Malwarebytes researchers Hossein Jazi and Jrme Segura have documented a new fileless attack technique, dubbed Kraken, that abuses the Microsoft Windows Error Reporting (WER) service. The hacking technique was employed by an unidentified hacking group to avoid detection. The threat actor that employed the Kraken technique, likely an APT group, launched a phishing attack that used messages with a.ZIP file attachment. The malicious code uses a custom. version of the CactusTorch VBA module to perform a fileless. attack.”]
Source: https://securityaffairs.co/wordpress/109196/hacking/kraken-fileless-attack.html

