A new phishing campaign has been identified that leverages social engineering and the abuse of a legitimate remote access tool to compromise businesses. Attackers are sending emails that impersonate the shipping company DHL to lure victims into installing a malicious, pre-configured version of the SimpleHelp remote support software. The attack provides threat actors with a persistent backdoor into the victim's network, enabling remote control, file transfer, and the deployment of additional malware such as ransomware. The campaign appears to target organizations in the logistics and industrial supply sectors, where shipping notifications are common and less likely to arouse suspicion.
Threat Actor: The group behind this campaign is currently unspecified.
Attack Chain:
AWB-Doc0921.pdf). This is a classic example of T1566.001 - Spearphishing Attachment..scr), which is a type of executable file. The file is hosted on a compromised domain, in this case, a Vietnamese logistics company's website..scr file is a modified installer for the legitimate SimpleHelp RMM tool. When run, it installs the software and pre-configures it to connect to an attacker-controlled C2 server. This provides the attacker with persistent remote access, a technique known as T1219 - Remote Access Software.This attack is effective because it abuses a legitimate, signed software application, which may not be flagged by traditional signature-based antivirus. The key components are:
.scr) file is a common technique to bypass initial email gateway scans that might block direct executables.Once the attacker has established a backdoor with SimpleHelp, they have a strong foothold in the victim's network. The potential impact is severe and can include:
| Type | Value | Description |
|---|---|---|
| Domain | longhungphatlogistics[.]vn |
Compromised domain used to host the malicious .scr file. |
| File Name | AWB-Doc0921.pdf |
Example name of the initial PDF attachment. |
| File Type | .scr |
The downloaded payload is a Windows screensaver file, which is an executable. |
Detection:
Response:
longhungphatlogistics[.]vn) at the network perimeter.document.scr is an executable, not a document.Use application control solutions like WDAC to prevent the execution of unauthorized software, including unapproved RMM tools like SimpleHelp.
Mapped D3FEND Techniques:
Educate users to identify phishing lures, especially those related to common business functions like shipping, and to be cautious of unexpected attachments.
Use email and web gateways to scan and sandbox attachments and downloads to detect malicious behavior before the payload reaches the endpoint.
Mapped D3FEND Techniques:
The most effective technical countermeasure against the SimpleHelp phishing campaign is Executable Allowlisting, for example, using Windows Defender Application Control (WDAC). This attack relies on tricking a user into running an unauthorized installer (.scr file). In a properly hardened environment, this installer would be blocked by default. A WDAC policy should be created based on a 'golden image' of a standard corporate workstation, allowing only known, signed, and authorized applications to run. Since SimpleHelp is not an approved RMM tool in this context, its installer and subsequent executables (SimpleHelp.exe) would be prevented from executing, regardless of whether the user was tricked by the phishing email. This shifts the security burden from the fallible user to a preventative technical control, stopping the attack chain before persistence can be established.
To detect this threat at the perimeter, organizations should leverage File Analysis within a secure email gateway or sandbox environment. When the initial email with the AWB-Doc0921.pdf attachment arrives, the gateway should automatically detonate it in a sandbox. The analysis should detect that the PDF contains a link to an external resource. The sandbox should then follow this link, download the .scr file from the compromised longhungphatlogistics[.]vn domain, and execute it. During execution analysis, the sandbox would observe the file attempting to install software, create files in Program Files, and establish an outbound network connection. This chain of behavior is highly indicative of a malicious dropper. Based on this analysis, the email gateway can block the email from ever reaching the user's inbox, preventing the initial stage of the attack entirely.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats