Spoofed Saudi Purchase Order Drops GuLoader
FortiGuard Labs recently discovered an e-mail using this tactic.
The message was delivered to a coffee company in Ukraine that was seemingly sent by an oil provider in Saudi Arabia.
Purporting to be a purchase order, the partial PDF file image displayed in the body of the email was actually a link to an ISO file hosted in the cloud that contained an executable for GuLoader.
Also known as CloudEye and vbdropper, GuLoader dates to at least 2019 and is generally used to deploy other malware variants, such as Agent Tesla, Formbook, and Lokibot.
Subscribe to Our Blog
Subscribe now to get the latest insights, expert tips and updates on threat exposure validation.
Subscribe