Malware

A collection of 88 posts
Phishing Campaigns Fuel Compiled AutoIt Malware Distribution
Malware

Phishing Campaigns Fuel Compiled AutoIt Malware Distribution

Threat Group: Various (including XLoader, SnakeKeylogger, RedLine, AgentTesla, RemcosRAT) Threat Type: Multi-Functional Malware via Phishing Campaigns Exploited Vulnerabilities: None specific; relies on social engineering for initial infection Malware Used: AutoIt Compile Malware (XLoader, SnakeKeylogger, RedLine, AgentTesla, RemcosRAT) Threat Score: High (8.7/10) – Due to the rapid increase in distribution
2 min read
Evolving Techniques in Cloud Atlas Cyber Attacks
Malware

Evolving Techniques in Cloud Atlas Cyber Attacks

Threat Group: Cloud Atlas (also known as Inception) Threat Type: Advanced Persistent Threat (APT) Exploited Vulnerabilities: * CVE-2017-11882: Memory corruption in Microsoft Office. * CVE-2018-0802: Formula editor vulnerability in Microsoft Office exploited via malicious RTF files. Malware Used: * VBShower: Polymorphic VBS-based backdoor. * PowerShower: PowerShell-based malware for reconnaissance and lateral movement. * VBCloud: New
4 min read