Pakistani Hackers Use ‘Dance Of The Hillary’ Virus To Target Indian Users

Share:

The “Dance of the Hillary” virus is a dangerous malware that is currently being spread by alleged Pakistani hackers through various communication platforms, including WhatsApp, Facebook, email, and Telegram. The virus is designed to deceive users by appearing as harmless media files—such as videos or documents—while secretly installing malicious software on devices that compromises sensitive data. As tensions rise between India and Pakistan, this malware has become a rising threat targeting Indian citizens, with experts warning about the growing risks associated with these cyberattacks.

Severity Level: High

THREAT OVERVIEW:

  1. Infection Methods:
    • Spread through WhatsApp messages with video attachments
    • Fake job interview emails or government circulars containing malicious links
    • Misleading posts on Facebook with disguised URLs
    • Telegram and X (Twitter) messages containing hidden malicious files
  2. Malicious Behavior:
    • The virus is designed to silently install itself on devices when a user clicks on a file or link, such as a video or a document.
    • Once executed, the malware can steal sensitive personal data, including banking passwords, credit card details, and other confidential information.
    • It may also access and leak confidential files, slow down or crash devices, and even allow hackers to remotely control the affected device.
  3. Key Indicator of Attack:
    • A known file associated with the virus is “tasksche.exe,” which is an executable file that triggers the malicious activity when run.
    • File name: ”Dance of the Hillary”
    • Any unfamiliar .exe files, particularly those from unknown sources, should be treated with caution.
  4. Impact:
    • Users’ personal and banking information is at risk, potentially leading to identity theft and financial loss.
    • Devices may become slow or unresponsive, with a high risk of total system compromise.

Recommendations:

  1. Train employees and users to recognize phishing attempts and suspicious behavior in emails, social media messages, and links.
  2. Advise users not to open attachments or click on links in unsolicited messages, even if they appear to come from trusted sources (WhatsApp, Facebook, etc.).
  3. Ensure that multi-factor authentication is enabled on all critical accounts, especially for banking, email, and social media accounts.
  4. Install and maintain reputable antivirus or endpoint protection software on all systems to detect and block threats like “Dance of the Hillary.”
  5. Ensure antivirus software is up-to-date with the latest signature updates to recognize new and emerging threats.
  6. Turn off auto-download features in messaging apps like WhatsApp, Telegram, and email clients. This prevents malicious attachments from being accidentally executed.
  7. Disable any preview features for email attachments and social media links that may trigger the malware automatically.
  8. Do not trust any unknown contact numbers, particularly those with the prefix ‘+92’.
  9. Always verify critical security updates, news, and official alerts only from trusted government websites or official law enforcement agencies.

MITRE ATT@CK:

TacticTechnique
Initial AccessPhishing (T1566)
Initial AccessSpear phishing Attachment (T1566.001)
ExecutionUser Execution (T1204)
Credential AccessCredential Dumping (T1003)
ExfiltrationExfiltration Over Web Service (T1041)
ImpactData Destruction (T1485)
Command and Control (C2)Web Service (T1071.001)
CollectionData from Local System (T1005)
CollectionScreen Capture (T1113)

Source:

  • https://www.timesnownews.com/technology-science/alert-pakistani-hackers-spread-dance-of-the-hillary-virus-on-whatsapp-facebook-dont-click-this-video-on-any-app-article-151596363
  • https://www.digit.in/news/general/dance-of-the-hillary-virus-do-not-open-this-video-on-any-platform-all-details.html

Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn.

virustotal

No related posts found.

Ampcus Cyber
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.