Hackers use fake NDAs to deliver malware to US manufacturers

Hackers are targeting American industrial and tech firms by abusing their “Contact Us” forms to deliver malware disguised as non-disclosure agreement files, researchers said.

Unlike traditional phishing campaigns where attackers send malicious emails, the hackers behind these attacks first contacted victims through companies’ website forms, making the exchanges appear more credible, according to cybersecurity firm Check Point.

The hackers maintain the conversation for up to two weeks, posing as potential business partners and asking victims to sign non-disclosure agreements. Eventually, they send a contract in a ZIP archive hosted on Heroku, a legitimate cloud platform, which contains custom malware dubbed MixShell.

“The long-term engagement with the victim suggests that the attacker is willing to invest time … possibly tailoring their efforts based on perceived value or ease of compromise,” researchers said in a report on Tuesday.

Most of the victims are U.S. companies, including industrial manufacturers like machinery, metalwork and component producers. The campaign has also gone after firms in hardware, semiconductors, biotech, pharmaceuticals, aerospace, energy, and consumer goods. Some companies in Singapore, Japan, and Switzerland have been targeted as well.

Check Point said not all ZIP archives were malicious, with some containing harmless documents, suggesting the real malware may have been selectively uploaded from the Heroku site depending on a victim’s IP address, browser or other details.

To make the campaign more credible, the attackers used domains tied to real U.S.-registered businesses, some dating back to 2015. In reality, the websites were fake and all copied from the same template, with ‘About Us’ pages showing a stock photo of White House butlers presented as company founders. By using long-established domains, researchers said, the attackers were able to slip past security filters.

Check Point has not attributed the campaign to a specific threat actor but found that one of the servers used in the operation overlapped with infrastructure tied to a little-known cluster called UNK_GreenSec, which has previously shown links to Russia-aligned cybercriminals. The firm suggests the operation may be financially motivated.

NewsNews BriefsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Spanish police arrest student suspected of hacking school system to change grades

Next Post

Allied spy agencies blame 3 Chinese tech companies for Salt Typhoon attacks

Related Posts

Chinese Hackers Weaponize Open-Source Nezha Tool in New Attack Wave

Threat actors with suspected ties to China have turned a legitimate open-source monitoring tool called Nezha into an attack weapon, using it to deliver a known malware called Gh0st RAT to targets. The activity, observed by cybersecurity company Huntress in August 2025, is characterized by the use of an unusual technique called log poisoning (aka log injection) to plant a web shell on a web
Read More

Critical React Native CLI Flaw Exposed Millions of Developers to Remote Attacks

Details have emerged about a now-patched critical security flaw in the popular "@react-native-community/cli" npm package that could be potentially exploited to run malicious operating system (OS) commands under certain conditions. "The vulnerability allows remote unauthenticated attackers to easily trigger arbitrary OS command execution on the machine running react-native-community/cli's
Read More

UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors

Companies in the legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in the U.S. have been targeted by a suspected China-nexus cyber espionage group to deliver a known backdoor referred to as BRICKSTORM. The activity, attributed to UNC5221 and closely related, suspected China-nexus threat clusters, is designed to facilitate
Read More