Security Experts:

Connect with us

Hi, what are you looking for?


Malware & Threats

New Trojan Helps Attackers Recruit Insiders

Experts monitoring the dark web have come across a new Trojan designed to help threat actors recruit insiders within the organizations they want to target.

Experts monitoring the dark web have come across a new Trojan designed to help threat actors recruit insiders within the organizations they want to target.

According to Avivah Litan, VP and distinguished analyst at Gartner Research, Israel-based threat intelligence firm Diskin Advanced Technologies has discovered what it believes to be the first insider threat Trojan.

Dubbed “Delilah,” the malware uses social engineering and extortion, including ransomware techniques, to recruit insiders. The Trojan, often delivered through adult and gaming websites, collects personal information that could allow the attackers to manipulate or blackmail the targeted individual.

In addition to personal information on the victim’s workplace and family, Delilah is capable of capturing video from the targeted user’s webcam. Victims are instructed to use VPNs and the Tor anonymity network, and delete their browsing history, most likely in an effort to avoid leaving any evidence that could turn up during an audit.

Litan said the Trojan is currently only shared in closed groups. The malware appears to be under development as it has several bugs, including error messages when the webcam plugin is used and long system freezes.

Researchers noted that use of Delilah still involves a high level of manual work to identify and prioritize potential victims. However, the Trojan’s developers offer managed social engineering and fraud services for customers who need help with these tasks.

“Surely, to combat Delilah and similar bots, it is especially important to collect and analyze endpoint data and information on VPN usage and TOR connections,” Litan noted in a blog post. “Often times, the optimal way to do this is to feed EDR output into UEBA systems for correlations and advanced analysis of various events. Organizations should also seek to prevent endpoints from getting infected in the first place by preventing employees from visiting high risk adult and gaming sites using organizational systems.”

Malicious insiders are increasingly problematic and, as Verizon’s 2016 Data Breach Investigations Report showed, in most cases it takes months and even years to discover such threats. Researchers also warned recently that malicious insiders could abuse their access for attacks leveraging ransomware-as-a-service (RaaS).

Related: FBI Suspects Insiders in $81 Million Bangladesh Central Bank Theft

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


CISA, NSA, and MS-ISAC issued an alert on the malicious use of RMM software to steal money from bank accounts.


Russia-linked cyberespionage group APT29 has been observed using embassy-themed lures and the GraphicalNeutrino malware in recent attacks.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

Security researchers are warning of a new wave of malicious NPM and PyPI packages designed to steal user information and download additional payloads.


Chinese threat actor DragonSpark has been using the SparkRAT open source backdoor in attacks targeting East Asian organizations.