Excerpt from Forbes Article, Published on Jan 19, 2025.

Security researchers have issued a critical warning for Gmail and Outlook users as sophisticated malware campaigns emerge, exploiting hidden techniques to bypass detection. The VIP Keylogger and 0bj3ctivityStealer malware are ingeniously concealed within email images, making them particularly hard to detect. These malicious programs can capture sensitive information, including keystrokes, account credentials, and credit card data. The HP Wolf Security Threat Insights report highlights how attackers embed malicious code in images hosted on legitimate websites, enabling them to evade traditional security measures like web proxies. Given the widespread use of Gmail and Outlook, users are urged to remain vigilant against these evolving threats.

Phishing attempts have long relied on links and attachments to execute attacks, but this new approach represents a significant escalation. According to researchers, attackers deploy large-scale email campaigns, posing as invoices or purchase orders, to lure victims into opening malicious attachments. For instance, one malicious image used in these campaigns was accessed nearly 29,000 times. 0bj3ctivityStealer malware was found in archive files disguised as requests for quotations, downloading images from remote servers that contained the harmful code. These tactics demonstrate the growing sophistication of cybercriminals, who increasingly blend attack components to improve their campaigns’ success rates.

Both Gmail and Outlook have stepped up efforts to combat these threats. Gmail, leveraging advanced AI models, has strengthened its defenses against phishing and malware, blocking 20% more spam and quickly identifying risky patterns. Similarly, Microsoft has enhanced security for Outlook.com users, with premium features providing extra screening of links and attachments for Microsoft 365 subscribers. Despite these advancements, user awareness remains crucial. Avoiding suspicious emails and exercising caution with unexpected attachments or links are essential steps to mitigate risks. As cyberattacks evolve, staying informed and proactive is vital for securing personal and sensitive information.

To delve deeper into this topic, please read the full article Forbes.