Recent Posts

Recent Blog Posts

The PhishLabs Blog

Surge in ZLoader Attacks Observed

Posted by Jessica Ellis on Feb 23, '21

Surge in ZLoader Attacks Observed
PhishLabs has observed a spike in malicious emails distributing ZLoader malware. The spike is notably one of the greatest upticks for a single payload observed in a 24-hour period over the past year, and is the first significant sign that another botnet may be stepping up in the aftermath of the Emotet takedown
May 2020 - February 2021 ZLoader Activity
ZLoader is one of the most frequently reported malware strains since June 2020. This particular campaign uses three legitimate file sharing platforms to distribute attacks: WeTransfer, Google Docs, and Emails are delivered through a variety of compromised accounts. The payload is delivered via malicious files and download links. 
>> Learn More About Ransomware Threats <<

WeTransfer Example

WeTransfer Sender Address:
WeTransfer Subject Line: <> sent you files via WeTransfer
WeTransfer URL:
WeTransfer Phishing Lure

Additional Lures

boxlure Phishing Lure
googledoclure copy-3
Google Docs Phishing Lure
ZLoader is a popular banking trojan often purchased for distribution by threat actors through Malware-as-a-Service (MaaS). It is a derivative of the Zeus banking trojan and commonly known for stealing victim's credentials through web injects. 
ZLoader is delivered through email phishing and there are indications that it is linked to Ryuk and Egregor ransomware strains.

Learn about how PhishLabs helps organizations defend against ransomware risks with Ransomware Protection.
Additional Resources:

Topics: Banking Trojan, Ransomware

What's this all about?

The PhishLabs Blog is where we share our insights and thoughts on cybercrime and online fraud.

Recent Posts

Subscribe to Email Updates

Posts by Topic

see all