Monday Cisco Talos discovered a multistage attack used to infect target endpoint with customized Cobalt Strike beacons. The malware campaign use military themed malicious ms office document help Talos to determine that it is used to attack military and government organization in south asia the malware containing the full RAT capabilities.
Talos described its working as "The attack consists of a highly modular dropper executable we're calling "IndigoDrop" dropped to a victim's endpoint using maldocs. IndigoDrop is responsible for obtaining the final payload from a download URL for deployment. The final payloads currently observed by Talos are Cobalt Strike beacons."
Read Full report at Cisco Talos Blog post
Subscribe to:
Post Comments (Atom)
Infostealer Malware Masquerades as DeepSeek AI Tools on PyPI
DeepSeek AI Tools Impersonated by Infostealer Malware on PyPI Cybercriminals are exploiting the growing popularity of DeepSeek AI by distr...
-
DigiCert's Revocation of 83,000 Certificates: A Critical Security Move DigiCert has begun the process of revoking over 83,000 SSL/TLS ...
-
The notorious Craxs Rat malware has recently unleashed its latest version, Update V5, introducing a range of new features and enhancements....
-
AWS Seizes Domains Used by Russian Threat Group APT29 in Credential-Stealing Campaign Amazon Web Services (AWS) has disrupted a phishing o...
No comments:
Post a Comment