09/22/2025 | News release | Distributed by Public on 09/22/2025 09:49
The AMF has been informed that a number of players, both regulated and unregulated by the AMF, have received emails impersonating the AMF, inviting them to visit fraudulent sites. To date, two different instances of impersonation have been observed, with no factual evidence to confirm or deny that they originate from the same hostile actor.
Please note that the French version of this news was published on May, 19th.
Technical investigations are still underway, but the evidence known to date for each scenario are as follows:
For the first scenario:
|
For the second scenario:
|
After clicking on the links, the victim is redirected to a website prompting him to download an alleged PDF file. This alleged PDF file is actually a ZIP archive containing a Windows automation script in VBScript (Visual Basic Scripting Edition) format. If executed, this script carries out silent and invisible actions without the victim's knowledge:
Through a series of malicious actions, this phishing attack impersonating the AMF aims to install multiple remote access capabilities on the victim's workstation in order to take control of it, thereby enabling intrusion into the Information System.
The ultimate purpose of this attack method is not yet known, but it most likely falls within the various threats documented by ANSSI (https://cyber.gouv.fr/tendances-les-cybermenaces), including financially motivated attacks (such as ransomware), espionage, and destabilization.
The sender of the email is allegedly a certain Madam « Rochon », allegedly an AMF employee, which is false;
Since at least one individual appears to correspond to this identity, we do not wish to disclose her first name, which is therefore replaced by 'XXX' in the technical sender marker of the email: « XXX-rochon-863563468397286976298728[at] notarius.net »;
The AMF urges professionals who receive such emails related to these scenarios to:
The AMF forwards this information to the public prosecutor.