Hackers Use Animated Lures and Fake Legal Warnings to Spread Malware

HP Report: Cybercriminals Evolve Social Engineering with Animated Lures and Abuse of Trusted Platforms like Discord

HIGH
December 11, 2025
4m read
PhishingMalwareThreat Intelligence

Related Entities

Organizations

Products & Tech

ScreenConnect

Other

PureRATPhantom StealerDiscord

Full Report

Executive Summary

The latest Threat Insights Report from HP Inc., analyzing data from Q3 2025, highlights a clear trend towards more sophisticated and evasive social engineering tactics. Attackers are moving beyond simple fake invoices and are now employing professionally designed animations, abusing trusted services like Discord, and crafting elaborate multi-stage attacks to bypass both technical defenses and user suspicion. These campaigns are increasingly focused on deploying information stealers, with session cookie hijacking emerging as a primary goal. The findings underscore the need for defense-in-depth security and continuous user education.


Threat Overview

The report details several novel campaigns that demonstrate this increase in sophistication:

  1. Animated Legal Threat Campaign: Attackers impersonated the Colombian Prosecutor's Office, sending emails with fake legal warnings. The link led to a fraudulent website featuring a slick, auto-scrolling animation that guided the victim to download a password-protected archive. This archive contained the PureRAT malware, which was installed using a DLL sideloading technique. The campaign was highly evasive, with a very low detection rate by traditional antivirus tools.

  2. Abuse of Discord for Malware Hosting: Another campaign used Discord's Content Delivery Network (CDN) to host the Phantom Stealer malware. By hosting the payload on a trusted platform, attackers can often bypass network filtering rules. This specific attack chain was also able to bypass the Memory Integrity protection feature in Windows 11.

  3. Fake PDF Reader Update: A classic tactic with a modern twist involved a malicious PDF that redirected users to a website masquerading as an Adobe update page. Instead of an update, the download installed a modified version of the ScreenConnect remote access tool, giving attackers persistent access to the victim's machine.

Technical Analysis

The campaigns leverage a combination of techniques to achieve their goals:

  • Social Engineering: The core of the attacks relies on creating a sense of urgency, authority, or legitimacy. The use of animations and impersonation of government entities (T1566 - Phishing) makes the lures more convincing.
  • Defense Evasion: Attackers use several methods to evade security controls:
    • Password-protected archives: To prevent automated scanning by email gateways.
    • DLL Side-Loading (T1574.002): Loading a malicious DLL by a legitimate, signed executable to bypass application whitelisting.
    • Abuse of Trusted Platforms (T1105 - Ingress Tool Transfer): Using services like Discord's CDN to host malware, making the traffic appear benign.
  • Credential Access: The report highlights that 57% of top malware families were information stealers with capabilities for Session Cookie Hijacking (T1539). This allows attackers to bypass MFA by stealing an active session cookie and impersonating the user.

Impact Assessment

The increasing sophistication of these attacks means that even security-aware users can be tricked. A successful compromise can lead to the installation of Remote Access Trojans (RATs) like PureRAT, giving attackers full control of the system. The rise of information stealers like Phantom Stealer puts sensitive data at immediate risk, including passwords, financial information, and session cookies for corporate applications. The theft of session cookies is particularly dangerous as it can grant access to secure enterprise environments without needing to crack passwords or bypass MFA prompts.

IOCs

No specific IOCs were provided in the summary reports.

Detection & Response

Detecting these advanced threats requires looking beyond simple indicators.

  1. Monitor Network Egress: Pay close attention to traffic to services like Discord's CDN (cdn.discordapp.com) from non-standard applications or servers. This can be achieved with D3FEND Outbound Traffic Filtering.
  2. Process Chain Analysis: Use an EDR to monitor for suspicious process execution chains, such as a browser or email client leading to the execution of a script that downloads a payload from an unusual source. This is a form of D3FEND Process Analysis.
  3. File Analysis: Isolate and analyze password-protected archives downloaded from the web or received via email. Use sandboxing to safely detonate potential threats. This aligns with D3FEND Dynamic Analysis.

Mitigation

A multi-layered defense is essential to counter these evolving threats.

  1. Email Security Gateways: While the report notes that 11% of threats bypassed at least one gateway, they remain a critical first line of defense. Ensure they are configured to block or quarantine suspicious attachment types, including archives.
  2. User Training: Continuously train users to be skeptical of unsolicited communications, even those that appear highly professional or come from seemingly trusted sources. Emphasize verifying requests through separate communication channels.
  3. Endpoint Hardening: Configure endpoint security to block macros, restrict scripting languages, and use application control to prevent the execution of unauthorized software.
  4. Browser Isolation: Consider using remote browser isolation (RBI) technology to render web content in a secure, remote container, preventing malicious code from ever reaching the endpoint.

Timeline of Events

1
December 11, 2025
This article was published

MITRE ATT&CK Mitigations

Train users to identify and report sophisticated social engineering attempts, including those that impersonate authority or use professional-looking lures.

Use network filtering to block or alert on connections to known malicious domains and monitor traffic to trusted platforms like Discord from unusual sources.

Mapped D3FEND Techniques:

Use browser isolation or sandboxing to analyze downloaded files and web content in a contained environment, preventing malware from reaching the endpoint.

Mapped D3FEND Techniques:

Deploy an EDR solution capable of detecting malicious behaviors like DLL sideloading and session cookie theft, rather than relying solely on file signatures.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Social EngineeringPhishingPureRATPhantom StealerInfoStealerHPThreat Intelligence

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading