Weaponized Employee Performance Reports Deploy Guloader Malware

Related

CISOs to Watch in Canadian Manufacturing

Canada’s manufacturing sector spans aerospace, automotive, food production, forestry,...

CISOs to Watch in Canadian Mining & Natural Resources

Canada’s mining and natural resources sector is a global...

CISOs to Watch in Canadian Energy & Utilities

Canada’s energy and utilities sector underpins national resilience, economic...

VoiceRun’s $5.5M Seed Round Signals Enterprise Voice AI Maturation

What happened VoiceRun, a Cambridge, Massachusetts–based startup offering a code‑first...

Pax8 Email Error Exposes MSP Partner Licensing and Customer Lists

What happened A Pax8 email error exposes MSP partner licensing...

Share

What happened

AhnLab Security Intelligence Center (ASEC) recently discovered a phishing campaign in which threat actors weaponize fake employee performance reports to distribute Guloader malware. The attackers send emails crafted to appear as legitimate internal evaluation documents, luring recipients into downloading and executing malicious attachments. Once opened, Guloader can establish persistence on the system, download additional payloads, and enable further compromise of corporate environments, potentially exposing sensitive systems and data. This campaign relies heavily on social engineering, exploiting employee trust in routine workplace communications to increase the likelihood of execution.

Who is affected

Employees and organizations in sectors where internal reporting and performance communications are common are directly targeted by this phishing technique; compromised endpoints could lead to broader network exposure.

Why CISOs should care

Social engineering campaigns that weaponize trusted communications channels can bypass technical defenses and initiate malware infections, posing elevated risks of compromise and lateral spread within enterprises.

3 practical actions

  • Enhance phishing defenses: Implement advanced email filtering and attachment scanning to block malicious reports.
  • Train users: Educate staff to recognize deceptive internal-looking communications.
  • Inspect attachments: Apply sandbox analysis to untrusted email attachments before delivery.