HomeIntelligenceBrief
🔓 BREACH BRIEF🟠 High🔍 ThreatIntel

Phishing Email Disguised as DHL Shipment Delivers SimpleHelp Remote Access Tool to German Industrial Supplier

A spoofed DHL notification delivered a malicious SimpleHelp remote‑access tool to a German industrial spare‑parts supplier, creating a persistent foothold for attackers. The attack leverages a PDF that triggers a hidden .scr installer, highlighting the need for strict email and RMM controls in third‑party risk programs.

🛡️ LiveThreat™ Intelligence · 📅 April 18, 2026· 📰 malwarebytes.com
🟠
Severity
High
🔍
Type
ThreatIntel
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
3 recommended
📰
Source
malwarebytes.com

Phishing Email Disguised as DHL Shipment Delivers SimpleHelp Remote Access Tool to German Industrial Supplier

What Happened – A German industrial spare‑parts company received a spoofed DHL notification. The attached PDF prompted the user to “Continue,” which actually downloaded a malicious .scr file from a compromised Vietnamese logistics domain. The file installed a signed SimpleHelp remote‑access tool, giving attackers persistent, stealthy access to the network.

Why It Matters for TPRM

  • Remote‑access tools (RATs) can be turned into “support‑style backdoors,” enabling credential theft, lateral movement, and ransomware staging.
  • Supply‑chain partners often receive routine shipping notifications, making this a high‑frequency attack vector that can compromise third‑party environments.
  • The use of a legitimate‑looking Microsoft‑branded button and a trusted signing certificate helps the payload evade basic security controls.

Who Is Affected – Manufacturing & industrial equipment vendors; any third‑party logistics or procurement contacts that handle shipment notifications.

Recommended Actions

  • Instruct all vendors to verify sender domains for shipping notifications and block executable .scr files.
  • Deploy email‑gateway filtering for spoofed DHL addresses and enforce attachment sandboxing.
  • Conduct a rapid inventory of SimpleHelp installations across the supply chain and verify they are authorized.

Technical Notes – Attack vector: spear‑phishing with a malicious PDF → .scr executable → signed SimpleHelp RMM installer. No CVE cited. Data at risk includes credentials, internal network topology, and any downstream customer data accessed after foothold. Source: Malwarebytes Labs

📰 Original Source
https://www.malwarebytes.com/blog/news/2026/04/your-shipment-has-arrived-email-hides-remote-access-software

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.