Tag: Obfuscation
-
Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing
Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide …
-
Heavily Obfuscated PIKABOT Evades EDR Protection
PIKABOT is a polymorphic malware that constantly modifies its code, making it hard to recognize and easily bypasses the Endpoint Detection …
-
PikaBot Resurfaces with Streamlined Code and Deceptive Tactics
The threat actors behind the PikaBot malware have made significant changes to the malware in what has been described as a case of …
-
AsyncRAT loader: Obfuscation, DGAs, decoys and Govno
Executive summary AT&T Alien Labs has identified a campaign to deliver AsyncRAT onto unsuspecting victim systems. During at least 11 …
-
Rhadamanthys Malware: Swiss Army Knife of Information Stealers Emerges
The developers of the information stealer malware known as Rhadamanthys are actively iterating on its features, broadening its …
-
New Jupyter Infostealer Version Emerges with Sophisticated Stealth Tactics
An updated version of an information stealer malware known as Jupyter has resurfaced with “simple yet impactful changes” that aim to …
-
Turla Updates Kazuar Backdoor with Advanced Anti-Analysis to Evade Detection
The Russia-linked hacking crew known as Turla has been observed using an updated version of a known second-stage backdoor referred to as …
-
Obfuscation technique usage in phishing emails on the rise
Obfuscation tactics to bypass security system detection have been implemented in 55.2% of phishing emails from January to September 2023, …
-
‘Picture-in-Picture’ Obfuscation Spoofs Delta, Kohl’s for Credential Harvesting
A recent campaign tricks victims into visiting credential harvesting sites by hiding malicious URLs behind photos advertising deals from …
-
Data Obfuscation: What It Is and How to Use It for Your Business
Data obfuscation is an important tool for businesses in this digital age, but many are left wondering what it actually is and how to use …
-
Experts Detail Virtual Machine Used by Wslink Malware Loader for Obfuscation
Cybersecurity researchers have shed more light on a malicious loader that runs as a server and executes received modules in memory, laying …
-
Notorious Spyware Tool Found Hiding Beneath Four Layers of Obfuscation
FinFisher (aka FinSpy) surveillance software now goes to extreme lengths to duck analysis and discovery, researchers found in a months-long …
●●●