Tag: Payloads
-
From PDFs to Payload: Bogus Adobe Acrobat Reader Installers Distribute Byakugan Malware
Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan. The starting point …
-
Rise in Deceptive PDF: The Gateway to Malicious Payloads
Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the distribution of prominent malware …
-
Rust Payloads Exploiting Ivanti Zero-Days Linked to Sophisticated Sliver Toolkit
Payloads recently found on compromised Ivanti Connect Secure appliances could be from the same, sophisticated threat actor, according to …
-
SystemBC Malware’s C2 Server Analysis Exposes Payload Delivery Tricks
Cybersecurity researchers have shed light on the command-and-control (C2) server of a known malware family called SystemBC. “SystemBC can …
-
DarkGate Malware Abuses AutoIT Scripting For Payload Obfustication
DarkGate is a type of malware that employs Auto-It compiled loaders that cause a considerable threat because of its advanced evasion …
-
Atomic Stealer Gets an Upgrade – Targeting Mac Users with Encrypted Payload
Cybersecurity researchers have identified an updated version of a macOS information stealer called Atomic (or AMOS), indicating that the …
-
8 XSS Vulnerabilities in Azure HDInsight Allow Attackers to Deliver Malicious Payloads
Azure HDInsight has been identified with multiple Cross-Site Scripting – XSS vulnerabilities related to Stored XSS and Reflected XSS. The …
-
BATLOADER Malware Uses Google Ads to Deliver Vidar Stealer and Ursnif Payloads
The malware downloader known as BATLOADER has been observed abusing Google Ads to deliver secondary payloads like Vidar Stealer and Ursnif. …
-
Bumblebee Malware Loader’s Payloads Significantly Vary by Victim System
On some systems the malware drops infostealers and banking Trojans; on others it installs sophisticated post-compromise tools, new analysis …
-
Government, Union-Themed Lures Used to Deliver Cobalt Strike Payloads
Researchers at security firm Cisco Talos discovered a malicious campaign in August 2022 that relied on modularized attack techniques to …
-
2-Step Email Attack Uses Powtoon Video to Execute Payload
A unique multistep cyberattack has been observed in the wild that attempts to trick users into playing a malicious video that ultimately …
●●●