Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Leadership and ManagementCybersecurity News

A new malware named “Voldemort” may be a cyber espionage campaign

By Jordyn Alger, Managing Editor
Lit up globe

Image via Unsplash

September 6, 2024

Research from Proofpoint shows the growth of a new malware campaign called “Voldemort.” The research asserts that the campaign began on August 5, 2024, and has since impacted more than 70 organizations worldwide with more than 20,000 emails.

More than half of the intended targets are a part of the insurance, transportation, aerospace and education sectors. While the threat actor behind Voldemort is currently unknown, the research claims cyber espionage is the goal of this campaign. 

Security leaders weigh in 

Jason Soroko, Senior Fellow at Sectigo:

“The threat is unusual due to its use of uncommon command and control (C2) methods like Google Sheets, and its combination of various tactics, techniques and procedures (TTPs). Voldemort’s use of Google Sheets for C2 poses risks because it blends malicious activity within legitimate services, making detection more challenging. Organizations can mitigate this by monitoring outbound traffic for unusual patterns, implementing strict application access controls, and using threat intelligence to detect abnormal use of legitimate platforms for C2 purposes.

“Companies can protect against personalized phishing attacks by enhancing email filtering systems, training employees to recognize and report suspicious emails, employing strong multi-factor authentication (MFA), and regularly updating and auditing the visibility of their publicly available information to reduce exposure.

“Organizations can verify the authenticity of communications from government agencies by using direct communication channels, such as official government websites or contacts, to confirm legitimacy. Implementing email authentication protocols like DMARC, SPF and DKIM can also help prevent impersonation-based attacks, as well as S/MIME certificates for ensuring the legitimacy of email sender identities within an organization.”

Mr. Mayuresh Dani, Manager, Security Research, at Qualys Threat Research Unit:

“This attack utilizes Google Sheets for command and control (C2) communications and the use of files laced with malicious Windows search protocol to lure the victim to download the malware. The malware then uses a legitimate version of WebEx software to load a DLL that communicates with the C2 server.

“Organizations should take reactive and proactive means of protecting employee data. They should use spam filters — with strict settings for certain users at risk. AI and LLMs’ spam and language filters should be employed for first time email senders from unknown/untrusted domain names. They should also enforce user education that will help weed out any spurious emails that are eventually delivered. As a reactive means, they should monitor leaks sources for key resources in the company and have them scrubbed.”

Omri Weinberg, Co-founder and CRO at DoControl: 

“The Voldemort campaign stands out due to its unique combination of sophisticated and unconventional techniques. Using Google Sheets for command and control is quite innovative. The attack chain also abuses the Windows saved search file format in an unusual way we haven't seen before. At the same time, the high volume of messages and tax authority lures are more typical of cybercrime campaigns. This blend of APT and cybercrime characteristics makes it an intriguing threat.

“Using Google Sheets for C2 poses serious detection challenges. It’s a legitimate service that many organizations use, so it’s difficult to block outright. The encrypted HTTPS traffic also makes inspection tricky. To detect this, companies need robust network monitoring that can identify suspicious access patterns to Google services. 

“Defending against APTs like Voldemort requires a multi-layered approach, with Exposed Data Intelligence as a foundational element. First, organizations need comprehensive visibility across their environment — you can’t protect what you can’t see or don’t know is exposed. This includes monitoring SaaS applications and understanding what sensitive data might already be out in the wild.

“Exposed data intelligence is crucial here. It supplies you with information about what data from your organization is already exposed, allowing you to better anticipate potential attack vectors and strengthen your defenses accordingly. This might involve additional monitoring of known exposed accounts or extra protection for systems handling sensitive data that attackers might target based on the exposed intelligence.

“Beyond that, companies should implement robust endpoint detection and response (EDR) tools, network segmentation, and data loss prevention (DLP) solutions. Regular threat hunting exercises, informed by your Exposed Data Intelligence, can help identify any attackers that slip through initial defenses.

“Ensuring all systems are patched and properly configured is fundamental. But don’t forget — your security posture should be continuously adjusted based on the insights from your Exposed Data Intelligence. This dynamic approach, powered by up-to-date knowledge of your exposed data, is key to staying ahead of sophisticated APTs that leverage this information for their attacks.”

KEYWORDS: espionage malware security leaders threat threat intelligence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • We are hiring sign

    Report: New cyber scam campaign targets job seekers

    See More
  • Laptop with dark screen and green symbols

    Security leaders discuss a sophisticated, ongoing phishing campaign

    See More
  • Text message screen

    Security leaders respond to a sophisticated SMS stealing campaign

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing