A new email malware campaign hides a malicious payload in what appears to be a Microsoft Compiled HTML Help file. Credit: Thinkstock A new email campaign designed to spread the Vidar spyware package uses a novel technique involving Microsoft Compiled HTML help files, according to a blog post released today by Trustwave.The help files, which use the suffix “CHM,” are packaged in an ISO along with the Vidar payload in what appears to be a Word document. If the attacker successfully hoodwinks the target into extracting the phony document, executing either file triggers the malicious package and compromises the system, Trustwave researcher Diana Lopera wrote in the post.The CHM file used in the attack is mostly a copy of a legitimate CHM, but has appended HTML application code – that extra code silently runs the malicious executable in the background when the CHM file is run.The particular flavor of Vidar used in the attack, Lopera noted, is version 50.3, and receives its command-and-control (C&C) instructions from accounts on open-source social networking platform Mastodon. Once up and running, the malware downloads configuration information from C&C servers identified by the Mastodon page and starts its work – first collecting system information and password data from browsers and other applications, sending that information as a ZIP file back to the C&C server, and then deleting itself, potentially after pulling additional malware onto the infected machine. “Appending a malicious file to an unsuspecting file format is one of the tricks our adversaries use to evade detection,” wrote Lopera.What is Vidar?Vidar was first observed in the wild in late 2018, according to a report from cloud security vendor Infoblox, which noted that it’s a variant of the earlier Arkei infostealer. It’s sold commercially in online forums, and has the ability to steal a wide variety of user information and valuable data from infected computers, including credit card numbers, usernames and passwords, desktop screenshots, and cryptocurrency wallets. It can even bypass some types of two-factor authentication, particularly targeting the Authy 2FA stack. As ever, strong email security practices can mitigate or eliminate the risks posed by Vidar – extreme caution should be used when opening email attachments from unfamiliar senders with generic subject lines, and verification either over the phone or in person should be the first move if there is any doubt about such a message’s legitimacy. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe