Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Windows Users Hit by New Malware Disguised as Purchase Orders
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Windows Users Hit by New Malware Disguised as Purchase Orders
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

Security » Windows Users Hit by New Malware Disguised as Purchase Orders

Security

Windows Users Hit by New Malware Disguised as Purchase Orders

New Python-based infostealer has been targeting Microsoft Windows users through phishing emails disguised as purchase orders and invoices.

Marco Rizal
Last updated: September 4, 2024 9:28 am
By Marco Rizal - Editor, Journalist 5 Min Read
Share
Windows Users Hit by New Malware Disguised as Purchase Orders
SHARE

FortiGuard Labs discovered new developments in an ongoing phishing campaign targeting Microsoft Windows users via emails that appear to be legitimate business communications in August 2024.

The emails contain fake purchase orders and invoices, but they also contain a dangerous threat: Emansrepo, a Python-based infostealer.

Once downloaded, Emansrepo silently collects sensitive information from the victim's browsers, including login credentials, credit card information, and autofill data.

It also searches specific directories, such as Desktop and Documents, for files before compressing the data into a zip file and sending it to the attacker's email address.

This stolen information can be used to launch future attacks, increasing the campaign's severity.

According to FortiGuard Labs, this cyberattack has been ongoing for nearly a year, evolving to include more complex attack chains.

Early versions of the attack flow, discovered in November 2023, were relatively simple: a single download link for the malware embedded in an HTML file. However, as time passed, the attacks became increasingly sophisticated.

image 7
Attack flow November 2023 (Credit: FortiGuard Labs)

The campaign begins with a phishing email that includes an HTML file. This file directs the victim to a download link for Emansrepo, which is packaged with PyInstaller and can run without Python installed on the victim's computer.

By July and August 2024, the attack flow had become more complex, with multiple steps and layers of deception added to avoid detection.

In some cases, attackers used multiple email addresses to receive stolen data, making it harder to track down.

image 8
Attack flow July & August 2024 (Credit: FortiGuard Labs)

Phishing emails also evolved, frequently including fake download pages or links to files disguised as purchase orders or invoices.

When these links were clicked, malicious files were downloaded, triggering a chain of events that resulted in Emansrepo being installed on the victim's system.

One example of the attack flow is an AutoIt-compiled executable embedded in a 7z file.

This executable downloads a zip archive to the Temp folder that contains Python modules as well as the malicious Emansrepo script.

In another chain, a PowerShell script is used to run the infostealer, demonstrating how attackers are constantly changing their tactics to avoid detection.

What Emansrepo Steals

Emansrepo is capable of stealing a wide variety of data. Its behavior is divided into three major parts.

Part one focuses on stealing browser data. This includes saved passwords, credit card information, browsing and download histories, and autofill data from popular browsers such as Chrome, Microsoft Edge, Brave, and Vivaldi.

It also collects text files from the Desktop, Documents, and Downloads folders.

Part 2 broadens its scope by stealing PDF files, browser extensions, cryptocurrency wallet information, and data from gaming platforms such as Steam and Riot Games.

This information is compressed into zip files and transmitted to the attacker.

Part 3 focuses on collecting cookies from browsers, which are then zipped and sent to the attacker's email.

The data collected by Emansrepo is temporarily stored in folders on the victim's machine before being sent to various attacker-controlled email addresses.

Once the data is transmitted, these temporary folders are deleted to cover the malware's tracks.

In addition, FortiGuard Labs recently discovered another campaign, most likely linked to the same attackers, but this time using a different piece of malware called Remcos.

image 10
Remcos email on the left (Credit: FortiGuard Labs)

Like the Emansrepo campaign, this attack begins with phishing emails. Instead of deploying a Python infostealer, the attachments in these emails contain a DBatLoader that downloads and decrypts a secure version of the Remcos malware.

Remcos is then used to gain control of the victim's machine, which may lead to more serious attacks.

Emansrepo has been active since at least November 2023, and the attackers are constantly improving their tactics.

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

No Speed Tests Allowed Russia Proposes to Ban Ookla

No Speed Tests Allowed: Russia Proposes to Ban Ookla

Deepfakes Hacks and Leaks Threaten to Disrupt 2024 US Election

Deepfakes, Hacks, and Leaks Threaten to Disrupt 2024 US Election

Dual Purpose Luxy Malware Steals Data and Locks Your Files

Dual-Purpose Luxy Malware Steals Data and Locks Your Files

GrimResource Malware Hits Chinese Government and Business Computers

GrimResource Malware Hits Chinese Government and Business Computers

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?