Get a Pentest and security assessment of your IT network.

News

GitHub-hosted malware calculates Cobalt Strike payload from Imgur pic

A new strand of malware uses Word files with macros to download a PowerShell script from GitHub. Multiple researchers have potentially linked this strain to MuddyWater, a government-backed advanced persistent threat (APT) group, first observed in 2017. The malware is evasive and spawns payload in multifaceted steps to evade detection. The technique of hiding code, secret data, or malicious payload within ordinary files, such as images, is known as steganography. The payload calculation algorithm runs a foreach loop to iterate over a set of pixel values within the PNG image and performs specific arithmetic operations to obtain functional ASCII commands.

Source: https://www.bleepingcomputer.com/news/security/github-hosted-malware-calculates-cobalt-strike-payload-from-imgur-pic/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

1 day attack with DDoS booter costs $60 causing $720k in damageSecurity Affairs

News

NSA-linked Cisco exploit poses bigger threat than previously thought