Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware

0
Medium
Malware
Published: Mon Jan 26 2026 (01/26/2026, 17:01:00 UTC)
Source: The Hacker News

Description

Cybersecurity researchers have discovered an ongoing campaign that's targeting Indian users with a multi-stage backdoor as part of a suspected cyber espionage campaign. The activity, per the eSentire Threat Response Unit (TRU), involves using phishing emails impersonating the Income Tax Department of India to trick victims into downloading a malicious archive, ultimately granting the threat

AI-Powered Analysis

AILast updated: 01/26/2026, 20:50:20 UTC

Technical Analysis

The discovered campaign targets Indian users through phishing emails that impersonate the Income Tax Department of India, aiming to trick victims into downloading a malicious ZIP archive. This archive contains five files, including an executable named "Inspection Document Review.exe" which sideloads a malicious DLL. This DLL performs anti-debugging checks and contacts a command-and-control server to download the next-stage payload. The malware uses a COM-based technique to bypass the Windows User Account Control (UAC) prompt, gaining administrative privileges without alerting the user. It also modifies its Process Environment Block (PEB) to masquerade as the legitimate "explorer.exe" process, helping it evade detection. The next payload, "180.exe," is a 32-bit installer that detects if Avast Free Antivirus is running and uses automated mouse simulation to add malicious files to Avast's exclusion list, thus bypassing antivirus detection without disabling it. The campaign deploys a variant of the Blackmoon malware family, known for targeting businesses in South Korea, the US, and Canada since 2015. Additionally, it installs SyncFuture TSM, a legitimate enterprise remote monitoring and management tool developed by a Chinese company, repurposed here for espionage. This tool allows attackers to maintain persistent access, monitor user activity in real-time, and exfiltrate sensitive data. Batch scripts modify access control lists and user permissions to maintain control and persistence, while an executable named "MANC.exe" orchestrates services and extensive logging. The campaign blends multiple advanced techniques including anti-analysis, privilege escalation, DLL sideloading, commercial tool repurposing, and antivirus evasion, indicating a high level of sophistication and intent for sustained espionage. No specific threat actor has been attributed, and no known exploits are reported in the wild for this campaign.

Potential Impact

For European organizations, the direct impact of this campaign is currently limited due to its targeting of Indian users via tax-themed phishing. However, the use of a sophisticated multi-stage backdoor with advanced evasion and persistence techniques highlights a threat model that could be adapted or extended to European targets, especially those with business ties to India or exposure to similar phishing themes. The repurposing of legitimate enterprise tools for espionage purposes raises concerns about supply chain and software trust risks. If adapted, such malware could enable attackers to gain persistent administrative access, monitor user activities, and exfiltrate sensitive data, potentially compromising confidentiality, integrity, and availability of critical systems. The campaign’s ability to evade antivirus detection and manipulate security software settings increases the risk of prolonged undetected presence in networks. European organizations involved in finance, government, or sectors with strategic interest to threat actors employing espionage tactics should be vigilant. The campaign also underscores the need for heightened awareness of phishing threats exploiting local tax authorities or similar trusted entities, which could be mirrored in European contexts.

Mitigation Recommendations

European organizations should implement targeted phishing awareness training that includes scenarios mimicking local tax authority impersonations to reduce the risk of initial compromise. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting DLL sideloading, process masquerading, and unusual privilege escalation behaviors. Monitor for unusual modifications to antivirus exclusion lists and automated interactions with security software interfaces, which may indicate malware attempting to evade detection. Restrict the use of legitimate remote monitoring and management (RMM) tools, ensuring they are deployed only from trusted sources and monitored for anomalous behavior. Employ application whitelisting to prevent unauthorized executables and scripts from running, especially those attempting to modify access control lists or user permissions. Regularly audit system permissions and ACLs for unexpected changes. Network segmentation and strict egress filtering can limit malware communication with command-and-control servers. Finally, maintain up-to-date threat intelligence feeds to detect emerging variants of Blackmoon or similar malware families and adjust defenses accordingly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/01/indian-users-targeted-in-tax-phishing.html","fetched":true,"fetchedAt":"2026-01-26T20:50:00.986Z","wordCount":1168}

Threat ID: 6977d37c4623b1157cbb6736

Added to database: 1/26/2026, 8:50:04 PM

Last enriched: 1/26/2026, 8:50:20 PM

Last updated: 2/7/2026, 1:00:58 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats