Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware
Cybersecurity researchers have discovered an ongoing campaign that's targeting Indian users with a multi-stage backdoor as part of a suspected cyber espionage campaign. The activity, per the eSentire Threat Response Unit (TRU), involves using phishing emails impersonating the Income Tax Department of India to trick victims into downloading a malicious archive, ultimately granting the threat
AI Analysis
Technical Summary
The discovered campaign targets Indian users through phishing emails that impersonate the Income Tax Department of India, aiming to trick victims into downloading a malicious ZIP archive. This archive contains five files, including an executable named "Inspection Document Review.exe" which sideloads a malicious DLL. This DLL performs anti-debugging checks and contacts a command-and-control server to download the next-stage payload. The malware uses a COM-based technique to bypass the Windows User Account Control (UAC) prompt, gaining administrative privileges without alerting the user. It also modifies its Process Environment Block (PEB) to masquerade as the legitimate "explorer.exe" process, helping it evade detection. The next payload, "180.exe," is a 32-bit installer that detects if Avast Free Antivirus is running and uses automated mouse simulation to add malicious files to Avast's exclusion list, thus bypassing antivirus detection without disabling it. The campaign deploys a variant of the Blackmoon malware family, known for targeting businesses in South Korea, the US, and Canada since 2015. Additionally, it installs SyncFuture TSM, a legitimate enterprise remote monitoring and management tool developed by a Chinese company, repurposed here for espionage. This tool allows attackers to maintain persistent access, monitor user activity in real-time, and exfiltrate sensitive data. Batch scripts modify access control lists and user permissions to maintain control and persistence, while an executable named "MANC.exe" orchestrates services and extensive logging. The campaign blends multiple advanced techniques including anti-analysis, privilege escalation, DLL sideloading, commercial tool repurposing, and antivirus evasion, indicating a high level of sophistication and intent for sustained espionage. No specific threat actor has been attributed, and no known exploits are reported in the wild for this campaign.
Potential Impact
For European organizations, the direct impact of this campaign is currently limited due to its targeting of Indian users via tax-themed phishing. However, the use of a sophisticated multi-stage backdoor with advanced evasion and persistence techniques highlights a threat model that could be adapted or extended to European targets, especially those with business ties to India or exposure to similar phishing themes. The repurposing of legitimate enterprise tools for espionage purposes raises concerns about supply chain and software trust risks. If adapted, such malware could enable attackers to gain persistent administrative access, monitor user activities, and exfiltrate sensitive data, potentially compromising confidentiality, integrity, and availability of critical systems. The campaign’s ability to evade antivirus detection and manipulate security software settings increases the risk of prolonged undetected presence in networks. European organizations involved in finance, government, or sectors with strategic interest to threat actors employing espionage tactics should be vigilant. The campaign also underscores the need for heightened awareness of phishing threats exploiting local tax authorities or similar trusted entities, which could be mirrored in European contexts.
Mitigation Recommendations
European organizations should implement targeted phishing awareness training that includes scenarios mimicking local tax authority impersonations to reduce the risk of initial compromise. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL sideloading, process masquerading, and unusual privilege escalation behaviors. Monitor for unusual modifications to antivirus exclusion lists and automated interactions with security software interfaces, which may indicate malware attempting to evade detection. Restrict the use of legitimate remote monitoring and management (RMM) tools, ensuring they are deployed only from trusted sources and monitored for anomalous behavior. Employ application whitelisting to prevent unauthorized executables and scripts from running, especially those attempting to modify access control lists or user permissions. Regularly audit system permissions and ACLs for unexpected changes. Network segmentation and strict egress filtering can limit malware communication with command-and-control servers. Finally, maintain up-to-date threat intelligence feeds to detect emerging variants of Blackmoon or similar malware families and adjust defenses accordingly.
Affected Countries
India, United Kingdom, Germany, France, Netherlands
Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware
Description
Cybersecurity researchers have discovered an ongoing campaign that's targeting Indian users with a multi-stage backdoor as part of a suspected cyber espionage campaign. The activity, per the eSentire Threat Response Unit (TRU), involves using phishing emails impersonating the Income Tax Department of India to trick victims into downloading a malicious archive, ultimately granting the threat
AI-Powered Analysis
Technical Analysis
The discovered campaign targets Indian users through phishing emails that impersonate the Income Tax Department of India, aiming to trick victims into downloading a malicious ZIP archive. This archive contains five files, including an executable named "Inspection Document Review.exe" which sideloads a malicious DLL. This DLL performs anti-debugging checks and contacts a command-and-control server to download the next-stage payload. The malware uses a COM-based technique to bypass the Windows User Account Control (UAC) prompt, gaining administrative privileges without alerting the user. It also modifies its Process Environment Block (PEB) to masquerade as the legitimate "explorer.exe" process, helping it evade detection. The next payload, "180.exe," is a 32-bit installer that detects if Avast Free Antivirus is running and uses automated mouse simulation to add malicious files to Avast's exclusion list, thus bypassing antivirus detection without disabling it. The campaign deploys a variant of the Blackmoon malware family, known for targeting businesses in South Korea, the US, and Canada since 2015. Additionally, it installs SyncFuture TSM, a legitimate enterprise remote monitoring and management tool developed by a Chinese company, repurposed here for espionage. This tool allows attackers to maintain persistent access, monitor user activity in real-time, and exfiltrate sensitive data. Batch scripts modify access control lists and user permissions to maintain control and persistence, while an executable named "MANC.exe" orchestrates services and extensive logging. The campaign blends multiple advanced techniques including anti-analysis, privilege escalation, DLL sideloading, commercial tool repurposing, and antivirus evasion, indicating a high level of sophistication and intent for sustained espionage. No specific threat actor has been attributed, and no known exploits are reported in the wild for this campaign.
Potential Impact
For European organizations, the direct impact of this campaign is currently limited due to its targeting of Indian users via tax-themed phishing. However, the use of a sophisticated multi-stage backdoor with advanced evasion and persistence techniques highlights a threat model that could be adapted or extended to European targets, especially those with business ties to India or exposure to similar phishing themes. The repurposing of legitimate enterprise tools for espionage purposes raises concerns about supply chain and software trust risks. If adapted, such malware could enable attackers to gain persistent administrative access, monitor user activities, and exfiltrate sensitive data, potentially compromising confidentiality, integrity, and availability of critical systems. The campaign’s ability to evade antivirus detection and manipulate security software settings increases the risk of prolonged undetected presence in networks. European organizations involved in finance, government, or sectors with strategic interest to threat actors employing espionage tactics should be vigilant. The campaign also underscores the need for heightened awareness of phishing threats exploiting local tax authorities or similar trusted entities, which could be mirrored in European contexts.
Mitigation Recommendations
European organizations should implement targeted phishing awareness training that includes scenarios mimicking local tax authority impersonations to reduce the risk of initial compromise. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL sideloading, process masquerading, and unusual privilege escalation behaviors. Monitor for unusual modifications to antivirus exclusion lists and automated interactions with security software interfaces, which may indicate malware attempting to evade detection. Restrict the use of legitimate remote monitoring and management (RMM) tools, ensuring they are deployed only from trusted sources and monitored for anomalous behavior. Employ application whitelisting to prevent unauthorized executables and scripts from running, especially those attempting to modify access control lists or user permissions. Regularly audit system permissions and ACLs for unexpected changes. Network segmentation and strict egress filtering can limit malware communication with command-and-control servers. Finally, maintain up-to-date threat intelligence feeds to detect emerging variants of Blackmoon or similar malware families and adjust defenses accordingly.
Affected Countries
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/01/indian-users-targeted-in-tax-phishing.html","fetched":true,"fetchedAt":"2026-01-26T20:50:00.986Z","wordCount":1168}
Threat ID: 6977d37c4623b1157cbb6736
Added to database: 1/26/2026, 8:50:04 PM
Last enriched: 1/26/2026, 8:50:20 PM
Last updated: 2/7/2026, 1:00:58 AM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-02-06
MediumThreatFox IOCs for 2026-02-05
MediumTechnical Analysis of Marco Stealer
MediumNew Clickfix variant 'CrashFix' deploying Python Remote Access Trojan
MediumKnife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.