Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
10 résultats taggé loader  ✕
Fake Zoom Ends in BlackSuit Ransomware https://thedfirreport.com/2025/03/31/fake-zoom-ends-in-blacksuit-ransomware/
31/03/2025 20:56:58
QRCode
archive.org
thumbnail

Key Takeaways The threat actor gained initial access by a fake Zoom installer that used d3f@ckloader and IDAT loader to drop SectopRAT. After nine days of dwell time, the SectopRAT malware dropped …

thedfirreport EN 2025 Fake Zoom IDAT loader SectopRAT d3f@ckloader incident analysis
HijackLoader evolution: abusing genuine signing certificates https://harfanglab.io/insidethelab/hijackloader-abusing-genuine-certificates/
18/10/2024 23:57:01
QRCode
archive.org
thumbnail

Since mid-September 2024, our telemetry has revealed a significant increase in “Lumma Stealer”1 malware deployments via the “HijackLoader”2 malicious loader.

On October 2, 2024, HarfangLab EDR detected and blocked yet another HijackLoader deployment attempt – except this time, the malware sample was properly signed with a genuine code-signing certificate.

In response, we initiated a hunt for code-signing certificates (ab)used to sign malware samples. We identified and reported more of such certificates. This report briefly presents the associated stealer threat, outlines the methodology for hunting these certificates, and providees indicators of compromise.

harfanglab EN 2024 HijackLoader captcha fake malicious loader campaign
WebDAV-as-a-Service: Uncovering the infrastructure behind Emmenhtal loader distribution https://blog.sekoia.io/webdav-as-a-service-uncovering-the-infrastructure-behind-emmenhtal-loader-distribution/
19/09/2024 14:02:56
QRCode
archive.org
thumbnail

Our TDR team has been investigating the WebDAV infrastructure used to distribute the Emmenhtal loader. Here are some key insights:

sekoia EN 2024 webdav WebDAV-as-a-Service Emmenhtal loader
Emmenhtal: a little-known Emmenhtal distributing commodity infostealers worldwide https://www.orangecyberdefense.com/global/blog/cert-news/emmenhtal-a-little-known-loader-distributing-commodity-infostealers-worldwide
19/09/2024 13:54:05
QRCode
archive.org
  • Following detections from our Managed Threat Detection (CyberSOC) teams, our CERT analysts were able to uncover several recent campaigns leading to CryptBot and Lumma infostealers.

  • Some of these campaigns are still active and target various organizations worldwide.

  • These campaigns leverage a little-documented loader we dubbed “Emmenhtal”, (because we are cheese lovers), which hides in the padding of a modified legitimate Windows binary and uses HTA.

  • Emmenhtal likely surfaced at the beginning of 2024 and is possibly being distributed by several financially motivated threat actors through various means (from traditional email phishing lures to fake videos).

  • IoCs can be found on our dedicated GitHub page here.
    Note: The analysis cut-off date for this report was August 07, 2024.

orangecyberdefense EN 2024 Emmenhtal loader infostealers
PIKABOT, I choose you! https://www.elastic.co/security-labs/pikabot-i-choose-you
27/02/2024 10:51:53
QRCode
archive.org
thumbnail

Elastic Security Labs observed new PIKABOT campaigns, including an updated version. PIKABOT is a widely deployed loader malicious actors utilize to distribute additional payloads.

elastic.co EN 2024 new campaign loader
New Go-based Malware Loader Discovered I Arctic Wolf https://arcticwolf.com/resources/blog/cherryloader-a-new-go-based-loader-discovered-in-recent-intrusions/
29/01/2024 18:47:54
QRCode
archive.org
thumbnail

Arctic Wolf Labs has discovered, based on recent intrusion observations, a new Go-based malware loader named CherryLoader

arcticwolf EN 2024 Go-based Malware Loader analysis CherryLoader
Loader activity for Formbook "QM18" https://isc.sans.edu/diary/rss/30020
13/07/2023 00:17:50
QRCode
archive.org

Loader activity for Formbook "QM18", Author: Brad Duncan

SANS EN 2023 QM18 Formbook Loader
Bumblebee: increasing its capacity and evolving its TTPs https://research.checkpoint.com/2022/bumblebee-increasing-its-capacity-and-evolving-its-ttps/
04/10/2022 19:49:59
QRCode
archive.org
thumbnail

The spring of 2022 saw a spike in activity of Bumblebee loader, a recent threat that has garnered a lot of attention due to its many links to several well-known malware families.

checkpoint EN 2022 Bumblebee loader malware Analysis
THREAT ANALYSIS REPORT: Bumblebee Loader – The High Road to Enterprise Domain Control https://www.cybereason.com/blog/threat-analysis-report-bumblebee-loader-the-high-road-to-enterprise-domain-control
22/08/2022 14:23:16
QRCode
archive.org
thumbnail

Cybereason GSOC observed distribution of the Bumblebee Loader and post-exploitation activities including privilege escalation, reconnaissance and credential theft. Bumblebee operators use the Cobalt Strike framework throughout the attack and abuse credentials for privilege escalation to access Active Directory, as well as abusing a domain administrator account to move laterally, create local user accounts and exfiltrate data...

cybereason EN 2022 THREAT ANALYSIS REPORT Bumblebee Loader CobaltStrike
SVCReady: A New Loader Gets Ready https://threatresearch.ext.hp.com/svcready-a-new-loader-reveals-itself/
07/06/2022 14:48:46
QRCode
archive.org
thumbnail

Don’t let cyber threats get the best of you. Read our post, SVCReady: A New Loader Gets Ready, to learn more about cyber threats and cyber security.

threatresearch EN 2022 SVCReady Loader Windows malware VBA Macro research
4366 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio