Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

France’s Cybersecurity Agency Reports Ransomware Attack Drop in 2025

March 11, 2026

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

March 11, 2026

Infosecurity Europe Announces 2026 Keynote Line Up

March 11, 2026
Facebook X (Twitter) Instagram
Wednesday, March 11
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»BlackSanta EDR-Killer Targets HR Teams in CV-Themed Campaign
News

BlackSanta EDR-Killer Targets HR Teams in CV-Themed Campaign

Team-CWDBy Team-CWDMarch 11, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new malware campaign targeting human resources and recruiting staff has seen attackers distribute malicious files disguised as job applications.

The operation, uncovered by Aryaka Threat Research Lab, uses a specialized tool known as BlackSanta to disable endpoint detection and response (EDR) systems after a device has been compromised.

The campaign mainly spreads through phishing emails containing links to files presented as resumes. When opened, the files trigger a multi-stage infection process that quietly deploys malware on the victim’s system. The researchers said the attack chain allows the threat actors to gather detailed system information before launching additional payloads.

Aryaka’s analysis indicates that the group behind the operation is likely Russian-speaking.

Resumes and Legitimate Documents Impersonated 

The malicious files used in the campaign typically imitate legitimate documents such as resumes. Once downloaded and executed, the malware begins a sequence of actions designed to profile the system and evade security monitoring.

Key behaviors observed in the attack include:

  • System reconnaissance to collect operating system and user data

  • Checks for virtual machines, sandboxes and debugging tools

  • Geographic filtering to avoid running in restricted regions

  • Attempts to disable antivirus and EDR security controls

  • Downloading additional malicious payloads after initial compromise

These steps allow the attackers to maintain access while reducing the chance of detection.

Recruitment Workflows Exploited

A central element of the campaign is the BlackSanta module itself. The component functions as an EDR-killer, attempting to neutralize security software that might otherwise block malicious activity. 

According to the Aryaka Threat Research Lab’s report, the malware also performs checks on system language, hostnames and running processes before carrying out further actions.

Read more on endpoint detection and response security: Escaping the Detection Trap: Is EDR Giving You a False Sense of Security? 

Aryaka warned that recruitment teams may be particularly vulnerable because their daily tasks involve opening attachments and downloading candidate documents. Attackers exploit this routine behavior to disguise malicious payloads as legitimate applications.

“The campaign’s ability to exfiltrate sensitive information while maintaining encrypted communications underscores both its persistence and the risk posed to targeted organizations,” the researchers wrote. 

“Over the past year, the malware has operated largely undetected, showcasing the level of planning, precision, and technical capability employed by the threat actor.”

Improved monitoring of suspicious downloads and stronger endpoint protection could help organizations detect similar attacks earlier in the intrusion process.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGoogle Confirms CVE-2026-21385 in Qualcomm Android Component Exploited
Next Article Compromised WordPress Sites Deliver ClickFix Attacks
Team-CWD
  • Website

Related Posts

News

France’s Cybersecurity Agency Reports Ransomware Attack Drop in 2025

March 11, 2026
News

Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication

March 11, 2026
News

Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited

March 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Near-ultrasonic attacks on voice assistants

September 11, 20256 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views
Our Picks

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

Mobile app permissions (still) matter more than you may think

February 27, 2026

Why you should never pay to get paid

September 15, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.