New Variant of Ursnif Continuously Targeting Italy : vimarsa

New Variant of Ursnif Continuously Targeting Italy


Affected platforms:       Microsoft Windows
Impact:                           Collects Victims’ Information
Severity level:                Critical
Ursnif (also known as Gozi) is identified as a banking Trojan, but its variants also include components (backdoors, spyware, file injectors, etc.) capable of a wide variety of behaviors. 
The Ursnif Trojan has been observed targeting Italy over the past year. A few days ago, FortiGuard Labs detected a phishing campaign in the wild that was spreading a fresh variant of the Ursnif Trojan via an attached MS Word document that is continuously targeting Italy. 
Although Ursnif is identified as a banking Trojan, due to its C2 server’s shutdown, this latest variant has been unable download the malicious banking module it needs to steal banking information from the victim, causing it to fail to start the second stage of its attack. As a result, in this post I will share my findings around the first stage of this campaign. You will learn what the phishing email looks like, how the MS Word document attached to the email works to download Ursnif, as well as what this variant does on a victim’s device. 

Related Keywords

Italy , Italian , Fortiguard Webfilter , Ursnif Dllentrypoint , C Eugttkuna Pdafpobzlduywmnjmjqk Bclohccwr , Ursnif Trojan , Userform , Google , Software Microsoft Windows Currentversion , Fortiguard Labs Threat , Windows Users , Collects Victim , Fortiguard Labs , Google Translate , Configuration Block , Sensitive Information , Computer Name , System Uptime , Solution Coverage , Fortiguard Antivirus , Content Disarm , Information Security Awareness , Threat Research , இத்தாலி , இத்தாலிய , கூகிள் , ஜன்னல்கள் பயனர்கள் , கூகிள் மொழிபெயர் , உள்ளமைவு தொகுதி , உணர்திறன் தகவல் , கணினி பெயர் , அமைப்பு முடிந்தநேரம் , தீர்வு பாதுகாப்பு , தகவல் பாதுகாப்பு விழிப்புணர்வு , அச்சுறுத்தல் ஆராய்ச்சி ,

© 2025 Vimarsana