By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware
Computing

Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware

News Room
Last updated: 2026/01/26 at 1:01 PM
News Room Published 26 January 2026
Share
Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware
SHARE

Ravie LakshmananJan 26, 2026Cyber Espionage / Malware

Cybersecurity researchers have discovered an ongoing campaign that’s targeting Indian users with a multi-stage backdoor as part of a suspected cyber espionage campaign.

The activity, per the eSentire Threat Response Unit (TRU), involves using phishing emails impersonating the Income Tax Department of India to trick victims into downloading a malicious archive, ultimately granting the threat actors persistent access to their machines for continuous monitoring and data exfiltration.

The end goal of the sophisticated attack is to deploy a variant of a known banking trojan called Blackmoon (aka KRBanker) and a legitimate enterprise tool called SyncFuture TSM (Terminal Security Management) that’s developed by Nanjing Zhongke Huasai Technology Co., Ltd, a Chinese company. The campaign has not been attributed to any known threat actor or group.

Cybersecurity

“While marketed as a legitimate enterprise tool, it is repurposed in this campaign as a powerful, all-in-one espionage framework,” eSentire said. “By deploying this system as their final payload, the threat actors establish resilient persistence and gain a rich feature set to monitor victim activity and centrally manage the theft of sensitive information.”

The ZIP file distributed through the fake tax penalty notices contains five different files, all of which are hidden except for an executable (“Inspection Document Review.exe”) that’s used to sideload a malicious DLL present in the archive. The DLL, for its part, implements checks to detect debugger-induced delays and contacts an external server to fetch the next-stage payload.

The downloaded shellcode then uses a COM-based technique to bypass the User Account Control (UAC) prompt to gain administrative privileges. It also modifies its own Process Environment Block (PEB) to masquerade as the legitimate Windows “explorer.exe” process to fly under the radar.

On top of that, it retrieves the next stage “180.exe” from the “eaxwwyr[.]cn” domain, a 32-bit Inno Setup installer that adjusts its behavior based on whether the Avast Free Antivirus process (“AvastUI.exe”) is running on the compromised host.

If the security program is detected, the malware uses automated mouse simulation to navigate Avast’s interface and add malicious files to its exclusion list without disabling the antivirus engine to bypass detection. This is achieved by means of a DLL that’s assessed to be a variant of the Blackmoon malware family, which is known for targeting businesses in South Korea, the U.S., and Canada. It first surfaced in September 2015.

The file added to the exclusion list is an executable named “Setup.exe,” which is a utility from SyncFutureTec Company Limited and is designed to write “mysetup.exe” to disk. The latter is assessed to be SyncFuture TSM, a commercial tool with remote monitoring and management (RMM) capabilities.

Cybersecurity

In abusing a legitimate offering, the threat actors behind the campaign gain the ability to remotely control infected endpoints, record user activities, and exfiltrate data of interest. Also deployed following the execution of the executable are other files –

  • Batch scripts that create custom directories and modify their Access Control Lists (ACLs) to grant permissions to all users
  • Batch scripts that manipulate user permissions on Desktop folders
  • A batch script performs cleanup and restoration operations
  • An executable called “MANC.exe” that orchestrates different services and enables extensive logging

“It provides them with the tools to not only steal data but to maintain granular control over the compromised environment, monitor user activity in real-time, and ensure their own persistence,” eSentire said. “By blending anti‑analysis, privilege escalation, DLL sideloading, commercial‑tool repurposing, and security‑software evasion, the threat actor demonstrates both capability and intent.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Blingy Trump Mobile boasting golden MAGA wallpaper finally about to go on sale Blingy Trump Mobile boasting golden MAGA wallpaper finally about to go on sale
Next Article watchOS 26.2.1 now available for Apple Watch, here’s what’s new – 9to5Mac watchOS 26.2.1 now available for Apple Watch, here’s what’s new – 9to5Mac
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

4 Free And Easy Ways You Can Upgrade Your Smart TV – BGR
4 Free And Easy Ways You Can Upgrade Your Smart TV – BGR
News
The best trackers for finding your stuff
The best trackers for finding your stuff
News
We Strapped on Exoskeletons and Raced. There’s One Clear Winner
We Strapped on Exoskeletons and Raced. There’s One Clear Winner
Gadget
Xiaohongshu’s US user base plummets amid TikTok ban suspension · TechNode
Xiaohongshu’s US user base plummets amid TikTok ban suspension · TechNode
Computing

You Might also Like

Xiaohongshu’s US user base plummets amid TikTok ban suspension · TechNode
Computing

Xiaohongshu’s US user base plummets amid TikTok ban suspension · TechNode

1 Min Read
Sudarshan Venkataraman on Engineering the Nervous System of High-Assurance Autonomy | HackerNoon
Computing

Sudarshan Venkataraman on Engineering the Nervous System of High-Assurance Autonomy | HackerNoon

9 Min Read
AMD Squeezing Out More More ROCm/HIP Performance With New Device-Side PGO
Computing

AMD Squeezing Out More More ROCm/HIP Performance With New Device-Side PGO

3 Min Read
China to host first embodied intelligence robot games · TechNode
Computing

China to host first embodied intelligence robot games · TechNode

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?