Hackers use fake NDAs to deliver malware to US manufacturers

Hackers are targeting American industrial and tech firms by abusing their “Contact Us” forms to deliver malware disguised as non-disclosure agreement files, researchers said.

Unlike traditional phishing campaigns where attackers send malicious emails, the hackers behind these attacks first contacted victims through companies’ website forms, making the exchanges appear more credible, according to cybersecurity firm Check Point.

The hackers maintain the conversation for up to two weeks, posing as potential business partners and asking victims to sign non-disclosure agreements. Eventually, they send a contract in a ZIP archive hosted on Heroku, a legitimate cloud platform, which contains custom malware dubbed MixShell.

“The long-term engagement with the victim suggests that the attacker is willing to invest time … possibly tailoring their efforts based on perceived value or ease of compromise,” researchers said in a report on Tuesday.

Most of the victims are U.S. companies, including industrial manufacturers like machinery, metalwork and component producers. The campaign has also gone after firms in hardware, semiconductors, biotech, pharmaceuticals, aerospace, energy, and consumer goods. Some companies in Singapore, Japan, and Switzerland have been targeted as well.

Check Point said not all ZIP archives were malicious, with some containing harmless documents, suggesting the real malware may have been selectively uploaded from the Heroku site depending on a victim’s IP address, browser or other details.

To make the campaign more credible, the attackers used domains tied to real U.S.-registered businesses, some dating back to 2015. In reality, the websites were fake and all copied from the same template, with ‘About Us’ pages showing a stock photo of White House butlers presented as company founders. By using long-established domains, researchers said, the attackers were able to slip past security filters.

Check Point has not attributed the campaign to a specific threat actor but found that one of the servers used in the operation overlapped with infrastructure tied to a little-known cluster called UNK_GreenSec, which has previously shown links to Russia-aligned cybercriminals. The firm suggests the operation may be financially motivated.

NewsNews BriefsCybercrime
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk

is a reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Previous Post

Spanish police arrest student suspected of hacking school system to change grades

Next Post

Allied spy agencies blame 3 Chinese tech companies for Salt Typhoon attacks

Related Posts

Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email Security

Microsoft is calling attention to a new phishing campaign primarily aimed at U.S.-based organizations that has likely utilized code generated using large language models (LLMs) to obfuscate payloads and evade security defenses. "Appearing to be aided by a large language model (LLM), the activity obfuscated its behavior within an SVG file, leveraging business terminology and a synthetic structure
Read More

WhatsApp Patches Zero-Click Exploit Targeting iOS and macOS Devices

WhatsApp has addressed a security vulnerability in its messaging apps for Apple iOS and macOS that it said may have been exploited in the wild in conjunction with a recently disclosed Apple flaw in targeted zero-day attacks. The vulnerability, CVE-2025-55177 (CVSS score: 8.0 [CISA-ADP]/5.4 [Facebook]), relates to a case of insufficient authorization of linked device synchronization messages.
Read More