Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Home/Threats/Google Forms Job Lures Deliver PureHVNC Malware Campaign
Threats

Google Forms Job Lures Deliver PureHVNC Malware Campaign

Threat actors are now weaponizing Google Forms, a widely trusted everyday tool, to distribute malware through a newly identified campaign. A newly identified campaign is exploiting business-themed...

David kimber
David kimber
March 24, 2026 3 Min Read
0 0

Threat actors are now weaponizing Google Forms, a widely trusted everyday tool, to distribute malware through a newly identified campaign.

A newly identified campaign is exploiting business-themed lures, including fake job interviews, project briefs, and financial documents, to deliver a Remote Access Trojan (RAT) known as PureHVNC onto victim machines.

What sets this campaign apart is not the malware itself but the unusual channel attackers chose to start the infection.

The campaign begins with a convincing Google Form crafted to resemble a real recruitment or business process. These forms ask for professional details like work history and background, building a sense of authenticity.

Once submitted, targets are directed to a business-themed ZIP file hosted on platforms like Dropbox, filedn.com, and fshare.vn, or through shorteners like tr.ee and goo.su that hide the real destination.

Attackers also spread links through LinkedIn, reaching professionals looking for jobs or new opportunities.

Malwarebytes analysts identified multiple variants of this campaign and noted that threat actors impersonate well-known companies in the financial, logistics, technology, sustainability, and energy sectors.

The fake forms display real company names, logos, and branding, making it difficult for an average user to spot the fraud.

Fake Google Forms that distribute malicious ZIPs (Source - Malwarebytes)
Fake Google Forms that distribute malicious ZIPs (Source – Malwarebytes)

Archive names like “Project_Information_Summary_2026.zip” and “{CompanyName}_GlobalLogistics_Ad_Strategy.zip” show how deliberate and calculated the deception truly is.

PureHVNC is a modular .NET RAT from the “Pure” malware family. Once on a machine, it gives attackers full remote control, letting them execute commands, steal data from browsers, cryptocurrency wallets, and messaging apps like Telegram and Foxmail, gather hardware and software information, and install additional plugins.

Its configuration is encoded in base64 and compressed with GZIP, with the identified C2 server at IP 207.148.66.14 reachable on ports 56001, 56002, and 56003.

The campaign’s reach is wide, hitting industries where document sharing is routine and professionals frequently receive files from outside contacts, making a malicious attachment hard to spot.

Multi-Stage Infection Mechanism

The infection chain behind PureHVNC is layered and deliberate, built to avoid detection at each step. Once a victim extracts the downloaded ZIP, they find job-related documents alongside a hidden executable and a DLL named msimg32.dll.

That DLL executes through DLL hijacking, tricking a legitimate application into loading the malicious code without raising obvious alerts.

Once running, the DLL decrypts strings through XOR with the key “4B” and checks for analysis environments using IsDebuggerPresent() and time64().

If sandbox or debugging activity is found, the malware shows the error “This software has expired or debugger detected” and halts.

Obfuscated Python script that ultimately loads the Donut shellcode (Source - Malwarebytes)
Obfuscated Python script that ultimately loads the Donut shellcode (Source – Malwarebytes)

The DLL then removes itself from disk, drops a fake PDF to keep the victim occupied, and adds a registry entry at CurrentVersionRunMiroupdate for early persistence.

In the next stage, a hidden archive named final.zip is extracted into a random folder inside ProgramData.

An obfuscated Python script — named config.log or image.mp3 depending on the variant — decodes and launches Donut shellcode in memory.

The shellcode injects PureHVNC into SearchUI.exe, a legitimate Windows process.

PowerShell command for the Scheduled Task (Source - Malwarebytes)
PowerShell command for the Scheduled Task (Source – Malwarebytes)

To hold access, the malware creates a scheduled task through a base64-encoded PowerShell command at the highest privilege level when admin rights are present, leaving the mutex “Rluukgz” on the host as a marker.

Users and organizations should take the following steps to reduce exposure to this campaign. Always verify the source of a Google Form before submitting any information or downloading linked files.

Cross-check unexpected job offers or project requests through official company websites and known contacts. Avoid following links hidden behind URL shorteners without first confirming where they lead.

Security teams should watch for unusual DLL loads, encoded PowerShell task creation, and process injection into SearchUI.exe. Endpoint defenses should be kept current to flag Python processes running unexpectedly from inside ProgramData directories.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwareSecurityThreat

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

APT Hackers Attack RDP Servers to Deploy Malware &

Next Post

Threat Actors Continuously Attacking MS-SQL Servers to Deploy ICE

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us