Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

February 11, 2026

US Court Hands Crypto Scammer 20 Years in $73m Case

February 11, 2026

Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata

February 11, 2026
Facebook X (Twitter) Instagram
Wednesday, February 11
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Phorpiex Phishing Delivers Low-Noise Global Group Ransomware
News

Phorpiex Phishing Delivers Low-Noise Global Group Ransomware

Team-CWDBy Team-CWDFebruary 10, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A high-volume phishing campaign delivering the long-running Phorpiex malware has been observed using emails with the subject line “Your Document,” a lure widely seen throughout 2024 and 2025.

The messages include an attachment that appears to be a harmless document but is actually a weaponised Windows Shortcut file designed to initiate a multi-stage infection chain.

According to a new advisory by Forcepoint, the campaign relies on the continued effectiveness of Windows shortcut (.lnk) files as an initial access vector and their role in delivering Global Group ransomware, a stealthy, offline-capable ransomware-as-a-service (RaaS) operation.

Why Windows Shortcut Lures Persist

Windows shortcut files remain a reliable way to convert a single click into code execution. Attackers disguise the files using double extensions such as Document.doc.lnk and take advantage of Windows default settings that hide known file extensions.

Visual cues also play a role, with icons copied from legitimate Windows resources to reinforce the illusion of a trusted document.

Once opened, the shortcut launches cmd.exe, which in turn runs PowerShell to download and execute a second-stage payload. No installer is displayed and no obvious warning is shown to the user, allowing the process to run quietly in the background.

The infection chain unfolds in a straightforward but effective sequence:

  • A phishing email presents a document-looking attachment

  • The shortcut executes embedded commands via cmd.exe

  • PowerShell downloads a remote payload and saves it as windrv.exe

  • The binary is executed locally without visible user prompts

The payload retrieved in this campaign is associated with Phorpiex, a modular malware-as-a-service (MaaS) botnet active since around 2010 and commonly used to distribute ransomware and other secondary malware.

Read more on phishing-delivered ransomware: Russian Phishing Campaign Delivers Phantom Stealer Via ISO Files

Global Group’s Offline Ransomware Model

In this case, Phorpiex ultimately deployed Global Group ransomware, which differs from many modern families by operating entirely offline.

The malware generated encryption keys locally, did not contact a command-and-control (C2) server and performed no data exfiltration.

This design allowed it to function in isolated or air-gapped environments and reduced reliance on network traffic that might otherwise trigger alerts.

The ransomware encrypted files using the ChaCha20-Poly1305 algorithm and appended the .Reco extension. A ransom note titled README.Reco.txt was dropped across the system, while the desktop wallpaper was replaced with a GLOBAL GROUP message.

The malware also deleted itself after execution and removed shadow copies, complicating forensic analysis and recovery.

“This campaign demonstrates how long-standing malware families like Phorpiex remain highly effective when paired with simple but reliable phishing techniques,” Forcepoint said.

“By exploiting familiar file types such as Windows shortcut files, attackers can gain initial access with minimal friction, enabling a smooth transition to high-impact payloads like Global Group ransomware.”



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAPT28 Uses Microsoft Office CVE-2026-21509 in Espionage-Focused Malware Attacks
Next Article When Cloud Outages Ripple Across the Internet
Team-CWD
  • Website

Related Posts

News

CISA Adds Actively Exploited SolarWinds Web Help Desk RCE to KEV Catalog

February 11, 2026
News

US Court Hands Crypto Scammer 20 Years in $73m Case

February 11, 2026
News

Docker Fixes Critical Ask Gordon AI Flaw Allowing Code Execution via Image Metadata

February 11, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

What parents should know to protect their children from doxxing

November 28, 2025

2025’s most common passwords were as predictable as ever

January 21, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.