targeting Italian users via elaborate phishing tactics.

Marco Rizal
Last updated: September 19, 2024 5:06 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
New SambaSpy Malware Loves Italian Food
SHARE
  • SambaSpy is a new malware targeting only Italian users through phishing emails.
  • Attackers used real estate company brands to disguise their phishing schemes.
  • SambaSpy includes advanced spying features like keystroke logging and remote desktop control

In May 2024, Kaspersky researchers discovered a cybercrime campaign solely targeting Italy.

While most cybercriminals cast their nets far and wide in search of as many unsuspecting victims as possible, the masterminds behind this campaign, known as SambaSpy, decided to go all in on their Italian fixation.

Why the Italian-only approach? A good question.

It has a two-step infection process that is as Italian as pasta. In the more complex of the two schemes, the victim receives an email from a German address.

image 74
Malware infection chain (Credit: Kaspersky)

Apparently, nothing says “trustworthy” like a German email written in Italian.

Although despite the email's origin, threat actors made it appear to be legitimate, as it resembles a well-known Italian real estate company.

The email tricked the victim into clicking an embedded link to view an invoice, which led them to FattureInCloud, an actual Italian cloud service.

image 75
Fake invoice attached (Credit: Kaspersky)

That is, assuming the target is not in Italy. However, if they are Italian, they are directed to a malicious web server running on ngrok.

SambaSpy's infection chain includes checks to ensure the target is using the Italian language in their browser—whether Edge, Firefox, or Chrome.

If they pass, they're taken to a malicious OneDrive URL and invited to view a supposed “document”.

Clicking on this link installs a malicious JAR file on their system, either a downloader or a dropper, both laced with the SambaSpy payload.

Now, SambaSpy isn't your average malware. This Remote Access Trojan (RAT) is Java-based and highly obfuscated, making it difficult for antivirus software to detect.

It includes file management, webcam control, keystroke logging, and remote desktop management.

If you're Italian and become infected, this RAT can steal your passwords, control your mouse, and view your screen. SambaSpy does it all and isn't shy about it.

image 76
SambaSpy steals browser credentials (Credit: Kaspersky)

The attackers remain anonymous, but the code's Brazilian Portuguese suggests a South American connection.

They've also been seen targeting Spain and Brazil, albeit without the same Italian obsession.

The campaign cleverly uses the brand of an Italian real estate company to make itself appear legitimate, despite the fact that the company is completely uninvolved.

Threat actors also constantly change their obfuscation and phishing tactics, making it difficult to track them down.

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

Chinese Data Breach

Massive Chinese Data Leaked, From Loans, to Real Estate and More

Italys Anti piracy System Took Down Google Drive

Italy’s Anti-piracy System Took Down Google Drive

Hacktivists Shut Down French Government

Hacktivists Shut Down French Government Websites in Protest of Telegram CEO’s Arrest

Casio Suspends Repair Services After Major Cyberattack Disrupts Systems

Casio Suspends Repair Services After Major Cyberattack Disrupts Systems

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?