Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious links within seemingly legitimate payment requests.  This tactic aims to deceive recipients into opening the invoice, leading to:- Potential data breaches Financial fraud Unauthorized access to sensitive information Cybersecurity researchers at Perception Point recently discovered and analyzed a sophisticated malware dubbed “LUMMA” malware. Perception Point’s cutting-edge sandboxing technology was able to identify and isolate malicious software with precision and accuracy, thereby protecting the system from potentially harmful malware.

Source: GBHackers

 


Date:

Categorie(s):