Home OSINT News Signals
CYBER

Sophisticated 'BlackSanta' EDR Killer Campaign Targets HR Departments with Stealthy Attacks

đź•“ 2 min read

A sophisticated, Russian-speaking threat actor has been conducting a targeted campaign against human resource (HR) departments for over a year, deploying a novel Endpoint Detection and Response (EDR) evasion tool dubbed "BlackSanta." This operation, characterized by its advanced blend of social engineering and technical stealth, is designed to exfiltrate sensitive data from compromised corporate systems. While the initial infection vector remains partially unclear, cybersecurity researchers from Aryaka, a network and security solutions provider, strongly suspect the campaign begins with highly tailored spear-phishing emails. The attackers lure HR professionals by directing them to download ISO image files, cleverly disguised as job applicant resumes, which are hosted on legitimate cloud storage platforms like Dropbox to bypass email security filters.

Upon execution, the attack chain reveals a multi-layered and evasive approach. A typical malicious ISO file analyzed contains four components: a Windows shortcut (.LNK) file masquerading as a PDF document, a PowerShell script, an image file, and an .ICO icon file. The deceptive shortcut triggers PowerShell to run the embedded script. This script then performs a steganographic operation, extracting hidden malicious code embedded within the seemingly innocuous image file. This payload is then executed directly in system memory (fileless execution), a technique that leaves minimal forensic traces on the disk. Subsequently, the script downloads a ZIP archive containing a legitimate, signed copy of the SumatraPDF reader alongside a malicious DLL file named `DWrite.dll`.

The final stage leverages a technique known as DLL sideloading, where the legitimate SumatraPDF executable is used to load the malicious `DWrite.dll` library, effectively bypassing application control and EDR solutions that trust the signed binary. Once activated, the BlackSanta payload performs comprehensive system fingerprinting, collecting detailed information about the compromised host. This data is transmitted to a remote command-and-control (C2) server. Before proceeding with its primary malicious functions, the malware conducts extensive environmental checks to detect the presence of security analysis tools, including sandboxes, virtual machines (VMs), and debugging software. If any such indicators are found, the malware halts execution to avoid detection and analysis, showcasing a high degree of operational security awareness by its operators.

This campaign underscores a dangerous trend where threat actors are increasingly focusing on HR departments—gatekeepers to vast amounts of personally identifiable information (PII), financial data, and internal corporate communications. The use of steganography, fileless execution, DLL sideloading, and robust anti-analysis checks makes BlackSanta a significant threat. Organizations must bolster defenses by implementing advanced email security, application whitelisting, and robust EDR solutions with behavioral detection capabilities. Furthermore, continuous security awareness training for HR personnel is critical to help them identify sophisticated phishing lures disguised as routine business documents like resumes.

Telegram X LinkedIn
Back to News