Monday Cisco Talos discovered a multistage attack used to infect target endpoint with customized Cobalt Strike beacons. The malware campaign use military themed malicious ms office document help Talos to determine that it is used to attack military and government organization in south asia the malware containing the full RAT capabilities.
Talos described its working as "The attack consists of a highly modular dropper executable we're calling "IndigoDrop" dropped to a victim's endpoint using maldocs. IndigoDrop is responsible for obtaining the final payload from a download URL for deployment. The final payloads currently observed by Talos are Cobalt Strike beacons."
Read Full report at Cisco Talos Blog post
Subscribe to:
Post Comments (Atom)
WhatsApp Security Flaw Could Lead to Windows PC Compromise
Critical WhatsApp for Windows Vulnerability Allows Remote Code Execution — Update Now WhatsApp for Windows users are being urged to upda...
-
DigiCert's Revocation of 83,000 Certificates: A Critical Security Move DigiCert has begun the process of revoking over 83,000 SSL/TLS ...
-
AWS Seizes Domains Used by Russian Threat Group APT29 in Credential-Stealing Campaign Amazon Web Services (AWS) has disrupted a phishing o...
-
SuperBlack Ransomware Exploits Fortinet Vulnerabilities: A New Cyber Threat Emerges A Russian-linked threat actor, identified as Mora_001,...
No comments:
Post a Comment