Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
8 résultats taggé elastic.co  ✕
A Wretch Client: From ClickFix deception to information stealer deployment — Elastic Security Labs https://www.elastic.co/security-labs/a-wretch-client
18/06/2025 08:23:30
QRCode
archive.org
thumbnail

Elastic Security Labs has observed the ClickFix technique gaining popularity for multi-stage campaigns that deliver various malware through social engineering tactics.

Our threat intelligence indicates a substantial surge in activity leveraging ClickFix (technique first observed) as a primary initial access vector. This social engineering technique tricks users into copying and pasting malicious PowerShell that results in malware execution. Our telemetry has tracked its use since last year, including instances leading to the deployment of new versions of the GHOSTPULSE loader. This led to campaigns targeting a broad audience using malware and infostealers, such as LUMMA and ARECHCLIENT2, a family first observed in 2019 but now experiencing a significant surge in popularity.

This post examines a recent ClickFix campaign, providing an in-depth analysis of its components, the techniques employed, and the malware it ultimately delivers.

Key takeaways

  • ClickFix: Remains a highly effective and prevalent initial access method.
  • GHOSTPULSE: Continues to be widely used as a multi-stage payload loader, featuring ongoing development with new modules and improved evasion techniques. Notably, its initial configuration is delivered within an encrypted file.
  • ARECHCLIENT2 (SECTOPRAT): Has seen a considerable increase in malicious activity throughout 2025.
elastic.co EN 2025 ClickFix analysis GHOSTPULSE ARECHCLIENT2 (SECTOPRAT)
Tricks and Treats: GHOSTPULSE’s new pixel-level deception https://www.elastic.co/security-labs/tricks-and-treats
21/10/2024 15:25:25
QRCode
archive.org
thumbnail

The updated GHOSTPULSE malware has evolved to embed malicious data directly within pixel structures, making it harder to detect and requiring new analysis and detection techniques.

elastic.co EN 2024 GHOSTPULSE pixel-level deception
Beyond the wail: deconstructing the BANSHEE infostealer https://www.elastic.co/security-labs/beyond-the-wail
16/08/2024 17:35:09
QRCode
archive.org
thumbnail

The BANSHEE malware is a macOS-based infostealer that targets system information, browser data, and cryptocurrency wallets.

elastic.co EN 2024 macOS BANSHEE infostealer
GrimResource - Microsoft Management Console for initial access and evasion https://www.elastic.co/security-labs/grimresource
25/06/2024 16:40:55
QRCode
archive.org
thumbnail

Elastic researchers uncovered a new technique, GrimResource, which allows full code execution via specially crafted MSC files. It underscores a trend of well-resourced attackers favoring innovative initial access methods to evade defenses.

elastic.co EN 2024 GrimResource MSC technique evasion initial-access
PIKABOT, I choose you! https://www.elastic.co/security-labs/pikabot-i-choose-you
27/02/2024 10:51:53
QRCode
archive.org
thumbnail

Elastic Security Labs observed new PIKABOT campaigns, including an updated version. PIKABOT is a widely deployed loader malicious actors utilize to distribute additional payloads.

elastic.co EN 2024 new campaign loader
Elastic catches DPRK passing out KANDYKORN — Elastic Security Labs https://www.elastic.co/security-labs/elastic-catches-dprk-passing-out-kandykorn
05/11/2023 17:55:22
QRCode
archive.org
thumbnail

Elastic Security Labs exposes an attempt by the DPRK to infect blockchain engineers with novel macOS malware.

elastic.co EN macOS DPRK blockchain engineers malware targeted
Disclosing the BLOODALCHEMY backdoor https://www.elastic.co/security-labs/disclosing-the-bloodalchemy-backdoor
15/10/2023 19:37:10
QRCode
archive.org
thumbnail

BLOODALCHEMY is a new, actively developed, backdoor that leverages a benign binary as an injection vehicle, and is a part of the REF5961 intrusion set.

elastic.co EN 2023 BLOODALCHEMY backdoor REF5961 analysis
Emerging Threat! Exposing JOKERSPY https://www.elastic.co/fr/security-labs/inital-research-of-jokerspy
22/06/2023 21:36:02
QRCode
archive.org
thumbnail

Explore JOKERSPY, a recently discovered campaign that targets financial institutions with Python backdoors. This article covers reconnaissance, attack patterns, and methods of identifying JOKERSPY in your network.

elastic.co EN 2023 JOKERSPY macOS Python backdoor
4557 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio